April 17, 2017
Volume 03, Issue 1
Timothy J. McVeigh was sentenced to death on August 14, 1997, for the bombing of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma, which left 168 people dead. Although United States Attorney General John Ashcroft explained that “all the citizens of the United States were victims of the crimes perpetrated by Mr. McVeigh,”
Robert Perry Barnidge, Jr., Note, Death Watch: Why America Was Not Allowed To Watch Timothy McVeigh Die, 3 N.C. J.L. & Tech. 193 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/12_3NCJLTech1932001-2002.pdf.
Following the tragic events which occurred in the United States on September 11, 2001, the threat of violence due to hate-based ideas and values has become a pressing reality. Americans have been forced to question whether hate-filled online rhetoric is simply the harmless exercise of free speech or is a preventable catalyst of illegal conduct.
Edgar Burch, Comment, Censoring Hate Speech In Cyberspace: A New Debate in a New America, 3 N.C. J.L. & Tech. 175 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/11_3NCJLTech1752001-2002.pdf.
Can Facial Recognition Technology Be Used To Fight the New War Against Terrorism?: Examining the Constitutionality of Facial Recognition Surveillance Systems
Because Americans live in one of the most technologically advanced societies, our lives have already been monitored and our freedoms constrained by highly intrusive means. Employers can legally monitor their employees’ e-mails, and automobile drivers can be issued traffic tickets with the use of video cameras attached to stoplights. This comment will focus on one
Kanya A. Bennett, Comment, Can Facial Recognition Technology Be Used To Fight the New War Against Terrorism?: Examining the Constitutionality of Facial Recognition Surveillance Systems, 3 N.C. J.L. & Tech. 151 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/10_3NCJLTech1512001-2002.pdf.
On September 11, 2001, tragedy struck the United States after nineteen hijackers slipped past security in three American airports and, wielding only knives and box cutters, successfully gained control of four United States commercial airliners. The terrorists crashed two planes into the World Trade Center, collapsing the Twin Towers and killing more than 3000 people,
Addie S. Ries, Comment, America’s Anti-hijacking Campaign -- Will It Conform to Our Constitution?, 3 N.C. J.L. & Tech. 123 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/09_3NCJLTech1232001-2002.pdf.
Deciphering Means-Plus-Function Claim Limitation Infringement under § 112, Paragraph 6: Finding Certainty in the Uncertain Case Law
The development of a technology-centered economy has increased the importance of patent rights. In order for these patent rights to have value, patentees must be able to ascertain the metes and bounds of their patent claims. In recent years the Federal Circuit has muddled means-plus-function claim limitation infringement analysis governed by 35 U.S.C. § 112,
Chad S.C. Stover, Comment, Deciphering Means-Plus-Function Claim Limitation Infringement under § 112, Paragraph 6: Finding Certainty in the Uncertain Case Law, 3 N.C. J.L. & Tech. 101 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/08_3NCJLTech1012001-2002.pdf.
Innovative technology is an essential asset in the information age. Most people have the ability to obtain information about almost any topic at the click of a mouse thanks to recent developments in Internet and home computer technology. But many people face obstacles in obtaining the same information due to mental and physical disabilities. Although
Latresa McLawhorn, Recent Development, Leveling the Accessibility Playing Field: Section 508 of the Rehabilitation Act, 3 N.C. J.L. & Tech. 63 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/07_3NCJLTech632001-2002.pdf.
Comparative Advertising on the Internet: Defining the Boundaries of Trademark Fair Use for Internet Metatags and Trigger Ads
With well over a billion websites in existence, finding the desired material on the Internet can be a challenge. Many individuals, businesses, and organizations are faced with the similar challenge of ensuring that their websites can be found by interested parties. Because websites are often the primary economic livelihood for individuals and businesses, the ease
Benjamin F. Sidbury, Comparative Advertising on the Internet: Defining the Boundaries of Trademark Fair Use for Internet Metatags and Trigger Ads, 3 N.C. J.L. & Tech. 35 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/06_3NCJLTech352001-2002.pdf.
E-commerce sales do not require a fixed place of business in foreign countries since consumers can order goods by accessing the seller’s website over the Internet. As such, e-commerce permits a foreign company to engage in extensive transactions with U.S. customers without entering the United States. Although such a company is clearly engaged in a
Michelle L. Prettie, Are There Any Tax Havens in Electronic Commerce?, 3 N.C. J.L. & Tech. 1 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/05_3NCJLTech12001-2002.pdf.
Spring Training for Electronic Search: Examining U.S. v. Comprehensive Drug Testing Inc. with regards to Evolving Trends in Computing
This Recent Development discusses the framework for electronic search that was laid out by the Ninth Circuit in U.S. v. Comprehensive Drug Testing, Inc. Though the Ninth Circuit’s framework has positive elements, the framework is fatally flawed because it does not account for the rapid evolution of computing technologies and does not account for recent
John T. Kivus, Spring Training for Electronic Search: Examining U.S. v. Comprehensive Drug Testing Inc. with regards to Evolving Trends in Computing, 11 N.C. J.L. & Tech. On. 115 (2009), available at http://ncjolt.org/wp-content/uploads/2012/11/V11_On_Kivus.pdf.
The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at firstname.lastname@example.org with permissions inquiries.