Ellen S. Podgor

Biography
File icon
Ellen S. Podgor

Department of Justice Guidelines: Balancing “Discretionary Justice” Article

Date of Publication:

Recommended Citation

Ellen S. Podgor, Department of Justice Guidelines: Balancing “Discretionary Justice”, 13 Cornell J.L. & Pub. Pol'y 167 (2004)Clicking on the button will copy the full recommended citation.

File icon
Ellen S. Podgor

Gideon at 40: Facing the Crisis, Fulfilling the Promise Article

Date of Publication:

Recommended Citation

Ellen S. Podgor, Gideon at 40: Facing the Crisis, Fulfilling the Promise, 41 Am. Crim. L. Rev. 131 (2004)Clicking on the button will copy the full recommended citation.

File icon
Ellen S. Podgor

Book Review, Murder and the Reasonable Man Article

Date of Publication:

Recommended Citation

Ellen S. Podgor, Book Review, Murder and the Reasonable Man, 27 Champion (2019)Clicking on the button will copy the full recommended citation.

2003

File icon
Ellen S. Podgor

Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 Book Chapter

Date of Publication:

Recommended Citation

Ellen S. Podgor, Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, in Major Acts of Congress (B. Landsberg ed., Macmillan Reference Books, 2003)Clicking on the button will copy the full recommended citation.

    File icon
    Ellen S. Podgor

    “Defensive Territoriality”: A New Paradigm for the Prosecution of Extraterritorial Business Crimes Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor, “Defensive Territoriality”: A New Paradigm for the Prosecution of Extraterritorial Business Crimes, 31 Ga. J. Int'l & Comp. L. 1 (2003)Clicking on the button will copy the full recommended citation.

    File icon
    Ellen S. Podgor

    Extraterritorial Criminal Jurisdiction: Replacing “Objective Territoriality with “Defensive Territoriality” Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor, Extraterritorial Criminal Jurisdiction: Replacing “Objective Territoriality with “Defensive Territoriality”, 28 Studies in Law, Politics, and Society 117 (2003)Clicking on the button will copy the full recommended citation.

    File icon
    Ellen S. Podgor and John Wesley Hall

    Government Surveillance of Attorney-Client Communications: Invoked in the Name of Fighting Terrorism Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor and John Wesley Hall, Government Surveillance of Attorney-Client Communications: Invoked in the Name of Fighting Terrorism, 17 Geo. J. Legal Ethics 145 (2003)Clicking on the button will copy the full recommended citation.

    File icon
    Ellen S. Podgor

    Schemes to Defraud Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor, Schemes to Defraud, 27 Champion 12 (2003)Clicking on the button will copy the full recommended citation.

    2002

    File icon
    Ellen S. Podgor

    Book Review, The International Dimensions of Cyberspace Law Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor, Book Review, The International Dimensions of Cyberspace Law, 12 International Criminal Justice Review 122 (2002)Clicking on the button will copy the full recommended citation.

    File icon
    Ellen S. Podgor

    International Computer Fraud: A Paradigm for Limiting National Jurisdiction Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor, International Computer Fraud: A Paradigm for Limiting National Jurisdiction, 35 U.C. Davis L. Rev. 267 (2002)Clicking on the button will copy the full recommended citation.