Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Entire DC Network

Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano Oct 2016

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions …


Chapter Four: Information Security, Tracy Mitrano Oct 2016

Chapter Four: Information Security, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter One: Free Speech, Tracy Mitrano Oct 2016

Chapter One: Free Speech, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Two: Privacy, Tracy Mitrano Oct 2016

Chapter Two: Privacy, Tracy Mitrano

Tracy Mitrano

"Free speech" and "privacy" operate as integral, essential supporting values that underpin the missions of colleges and universities in the United States. Chapter One focused attention on free speech. Many of the same arguments could be made by and for privacy. It would be interesting to subject the same content about free speech to a global "find and replace" function for the applicable legal and policy points between them! Nonetheless, US law separates these two areas. Therefore, this chapter will focus on privacy law in particular: government surveillance and consumer privacy. Both subsets of privacy law, I will argue, have …


Chapter Three: Intellectual Property, Tracy Mitrano Oct 2016

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Conclusion, Tracy Mitrano Oct 2016

Conclusion, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Pornography As Pollution, John C. Nagle Oct 2016

Pornography As Pollution, John C. Nagle

John Copeland Nagle

Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …


Shareholder Wealth Maximization As Means To An End, Robert P. Bartlett, Iii Aug 2016

Shareholder Wealth Maximization As Means To An End, Robert P. Bartlett, Iii

Robert Bartlett

In several recent cases, the Delaware Chancery Court has emphasized that where a conflict of interest exists between holders of a company’s common stock and holders of its preferred stock, the standard of conduct for directors requires that they strive to maximize the value of the corporation for the benefit of its common stockholders rather than for its preferred stockholders. This article interrogates this view of directors’ fiduciary duties from the perspective of incomplete contracting theory. Building on the seminal work of Sanford Grossman and Oliver Hart, incomplete contracting theory examines the critical role of corporate control rights for addressing …


Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French May 2016

Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French

Christopher C. French

On March 18, 2016, and March 22, 2016, a jury awarded Terry Bollea (a.k.a Hulk Hogan) a total of $140 million in compensatory and punitive damages against Gawker Media for posting less than two minutes of a video of Hulk Hogan having sex with his best friend’s wife. The award was based upon a finding that Gawker intentionally had invaded Hulk Hogan’s privacy by posting the video online. The case has been receiving extensive media coverage because it is a tawdry tale involving a celebrity, betrayal, adultery, sex, and the First Amendment. The case likely will be remembered by most …


The More Copyright Laws Change, The More Digital Challenges Stay The Same, Peter K. Yu May 2016

The More Copyright Laws Change, The More Digital Challenges Stay The Same, Peter K. Yu

Peter K. Yu

This essay was a contribution to the Liber Amicorum for Professor Jan Rosén of Stockholm University, a former president of the International Association for the Advancement of Teaching and Research in Intellectual Property (ATRIP). Drawing on Professor Rosén's scholarship, the essay shows how today's judges, legislators, policymakers and commentators continue to address questions that copyright and media law scholars have explored in the past decades.

Specifically, this essay focuses on two topics. The first topic concerns the exhaustion of distribution rights in computer software and other digital works, including regional exhaustion within the European Union. The second topic covers the …


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe May 2016

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores …


Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik Apr 2016

Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik

Eliza Mik

No abstract provided.


Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik Apr 2016

Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik

Eliza Mik

No abstract provided.


Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler Mar 2016

Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler

Gary C. Kessler

"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview


A Sustainable Music Industry For The 21st Century, Aloe Blacc, Irina D. Manta, David S. Olson Feb 2016

A Sustainable Music Industry For The 21st Century, Aloe Blacc, Irina D. Manta, David S. Olson

David S. Olson

This essay argues that the current system of music licensing must be completely overhauled. At this time, songwriters are paid a mere pittance when their work is played through Internet streaming services. The paper traces the evolution of compulsory licensing from the early 20th century, when Congress put this system in place due to concerns over the monopolization of the player piano industry, to today. This essay shows how the separation between copyrights for compositions as opposed to public performances contributed to blanket licensing through royalty-collecting organizations like ASCAP and BMI, which — together with government intervention into pricing based …


Trust And Social Commerce, Julia Y. Lee Feb 2016

Trust And Social Commerce, Julia Y. Lee

Julia Lee

Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace. The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …


Usage-Based Pricing, Zero-Rating, And The Future Of Broadband Innovation, Daniel A. Lyons Feb 2016

Usage-Based Pricing, Zero-Rating, And The Future Of Broadband Innovation, Daniel A. Lyons

Daniel Lyons

No abstract provided.


Title Ii Reclassification Is Rate Regulation, Daniel A. Lyons Feb 2016

Title Ii Reclassification Is Rate Regulation, Daniel A. Lyons

Daniel Lyons

No abstract provided.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit Jan 2016

Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit

Hezi Margalit

The last few decades have witnessed dramatic changes in the conceptualization and methodologies of determining legal parentage in the U.S. and other countries in the western world. Through various sociological shifts, growing social openness and bio-medical innovations, the traditional definitions of family and parenthood have been dramatically transformed. This transformation has led to an acute and urgent need for legal and social frameworks to regulate the process of determining legal parentage. Moreover, instead of progressing in a piecemeal, ad-hoc manner, the framework for determining legal parentage should be comprehensive. Only a comprehensive solution will address the differing needs of today’s …


From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit Jan 2016

From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit

Hezi Margalit

In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …


Fetishizing Copies, Jessica Litman Jan 2016

Fetishizing Copies, Jessica Litman

Jessica Litman

We have copyright laws to encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This …


Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally Dec 2015

Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally

William A. Herbert

We live and work in an era with the moniker of the New Gilded Age to describe the growth in societal income inequality. The designation is not limited to evidence of the growing gap in wealth distribution, but also the sharp rise in employment without security, including contingent and part-time work. This article examines the state of workplace procedural protections against discipline as they relate to employee use of social media in the New Gilded Age. In our times, reactions to the rapid distribution of troublesome electronic communications through social networking tend to eclipse patience for enforceable workplace procedures. The …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …