Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus Mar 2016

Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus

Journal of Intellectual Property Law

No abstract provided.


Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies Feb 2016

Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies

Journal of Intellectual Property Law

No abstract provided.


I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph Feb 2016

I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph

Journal of Intellectual Property Law

No abstract provided.


Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow Feb 2016

Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow

Journal of Intellectual Property Law

No abstract provided.


Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael Jan 2016

Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael

Georgia Law Review

In a world where vast amounts of personal information
are obtained and stored by countless organizations and
businesses in the public and private sector, data breaches,

due to negligence or nefarious hacking, are a far too
common occurrence. The results of a data breach can be
serious and widespread, from public humiliation to
identity theft and national security crises. In an effort to
protect consumers from the potentially devastating effects
of data breaches, the Federal Trade Commission has
begun to take enforcement action against businesses whose
data security practices are alleged to be unfair and
deceptive. Theoretically, states can take …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick Jan 2016

All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick

Georgia Law Review

In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …


Managing Cyber Risks, Kristin N. Johnson Jan 2016

Managing Cyber Risks, Kristin N. Johnson

Georgia Law Review

Cyber risks are as pervasive as the technology that facilitates their execution. The threat of cyber attacks or plots to deploy cyber weapons against critical government entities, private businesses and domestic and international infrastructure resources creates a most significant risk management concern. Pernicious,perilous and ubiquitous, cyber risks have merged as the newest risk management frontier. While the consequences of cyber attacks against individual financial institutions may be alarming, the interconnectedness of the largest financial institutions in the global economy and their shared dependence on technology render these businesses and the systems that execute their transactions shockingly vulnerable. Because of the …