Legal Resource Center News

Learn more about Law

temporary retraining order

Overview: A Temporary Restraining Order (TRO)

Introduction If you or someone you know is experiencing domestic abuse, stalking, harassment or finds themselves in a potentially threatening relationship, you may want to consider filing for aTemporary Restraining Order (TRO).  This is a brief summary of obtaining a TRO, but it should be noted that there are different types of restraining orders that vary in each state, so individuals are encouraged to seek…
halloween masks and trophies

Horror and Copyright: How Scary Characters Shaped Legal Protection

While the spooky season has passed and we no longer hide under our covers while watching favorite horror characters like Michael Myers and Jason Voorhees in cult classics like Halloween and Friday the 13th, this article explores perhaps the scariest topic: copyright law. More specifically, how U.S. copyright law has played a significant role in these famous characters' history and how it has secured their legacy to continue frightening future generations.…
Applied Data Science

Artificial Intelligence: Privacy Concerns

The evolution of artificial intelligence (AI) in our society has increased concerns about privacy rights. Many individuals are questioning how these technologies monitor and use their data. AI's ability to collect, analyze, and utilize data has changed daily life for many people. For AI to function correctly, not only does it require high-functioning algorithms and processing power, it needs a large quantity of personal data. These technologies gather and use sensitive information in ways that…
woman looking at computers

FSU Lunchtime Free Webinars

Florida State University Frontiers in Law and Technology is offering a lunchtime webinar series that will offer a variety of perspectives from innovative technology experts. The webinars feature academics, practitioners, and technological experts who will explore the science and ethics of technological advancements such as artificial intelligence and cybersecurity. Below is a…