September 10, 2019
Volume 05, Issue 2
Digital Deception: The Undue Influence Enhancement in the Sentencing of Cyber-Predators Caught in Online Sting Operations
When cyber-predators are caught through online sting operations and found guilty of the underlying statutory violation, judges must look to the United States Sentencing Guidelines (“Sentencing Guidelines”) to determine what sentences offenders will serve. One of the sentencing guidelines applicable to such cases is section 2A3.2, “Criminal Sexual Abuse of a Minor Under the Age
MacKenzie Fillow, Comment, Digital Deception: The Undue Influence Enhancement in the Sentencing of Cyber-Predators Caught in Online Sting Operations, 5 N.C. J.L. & Tech. 371 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/21_5NCJLTech3712003-2004.pdf.
The On-Sale Bar and the New UCC Article 2: Arguments for Defining a Commercial Offer for Sale Pursuant to the United Nations Convention on Contracts for the International Sale of Goods
The modern inventor is compelled to create innovative products, generate a market for those products, and protect those products with a patent. The choice to file a patent application reflects an inventor’s desire to protect her private interest in controlling a limited monopoly over the invention, subject to the statutes governing patents. Section 102 of
Matthew Jamison, Article, The On-Sale Bar and the New UCC Article 2: Arguments for Defining a Commercial Offer for Sale Pursuant to the United Nations Convention on Contracts for the International Sale of Goods, 5 N.C. J.L. & Tech. 351 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/20_5NCJLTech3512003-2004.pdf.
For an avid sports fan, it is sometimes challenging to watch every important game while simultaneously keeping other commitments. Consider a law student who must choose between being prepared for class the following day and watching his or her favorite team. Listening to Dick Vitale rant and rave about the next “diaper dandy” while trying
Clifford N. MacDonald, Gamecasts and NBA v. Motorola: Do They Still Love This Game?, 5 N.C. J.L. & Tech. 329 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/19_5NCJLTech3292003-2004.pdf.
As many as 600 operating power plants in the United States are between thirty and fifty years old and are up to ten times dirtier than new power plants built today. Many of the technologies that remove pollution and increase operating efficiencies have been available for decades, but power plants have been slow to adapt.
Yekaterina Korostash, EPA’s New Regulatory Policy: Two Steps Back, 5 N.C. J.L. & Tech. 295 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/18_5NCJLTech2952003-2004.pdf.
Ah ha, hush that fuss Everybody move to the back of the bus Do you wanna bump slump with us We the type of people make the club get crunk In September 1998, the Atlanta-based musical group OutKast released a song titled Rosa Parks which contained the above lyrics in the chorus. In Parks v.
Lucas Haugh, Recent Development, “Insert Court Approved Title Here”: Rosa Parks v. LaFace Records, 5 N.C. J.L. & Tech. 277 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/17_5NCJLTech2772003-2004.pdf.
Recently several states have launched investigations of certain MCI telephone call routings based on competitors’ claims that the company eliminated or reduced payments it should have made. The MCI investigations may uncover instances of unlawful practices designed to shore up revenues, reduce payments to local exchange carriers for call delivery, avoid tax liability and shift
Rob Frieden, Article, Regulatory Arbitrage Strategies and Tactics in Telecommunications, 5 N.C. J.L. & Tech. 227 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/16_5NCJLTech2272003-2004.pdf.
Librarians and library associations have been outspoken critics of the expanded surveillance powers granted law enforcement with passage of the USA PATRIOT Act in 2001. Librarians’ organized protests have given impetus to community and legislative efforts to curtail the expanded power, and librarians have also had a small role in lawsuits challenging the Act. The
Anne Klinefelter, The Role of Librarians in Challenges to the USA PATRIOT Act, 5 N.C. J.L. & Tech. 219 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/15_5NCJLTech2192003-2004.pdf.
We are in the Wild West of privacy and security today. As was the case with consumers of food and drugs one hundred years ago, today’s consumers know little about the actual practices of companies that have their personal information. There is skyrocketing identity theft, stalking made possible through the sale of personal information, and
Chris Jay Hoofnagle, Article, Reflections on the NC JOLT Symposium: The Privacy Self-Regulation Race to the Bottom, 5 N.C. J.L. & Tech. 213 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/14_5NCJLTech2132003-2004.pdf.
On October 26, 2001, only six weeks after the unfathomable horror of September 11, President Bush signed the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (“PATRIOT Act”).2 The bill was more than 340 pages long, had significant changes in its final days, and affects more
David Lombard Harrison, Article, The USA PATRIOT Act: A New Way of Thinking, an Old Way of Reacting, Higher Education Responds, 5 N.C. J.L. & Tech. 177 (2004), available at http://ncjolt.org/wp-content/uploads/2016/09/13_5NCJLTech1772003-2004.pdf.
The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at firstname.lastname@example.org with permissions inquiries.