Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Social media

Institution
Publication Year
Publication
Publication Type

Articles 31 - 45 of 45

Full-Text Articles in Law

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione Jun 2015

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione

Pace Intellectual Property, Sports & Entertainment Law Forum

“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …


Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman May 2015

Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman

Pace Law Review

The focus of this article will be on what I call DMCA 2.0. It will begin by discussing the Digital Millennium Copyright Act (DMCA) and why that statute, passed in 1998 to shore up the enforceability of copyright online by protecting content providers’ ability to engage in forms of technological self-help against online copyright infringers, has been problematic. Part II describes largely unsuccessful efforts in the form of statutes and trade agreements to shore up the DMCA. Part III turns to the latest salvo, the adoption of “voluntary agreements” whereby content owners and ISPs, in particular social media platforms, join …


Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky May 2015

Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky

Pace Law Review

This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …


Anarchy, Status Updates, And Utopia, James Grimmelmann May 2015

Anarchy, Status Updates, And Utopia, James Grimmelmann

Pace Law Review

Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.

Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …


Keep Your Friends Close: A Framework For Addressing Rights To Social Media Contacts, Courtney J. Mitchel Oct 2014

Keep Your Friends Close: A Framework For Addressing Rights To Social Media Contacts, Courtney J. Mitchel

Vanderbilt Law Review

A group of entrepreneurial recent college graduates starts a tutoring and test prep company focused on helping promising high school students get an edge on their college applications. Since the cost of print advertising exceeds the group's budget, they each actively promote the business on their personal social media accounts, garnering their first clients. They also create company accounts on Facebook, Linkedln, and Twitter, which clients join for easy, direct communication and quick access to information. Though all the founders contribute occasional posts and encourage their personal social media contacts to join the company accounts, one eventually becomes, in practice …


Understanding Blogging And Copyright Infringement Within A Pinterest Generation, Ashley Mcalpin Apr 2014

Understanding Blogging And Copyright Infringement Within A Pinterest Generation, Ashley Mcalpin

Masters Theses

Copyright infringement within a Pinterest generation is growing at an alarming rate. This study sought to explain the phenomenon of stealing on Pinterest through a study of social interaction and perception thereof. The author found that the overall concept of interaction was widely misunderstood, along with the current copyright laws, leading to a broken sense of ethicality among the Pinterest generation. Through this study the impact of peer interaction, in compliance with the standards of Bandura's Social Learning theory (1977), was reviewed and found applicable to the Pinterest generation today. This study proved it relevant to further research the ethical …


Journalists, Social Media And Copyright: Demystifing Fair Use In The Emergent Digital Environment, Patricia Aufderheide Jan 2014

Journalists, Social Media And Copyright: Demystifing Fair Use In The Emergent Digital Environment, Patricia Aufderheide

Journal of Business & Technology Law

No abstract provided.


Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Jun 2013

Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.


Access Denied: How Social Media Accounts Fall Outside The Scope Of Intellectual Property Law And Into The Realm Of The Computer Fraud And Abuse Act, Tiffany Miao Apr 2013

Access Denied: How Social Media Accounts Fall Outside The Scope Of Intellectual Property Law And Into The Realm Of The Computer Fraud And Abuse Act, Tiffany Miao

Fordham Intellectual Property, Media and Entertainment Law Journal

This note addresses the challenge of applying intellectual property laws to determining ownership rights over social media accounts, specifically in the employer and employee context. This note suggests that IP regimes, namely Trademark, Copyright,and Trade Secrets, fail to provide an adequate framework for determining such ownership rights. Instead, this note proposes that the Computer Fraud and Abuse Act serves as a more appropriate legal framework.


Social Media In Sports: Can Professional Sports League Commissioners Punish 'Twackle Dummies'?, Daniel J. Friedman Apr 2012

Social Media In Sports: Can Professional Sports League Commissioners Punish 'Twackle Dummies'?, Daniel J. Friedman

Pace Intellectual Property, Sports & Entertainment Law Forum

Daniel J. Friedman writes an article discussing the rise and popularity in social media use by professional athletes. He then discusses some of the new problems that have arisen due to social media misuse and the power of the Commissioner to restrict and punish the players for misuse. The article culminates with a case study hypothetical related to content based social media misuse and whether the Commissioners of professional sports league can punish a player for the content of their social media messages.


Tweet Me Fairly: Finding Attribution Rights Through Fair Use In The Twittersphere, Adam S. Nelson Apr 2012

Tweet Me Fairly: Finding Attribution Rights Through Fair Use In The Twittersphere, Adam S. Nelson

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


E-Incitement: A Framework For Regulating The Incitement Of Criminal Flash Mobs, Hannah Steinblatt Apr 2012

E-Incitement: A Framework For Regulating The Incitement Of Criminal Flash Mobs, Hannah Steinblatt

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Struggling With Sunshine: Analyzing The Impact Of Technology On Compliance With Open Government Laws Using Florida As A Case Study, Sandra F. Chance, Christine M. Locke Dec 2010

Struggling With Sunshine: Analyzing The Impact Of Technology On Compliance With Open Government Laws Using Florida As A Case Study, Sandra F. Chance, Christine M. Locke

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung Dec 2010

Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung

Chicago-Kent Law Review

Within the past couple of years, social networking websites have become an immensely popular destination for people from all walks of life. Websites like Facebook and Twitter now count tens of millions of worldwide users, including world leaders and a number of celebrities. Eventually, users realized that social networking websites lent themselves to the quick and easy impersonation of celebrities through the creation of fake social networking accounts, often as a form of parody. One subject of such impersonation was professional baseball manager Tony La Russa, who took the then-unprecedented step of suing his impersonators and Twitter over the incident. …


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …