2003

File icon
Ellen S. Podgor

Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 Book Chapter

Date of Publication:

Recommended Citation

Ellen S. Podgor, Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, in Major Acts of Congress (B. Landsberg ed., Macmillan Reference Books, 2003)Clicking on the button will copy the full recommended citation.

    File icon
    Ann M. Piccard

    Direct Appeal Jurisdiction of Florida’s District Courts of Appeal Article

    Date of Publication:

    Recommended Citation

    Ann Piccard, Direct Appeal Jurisdiction of Florida’s District Courts of Appeal, 33 Stetson L. Rev. 152 (2003)Clicking on the button will copy the full recommended citation.

    File icon
    Ellen S. Podgor

    “Defensive Territoriality”: A New Paradigm for the Prosecution of Extraterritorial Business Crimes Article

    Date of Publication:

    Recommended Citation

    Ellen S. Podgor, “Defensive Territoriality”: A New Paradigm for the Prosecution of Extraterritorial Business Crimes, 31 Ga. J. Int'l & Comp. L. 1 (2003)Clicking on the button will copy the full recommended citation.

    File icon
    James W. Fox

    Naturalization Acts (1790) Book Chapter

    Date of Publication:

    Recommended Citation

    James W. Fox, Naturalization Acts (1790), in Major Acts of Contress (Macmillan Reference Books, 2003)Clicking on the button will copy the full recommended citation.

      File icon
      Ellen S. Podgor

      Extraterritorial Criminal Jurisdiction: Replacing “Objective Territoriality with “Defensive Territoriality” Article

      Date of Publication:

      Recommended Citation

      Ellen S. Podgor, Extraterritorial Criminal Jurisdiction: Replacing “Objective Territoriality with “Defensive Territoriality”, 28 Studies in Law, Politics, and Society 117 (2003)Clicking on the button will copy the full recommended citation.

      File icon
      Ellen S. Podgor and John Wesley Hall

      Government Surveillance of Attorney-Client Communications: Invoked in the Name of Fighting Terrorism Article

      Date of Publication:

      Recommended Citation

      Ellen S. Podgor and John Wesley Hall, Government Surveillance of Attorney-Client Communications: Invoked in the Name of Fighting Terrorism, 17 Geo. J. Legal Ethics 145 (2003)Clicking on the button will copy the full recommended citation.

      File icon
      Roberta K. Flowers

      Litigating with the Elderly Client Article

      Date of Publication:

      Recommended Citation

      Roberta Flowers, Litigating with the Elderly Client, 16 National Academy of Elder Law Attorneys Quarterly 2 (2003)Clicking on the button will copy the full recommended citation.

      File icon
      Ellen S. Podgor

      Schemes to Defraud Article

      Date of Publication:

      Recommended Citation

      Ellen S. Podgor, Schemes to Defraud, 27 Champion 12 (2003)Clicking on the button will copy the full recommended citation.

      File icon
      Royal C. Gardner

      Perspectives on Wetlands and Biodiversity: International Law, Iraqi Marshlands and Incentives for Restoration Article

      Date of Publication:

      Recommended Citation

      Royal C. Gardner, Perspectives on Wetlands and Biodiversity: International Law, Iraqi Marshlands and Incentives for Restoration, 15 Colorado Journal of International Envtl. L. and POlicy 1 (2003)Clicking on the button will copy the full recommended citation.

      File icon
      Royal C. Gardner

      Rehabilitating Nature: A Comparative Review of Legal Mechanisms That Encourage Wetland Restoration Efforts Article

      Date of Publication:

      Recommended Citation

      Royal C. Gardner, Rehabilitating Nature: A Comparative Review of Legal Mechanisms That Encourage Wetland Restoration Efforts, 52 Cath. U. L. Rev. 573 (2003)Clicking on the button will copy the full recommended citation.