Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Skating Past Liability Under The Tcpa: Robocalls And Unsolicited Texts And E-Mails, Julissa R. Rachor
Skating Past Liability Under The Tcpa: Robocalls And Unsolicited Texts And E-Mails, Julissa R. Rachor
Seattle University Law Review
This Note argues that the applicability of Telephone Consumer Protection Act's (TCPA) autodialer provision should be interpreted broadly to include calls made on many types of dialing equipment.
Part I of this Note offers a brief history of the TCPA and autodialers. Part II examines the FCC’s Orders that interpret the TCPA’s autodialer provision, and Part III assesses the varying interpretations of the provision by the circuit courts. Part IV reviews the general facts and procedural history of Duguid, and the Court’s interpretation of the autodialers provision. Last, Part V examines current efforts offered by Congress and potential next …
Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo
Revisiting The Enforceability Of Online Contracts: The Need For Unambiguous Assent To Inconspicuous Terms, Tom Mozingo
Seattle University Law Review
In determining the enforceability of online contracts, namely those formed from the use of smartphone applications, courts typically look to whether the contract terms were reasonably conspicuous or communicated to the consumer. With the rise of “browse-wrap” contracts, where terms are not directly communicated to the consumer or where the consumer is not required to click the equivalent of an “I agree” button clearly manifesting assent to the terms, courts have inconsistently applied the reasonable communicativeness standard to the detriment of consumers and application developers alike. This Comment will explore the development of browse-wrap contracting jurisprudence and the need to …
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner
Seattle University Law Review
This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …