Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 213

Full-Text Articles in Entire DC Network

Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills Dec 2016

Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills

Journal of Technology Law & Policy

In today's rapidly changing world of e-commerce, almost anything can be bought over the Internet and delivered right to your front door. Virtually every day there is news of yet another company selling some type of product online. Included in this barrage of products is prescription medication. Not only is it possible to order prescription medication over the Internet, in some cases it is not necessary to be examined, or even to consult with a physician. ~ To some, this new type of "cybermedicine" is an affront to traditional medicine, as well as potentially dangerous to consumers. In addition, the …


Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood Dec 2016

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood

Journal of Legislation

While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …


Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber Dec 2016

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


Defining Hate Speech, Andrew Sellars Dec 2016

Defining Hate Speech, Andrew Sellars

Faculty Scholarship

There is no shortage of opinions about what should be done about hate speech, but if there is one point of agreement, it is that the topic is ripe for rigorous study. But just what is hate speech, and how will we know it when we see it online? For all of the extensive literature about the causes, harms, and responses to hate speech, few scholars have endeavored to systematically define the term. Where other areas of content analysis have developed rich methodologies to account for influences like context or bias, the present scholarship around hate speech rarely extends beyond …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur Nov 2016

Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur

University of Massachusetts Law Review

Commercial website publishers use false and misleading information to create distrust of vaccines by claiming vaccines are ineffective and contain contaminants that cause autism and other disorders. The misinformation has resulted in decreased childhood vaccination rates and imperiled the public by allowing resurgence of vaccine-preventable illnesses. This Article argues that tort liability attaches to publishers of commercial websites for foreseeable harm that results when websites dissuade parents from vaccinating their children in favor of purchasing alternative products offered for sale on the websites.


Private Lawmaking In Commercial Cyberspace, Eliza Mik Nov 2016

Private Lawmaking In Commercial Cyberspace, Eliza Mik

Research Collection Yong Pung How School Of Law

No discussion of “Law and Technology” would be complete without at least one essay centred on the Internet. While the Internet no longer captures our imagination with the same force as it did 20 years ago, we cannot assume that it no longer creates (or perpetuates?) multiple legal problems. When we talk about the Internet we must, however, refrain from the popular “Internet metanarrative” that often leads to superficial arguments and unhelpful generalisations.1 We must always remain aware of the multiplicity of the Internet’s technical applications and the wide range of legal contexts in which the term gains significance. Discussing …


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano Oct 2016

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions …


Chapter Four: Information Security, Tracy Mitrano Oct 2016

Chapter Four: Information Security, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter One: Free Speech, Tracy Mitrano Oct 2016

Chapter One: Free Speech, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Two: Privacy, Tracy Mitrano Oct 2016

Chapter Two: Privacy, Tracy Mitrano

Tracy Mitrano

"Free speech" and "privacy" operate as integral, essential supporting values that underpin the missions of colleges and universities in the United States. Chapter One focused attention on free speech. Many of the same arguments could be made by and for privacy. It would be interesting to subject the same content about free speech to a global "find and replace" function for the applicable legal and policy points between them! Nonetheless, US law separates these two areas. Therefore, this chapter will focus on privacy law in particular: government surveillance and consumer privacy. Both subsets of privacy law, I will argue, have …


Chapter Three: Intellectual Property, Tracy Mitrano Oct 2016

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Conclusion, Tracy Mitrano Oct 2016

Conclusion, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley Oct 2016

Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley

Journal of Intellectual Property Law

No abstract provided.


Privatization Of The Judiciary, Eldar Haber Oct 2016

Privatization Of The Judiciary, Eldar Haber

Seattle University Law Review

The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …


A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard Oct 2016

A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard

Seattle University Law Review

While various courts and numerous legal professionals have addressed the issue of inconsistent application of personal jurisdiction in cyberspace cases, the Supreme Court has yet to discuss the impact that technology might have on the analysis of personal jurisdiction; thus, many details remain unresolved. This Note examines the varying jurisdictional splits between the lower district courts, the courts of appeals, and the federal circuit court of appeals in determining the proper approach to take when dealing with Internet jurisdiction. After an examination of several key cases, this Note will explain why the Supreme Court, or the Legislature, should adopt an …


Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle Oct 2016

Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle

Villanova Law Review

No abstract provided.


Pornography As Pollution, John C. Nagle Oct 2016

Pornography As Pollution, John C. Nagle

John Copeland Nagle

Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …


The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise Oct 2016

The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise

Journal of Intellectual Property Law

No abstract provided.


Internet Payment Blockades, Annemarie Bridy Oct 2016

Internet Payment Blockades, Annemarie Bridy

Florida Law Review

Internet payment blockades are an attempt to enforce intellectual property rights by “following the money” that flows to online merchants who profit from piracy and counterfeiting. Where corporate copyright and trademark owners failed in the legislature and the judiciary to create binding public law requiring payment processors like MasterCard and Visa to act as intellectual property enforcers, “non-regulatory” intervention from the executive branch secured their cooperation as a matter of private ordering. The resulting voluntary best practices agreement prescribes a notice-and-termination protocol that extends the reach of U.S. intellectual property law into cyberspace, to merchants operating “foreign infringing sites.” It …


Consumers’ Obsession Becoming Retailers’ Possession: The Way That Retailers Are Benefiting From Consumers’ Presence On Social Media, Vivian Adame Oct 2016

Consumers’ Obsession Becoming Retailers’ Possession: The Way That Retailers Are Benefiting From Consumers’ Presence On Social Media, Vivian Adame

San Diego Law Review

Retailers can profit from consumers’ social media presence in two ways: (1) through inadequate privacy laws; and (2) through retailers’ reposting of consumers intellectual property uploaded to social media sites. The California Legislature passed the Online Privacy Protection Act (CalOPPA), which moved towards protecting the privacy rights of consumers. However, the Legislature’s inability to hold retailers accountable under CalOPPA leaves consumers susceptible to the invasive technologies retailers use to collect social media users’ information, which they in turn sell and profit from. To better protect consumers on social media, the legislature should first enact a privacy law restricting retailers’ and …


Multi-Stakeholder Approach Needed To Tackle Cyberthreats, Tan K. B. Eugene Oct 2016

Multi-Stakeholder Approach Needed To Tackle Cyberthreats, Tan K. B. Eugene

Research Collection Yong Pung How School Of Law

Being a hyper-connected society, our national security is also increasingly being redefined by threats in the cyberspace. Cyberattacks have evolved from a nontraditional security threat to a new domain of intense conflict, involving deception and sabotage.


Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown Oct 2016

Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown

Loyola of Los Angeles Entertainment Law Review

No abstract provided.


How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim Oct 2016

How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim

Washington Journal of Law, Technology & Arts

In passing the Communications Decency Act of 1996 (CDA), Congress sought to promote and protect the ever-evolving free market of voices and ideas available on the internet. In order to reach this end, section 230(c) of the CDA extends protection from liability to those who provide a means for disseminating speech on the web, dubbed by the statute as “interactive computer service providers” (ICSP). Section 230 protects ICSPs from liability for harm inflicted by content created and posted by third parties on their respective forums. This Article focuses on a 2015 Washington State Supreme Court decision, J.S. v. Village Voice …


Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril Oct 2016

Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril

Management Faculty Publications and Presentations

Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …


Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow Oct 2016

Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow

Loyola of Los Angeles Law Review

No abstract provided.