Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (29)
- UIC School of Law (17)
- Schulich School of Law, Dalhousie University (15)
- Brooklyn Law School (12)
- Fordham Law School (11)
-
- University of Georgia School of Law (9)
- The Catholic University of America, Columbus School of Law (8)
- American University Washington College of Law (6)
- University of Maryland Francis King Carey School of Law (6)
- Case Western Reserve University School of Law (5)
- SelectedWorks (5)
- University of Michigan Law School (5)
- University of Richmond (5)
- Maurer School of Law: Indiana University (4)
- Seattle University School of Law (4)
- University of Pennsylvania Carey Law School (4)
- University of Pittsburgh School of Law (4)
- University of Washington School of Law (4)
- Loyola Marymount University and Loyola Law School (3)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (3)
- Vanderbilt University Law School (3)
- Villanova University Charles Widger School of Law (3)
- Boston University School of Law (2)
- Brigham Young University Law School (2)
- Columbia Law School (2)
- Cornell University Law School (2)
- Duke Law (2)
- Florida A&M University College of Law (2)
- Pepperdine University (2)
- Singapore Management University (2)
- Keyword
-
- Privacy (17)
- Internet (16)
- First Amendment (11)
- Intellectual property (8)
- Copyright (7)
-
- Law and Technology (7)
- Facebook (6)
- Science and Technology (6)
- Technology (6)
- Free speech (5)
- Governance (5)
- NSA (5)
- Social media (5)
- Surveillance (5)
- Cyberlaw (4)
- Data (4)
- Google (4)
- Health Law and Policy (4)
- Law and Society (4)
- Public Law and Legal Theory (4)
- Snowden (4)
- Social Media (4)
- Advertising (3)
- Amazon (3)
- Bitcoin (3)
- Civil Rights and Discrimination (3)
- Constitutional Law (3)
- Cryptocurrency (3)
- Cybercrime (3)
- Cyberspace (3)
- Publication
-
- Canadian Journal of Law and Technology (13)
- UIC John Marshall Journal of Information Technology & Privacy Law (13)
- Fordham Urban Law Journal (11)
- Faculty Scholarship (10)
- Catholic University Journal of Law and Technology (8)
-
- Tracy Mitrano (7)
- All Faculty Scholarship (5)
- Journal of Intellectual Property Law (5)
- Journal of Law, Technology, & the Internet (5)
- Richmond Journal of Law & Technology (5)
- Georgia Law Review (4)
- Maryland Law Review (4)
- Seattle University Law Review (4)
- American University National Security Law Brief (3)
- Book Chapters (3)
- Brooklyn Journal of Corporate, Financial & Commercial Law (3)
- Brooklyn Journal of International Law (3)
- Brooklyn Law Review (3)
- Faculty Publications (3)
- Indiana Law Journal (3)
- UIC Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Villanova Law Review (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Articles, Book Chapters, & Popular Press (2)
- BYU Law Review (2)
- Cornell Law Faculty Publications (2)
- Daniel Lyons (2)
- Edward Lee (2)
- Publication Type
- File Type
Articles 1 - 30 of 213
Full-Text Articles in Entire DC Network
Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills
Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills
Journal of Technology Law & Policy
In today's rapidly changing world of e-commerce, almost anything can be bought over the Internet and delivered right to your front door. Virtually every day there is news of yet another company selling some type of product online. Included in this barrage of products is prescription medication. Not only is it possible to order prescription medication over the Internet, in some cases it is not necessary to be examined, or even to consult with a physician. ~ To some, this new type of "cybermedicine" is an affront to traditional medicine, as well as potentially dangerous to consumers. In addition, the …
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Journal of Legislation
While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …
Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber
Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber
Brooklyn Law Review
No abstract provided.
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera
The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera
St. Mary's Journal on Legal Malpractice & Ethics
This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
Defining Hate Speech, Andrew Sellars
Defining Hate Speech, Andrew Sellars
Faculty Scholarship
There is no shortage of opinions about what should be done about hate speech, but if there is one point of agreement, it is that the topic is ripe for rigorous study. But just what is hate speech, and how will we know it when we see it online? For all of the extensive literature about the causes, harms, and responses to hate speech, few scholars have endeavored to systematically define the term. Where other areas of content analysis have developed rich methodologies to account for influences like context or bias, the present scholarship around hate speech rarely extends beyond …
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur
Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur
University of Massachusetts Law Review
Commercial website publishers use false and misleading information to create distrust of vaccines by claiming vaccines are ineffective and contain contaminants that cause autism and other disorders. The misinformation has resulted in decreased childhood vaccination rates and imperiled the public by allowing resurgence of vaccine-preventable illnesses. This Article argues that tort liability attaches to publishers of commercial websites for foreseeable harm that results when websites dissuade parents from vaccinating their children in favor of purchasing alternative products offered for sale on the websites.
Private Lawmaking In Commercial Cyberspace, Eliza Mik
Private Lawmaking In Commercial Cyberspace, Eliza Mik
Research Collection Yong Pung How School Of Law
No discussion of “Law and Technology” would be complete without at least one essay centred on the Internet. While the Internet no longer captures our imagination with the same force as it did 20 years ago, we cannot assume that it no longer creates (or perpetuates?) multiple legal problems. When we talk about the Internet we must, however, refrain from the popular “Internet metanarrative” that often leads to superficial arguments and unhelpful generalisations.1 We must always remain aware of the multiplicity of the Internet’s technical applications and the wide range of legal contexts in which the term gains significance. Discussing …
Introduction, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Tracy Mitrano
Chapter Four: Information Security, Tracy Mitrano
Chapter One: Free Speech, Tracy Mitrano
Chapter Two: Privacy, Tracy Mitrano
Chapter Two: Privacy, Tracy Mitrano
Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Tracy Mitrano
No abstract provided.
Conclusion, Tracy Mitrano
Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley
Journal of Intellectual Property Law
No abstract provided.
Privatization Of The Judiciary, Eldar Haber
Privatization Of The Judiciary, Eldar Haber
Seattle University Law Review
The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …
A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard
A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard
Seattle University Law Review
While various courts and numerous legal professionals have addressed the issue of inconsistent application of personal jurisdiction in cyberspace cases, the Supreme Court has yet to discuss the impact that technology might have on the analysis of personal jurisdiction; thus, many details remain unresolved. This Note examines the varying jurisdictional splits between the lower district courts, the courts of appeals, and the federal circuit court of appeals in determining the proper approach to take when dealing with Internet jurisdiction. After an examination of several key cases, this Note will explain why the Supreme Court, or the Legislature, should adopt an …
Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle
Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle
Villanova Law Review
No abstract provided.
Pornography As Pollution, John C. Nagle
Pornography As Pollution, John C. Nagle
John Copeland Nagle
Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
Journal of Intellectual Property Law
No abstract provided.
Internet Payment Blockades, Annemarie Bridy
Internet Payment Blockades, Annemarie Bridy
Florida Law Review
Internet payment blockades are an attempt to enforce intellectual property rights by “following the money” that flows to online merchants who profit from piracy and counterfeiting. Where corporate copyright and trademark owners failed in the legislature and the judiciary to create binding public law requiring payment processors like MasterCard and Visa to act as intellectual property enforcers, “non-regulatory” intervention from the executive branch secured their cooperation as a matter of private ordering. The resulting voluntary best practices agreement prescribes a notice-and-termination protocol that extends the reach of U.S. intellectual property law into cyberspace, to merchants operating “foreign infringing sites.” It …
Consumers’ Obsession Becoming Retailers’ Possession: The Way That Retailers Are Benefiting From Consumers’ Presence On Social Media, Vivian Adame
San Diego Law Review
Retailers can profit from consumers’ social media presence in two ways: (1) through inadequate privacy laws; and (2) through retailers’ reposting of consumers intellectual property uploaded to social media sites. The California Legislature passed the Online Privacy Protection Act (CalOPPA), which moved towards protecting the privacy rights of consumers. However, the Legislature’s inability to hold retailers accountable under CalOPPA leaves consumers susceptible to the invasive technologies retailers use to collect social media users’ information, which they in turn sell and profit from. To better protect consumers on social media, the legislature should first enact a privacy law restricting retailers’ and …
Multi-Stakeholder Approach Needed To Tackle Cyberthreats, Tan K. B. Eugene
Multi-Stakeholder Approach Needed To Tackle Cyberthreats, Tan K. B. Eugene
Research Collection Yong Pung How School Of Law
Being a hyper-connected society, our national security is also increasingly being redefined by threats in the cyberspace. Cyberattacks have evolved from a nontraditional security threat to a new domain of intense conflict, involving deception and sabotage.
Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown
Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown
Loyola of Los Angeles Entertainment Law Review
No abstract provided.
How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim
How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim
Washington Journal of Law, Technology & Arts
In passing the Communications Decency Act of 1996 (CDA), Congress sought to promote and protect the ever-evolving free market of voices and ideas available on the internet. In order to reach this end, section 230(c) of the CDA extends protection from liability to those who provide a means for disseminating speech on the web, dubbed by the statute as “interactive computer service providers” (ICSP). Section 230 protects ICSPs from liability for harm inflicted by content created and posted by third parties on their respective forums. This Article focuses on a 2015 Washington State Supreme Court decision, J.S. v. Village Voice …
Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril
Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril
Management Faculty Publications and Presentations
Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …
Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow
Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow
Loyola of Los Angeles Law Review
No abstract provided.