Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

PDF

Fordham Law School

Journal

Keyword
Publication Year
Publication

Articles 31 - 51 of 51

Full-Text Articles in Law

“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao Nov 2017

“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao

Fordham Law Review

The popularity of “esports,” also known as “electronic sports” or competitive video gaming, has exploded in recent years and captured the attention of cord-cutting millennials—often to the detriment of sports such as basketball, football, baseball, and hockey. In the United States, the commercial dominance of such traditional sports stems from decades of regulatory support. Consequently, while esports regulation is likely to emulate many aspects of traditional sports governance, the esports industry is fraught with challenges that inhibit sophisticated ownership and capital investment. Domestic regulation is complicated by underlying intellectual property ownership and ancillary considerations such as fluctuations in a video …


Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb Nov 2017

Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb

Fordham Law Review

Under the current interpretations of authorization, instances where an individual harmlessly accesses the cloud data of another user could be classified as hacking and a violation of this federal statute. As such, this Note demonstrates that all of the current interpretations of the CFAA are too broad because they could result in this nonsensical outcome. This Note accordingly proposes an amendment to the CFAA specifically addressing user access to data on the cloud. Such an amendment would eliminate the unusual result of innocuous cloud-computing users being deemed hackers under federal law.


Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble Nov 2017

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble

Fordham Law Review

This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under the revised …


The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister Apr 2017

The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister

Fordham Law Review

In recent years, malevolent actors have seized upon a new tool to harass, silence, threaten, and injure people online: doxing—the malicious publication of personal identifying information like a home address. Although doxing is an online tool, it causes concrete and serious harm to victims by moving harassment from the Internet to the physical world. Congress and state legislatures have begun to address different forms of cyberharassment. However, no effective and consistent legal remedy for doxing currently exists. This Note examines and critiques current federal and state schemes, and it ultimately proposes that lower federal courts should adopt a new intent …


The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister Apr 2017

The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister

Fordham Law Review

In recent years, malevolent actors have seized upon a new tool to harass, silence, threaten, and injure people online: doxing—the malicious publication of personal identifying information like a home address. Although doxing is an online tool, it causes concrete and serious harm to victims by moving harassment from the Internet to the physical world. Congress and state legislatures have begun to address different forms of cyberharassment. However, no effective and consistent legal remedy for doxing currently exists. This Note examines and critiques current federal and state schemes, and it ultimately proposes that lower federal courts should adopt a new intent …


Updating The Social Network: How Outdated And Unclear State Legislation Violates Sex Offenders’ First Amendment Rights, Elizabeth Tolon Mar 2017

Updating The Social Network: How Outdated And Unclear State Legislation Violates Sex Offenders’ First Amendment Rights, Elizabeth Tolon

Fordham Law Review

Readily available on computers, phones, tablets, or television, social media has become a necessary platform of expression for many. But, for others, social media is an inaccessible tool whose very use has criminal repercussions. To protect innocent children, many states have enacted legislation restricting sex offenders’ access to social media. Unfortunately, this legislation is often outdated, overly restrictive, and unconstitutional under the First Amendment. North Carolina has recently attracted national attention, as its statute highlights the potential constitutional issues states face in drafting such legislation. To avoid the constitutional concerns that North Carolina faces, state legislators must draft statutes narrowly …


Public Transit Data Through An Intellectual Property Lens: Lessons About Open Data, Teresa Scassa Mar 2016

Public Transit Data Through An Intellectual Property Lens: Lessons About Open Data, Teresa Scassa

Fordham Urban Law Journal

This Article examines some of the challenges presented by the transition from ‘closed’ to open data within the municipal context, using municipal transit data as a case study. The particular lens through which this Article examines these challenges is intellectual property law. In a ‘closed data’ system, intellectual property law is an important means by which legal control over data is asserted by governments and their agencies. In an ‘open data’ context, the freedom to use and distribute content is a freedom from IP constraints. The evolution of approaches to open municipal transit data offers some interesting examples of the …


The Urban Microgrid: Smart Legal And Regulatory Policies To Support Electric Grid Resilienccy And Climate Mitigation, Kevin B. Jones, Sylvia J.S. Bartell, Daniel Nugent, Jonathan Hart Mar 2016

The Urban Microgrid: Smart Legal And Regulatory Policies To Support Electric Grid Resilienccy And Climate Mitigation, Kevin B. Jones, Sylvia J.S. Bartell, Daniel Nugent, Jonathan Hart

Fordham Urban Law Journal

No abstract provided.


"Smart Cities" Meet "Anchor Institutions": The Case For Broadband And The Public Library, Ellen P. Goodman Mar 2016

"Smart Cities" Meet "Anchor Institutions": The Case For Broadband And The Public Library, Ellen P. Goodman

Fordham Urban Law Journal

No abstract provided.


Sharing The Road: Smart Transportation Infrastructure, Dorothy J. Glancy Mar 2016

Sharing The Road: Smart Transportation Infrastructure, Dorothy J. Glancy

Fordham Urban Law Journal

Smart cities require smart transportation. Advanced Intelligent Transportation Systems provide ever-smarter transportation infrastructure for the United States and countries around the world. Among the most advance forms of ground transportation infrastructure is a group of technologies that connect vehicles invisibly to other vehicles through information exchanges. These advanced transportation technologies are of two types: On the one hand, Connected Vehicle Safety Systems use vehicle-to-vehicle dedicated short range communications technologies. On the other hand, Connected Vehicle Mobility Applicatoins use a muhc wider variety of mobile wireless technologies. These two types of technolofies that connect vehicles will increasingly make existing physical infrastructure …


Welcome To The Metropticon: Protecting Privacy In A Hyperconnected Town, Kelsey Finch, Omer Tene Mar 2016

Welcome To The Metropticon: Protecting Privacy In A Hyperconnected Town, Kelsey Finch, Omer Tene

Fordham Urban Law Journal

No abstract provided.


Democratic Deliberation In The Wild: The Mcgill Online Design Studio And The Regulation Room Project, Cynthia Farina, Hoi Kong, Cheryl Blake, Mary Newhart Mar 2016

Democratic Deliberation In The Wild: The Mcgill Online Design Studio And The Regulation Room Project, Cynthia Farina, Hoi Kong, Cheryl Blake, Mary Newhart

Fordham Urban Law Journal

Although there is no single unified conception of deliberative democracy, the generally accepted core thesis is that democratic legitimacy comes from authentic deliberation on the part of those affected by a collective decision. This deliberation must occur under conditions of equality, broadmindedness, reasonableness, and inclusion. In exercises such as National Issue forums, citizen juries, and consensus conferences, deliberative practitioners have shown that careful attention to process design can enable ordinary citizens to engage in meaningful deliberation about difficult public policy issues. Typically, however, these are closed exercises—that is, they involve a limited number of participants, often selected to achieve a …


Smart Law For Smart Cities, Annie Decker Mar 2016

Smart Law For Smart Cities, Annie Decker

Fordham Urban Law Journal

No abstract provided.


Government-Provided Internet Access: Terms Of Service As Speech Rules, Enrique Armijo Mar 2016

Government-Provided Internet Access: Terms Of Service As Speech Rules, Enrique Armijo

Fordham Urban Law Journal

No abstract provided.


Securing The Smart Grid: Protecting National Security And Privacy Through Mandatory, Enforcable Interoperability Standards, Christopher Bosch Mar 2016

Securing The Smart Grid: Protecting National Security And Privacy Through Mandatory, Enforcable Interoperability Standards, Christopher Bosch

Fordham Urban Law Journal

No abstract provided.


The Commercial Sexual Exploiutation Of Minors, The First Amendment, And Freedom: Why Backpage.Com Should Be Prevented From Selling America's Children For Sex, Anna Makatche Mar 2016

The Commercial Sexual Exploiutation Of Minors, The First Amendment, And Freedom: Why Backpage.Com Should Be Prevented From Selling America's Children For Sex, Anna Makatche

Fordham Urban Law Journal

No abstract provided.


Free And Open Source Software In Municipal Procurement:The Challenges And Benefits Of Cooperation, Justin C. Colannino Feb 2016

Free And Open Source Software In Municipal Procurement:The Challenges And Benefits Of Cooperation, Justin C. Colannino

Fordham Urban Law Journal

The use of free and open source software by municipal governments is the exception rather than the rule. This is due to a variety of factors, including a failure of many municipal procurement policies to take into account the benefits of free software, free software vendors second-to-market status, and a lack of established free and open source software vendors in niche markets. With feasible policy shifts to improve city operations, including building upon open standards and engaging with free software communities, municipalities may be able to better leverage free and open source software to realize fully the advantages that stem …


Stay Tuned: Whether Cloud-Based Service Providers Can Have Their Copyrighted Cake And Eat It Too, Amanda Asaro Nov 2014

Stay Tuned: Whether Cloud-Based Service Providers Can Have Their Copyrighted Cake And Eat It Too, Amanda Asaro

Fordham Law Review

Copyright owners have the exclusive right to perform their works publicly and the ability to license their work to others who want to share that right. Subsections 106(4) and (5) of the Copyright Act govern this exclusive public performance right, but neither subsection elaborates on what constitutes a performance made “to the public” versus one that remains private. This lack of clarity has made it difficult for courts to apply the Copyright Act consistently, especially in the face of changing technology.

Companies like Aereo, Inc. and AereoKiller, Inc. developed novel ways to transmit content over the internet to be viewed …


Inherit The Cloud: The Role Of Private Contracts In Distributing Or Deleting Digital Assets At Death, Natalie M. Banta Nov 2014

Inherit The Cloud: The Role Of Private Contracts In Distributing Or Deleting Digital Assets At Death, Natalie M. Banta

Fordham Law Review

We live in a world permeated with technology. Through our online accounts we write emails, we store pictures, videos, and documents, we pay bills and conduct financial transactions, we buy digital books and music, and we manage loyalty programs. Digital assets have quickly replaced physical letters, pictures, books, compact discs, and documents stored in filing cabinets and shoeboxes. The emergence of digital assets raises pressing questions regarding the treatment of digital assets at an account holder’s death. Unlike digital assets’ physical counterparts, an account holder does not control the ultimate fate of digital assets. Instead, digital assets are controlled by …


America’S Bad Bet: How The Unlawful Internet Gambling Enforcement Act Of 2006 Will Hurt The House, Peterpaul Shaker J.D. Jan 2007

America’S Bad Bet: How The Unlawful Internet Gambling Enforcement Act Of 2006 Will Hurt The House, Peterpaul Shaker J.D.

Fordham Journal of Corporate & Financial Law

No abstract provided.


Is Coppa A Cop Out? The Child Online Privacy Protection Act As Proof That Parents, Not Government, Should Be Protecting Children's Interests On The Internet, Melanie L. Hersh Jan 2001

Is Coppa A Cop Out? The Child Online Privacy Protection Act As Proof That Parents, Not Government, Should Be Protecting Children's Interests On The Internet, Melanie L. Hersh

Fordham Urban Law Journal

This Note first presents a historical background of media regulations protecting children, and introduces COPPA. Next, it presents the arguments fueling the debate about who should regulate the Internet - the government or non-government entities. It then argues that in light of COPPA's shortcomings and faulty attempts to emulate regulations of other media, the government should step back and allow parents to maintain the bulk of regulatory responsibility. Finally, it suggests a future course of action for successfully regulating the Internet to protect children's privacy while taking into account the Internet's dissimilarity to previously regulated media. This Note concludes that …