Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Law

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon Jan 2022

Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon

Washington and Lee Law Review

In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.

This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …


Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter Oct 2020

Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter

Washington and Lee Journal of Civil Rights and Social Justice

You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.

Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.

Accordingly, the United States government has been …


To Protect Freedom Of Expression, Why Not Steal Victory From The Jaws Of Defeat?, Evelyn Mary Aswad Apr 2020

To Protect Freedom Of Expression, Why Not Steal Victory From The Jaws Of Defeat?, Evelyn Mary Aswad

Washington and Lee Law Review

Global social media platforms are grappling with whether to align their corporate speech codes with international human rights law. Facebook’s June 2019 report that summarized worldwide feedback about its proposed independent oversight board for content moderation noted a split in stakeholder opinions on this topic. The UN’s top expert on freedom of expression as well as many civil society members recommended that Facebook anchor its content moderation in the international human rights law regime. Others expressed concern that this legal regime would not be sufficiently protective of speech and contained inconsistencies that create problems for content moderation.

Those concerns were …


Taxation Of Electronic Gaming, Bryan T. Camp Apr 2020

Taxation Of Electronic Gaming, Bryan T. Camp

Washington and Lee Law Review

At a doctrinal level, the subject of this Article is timely. During this time of the coronavirus pandemic, casinos have been closed and large populations have been subject to stay-home orders from local and state authorities. One can reasonably expect a large increase in electronic gaming and thus an increased need for proper consideration of its taxation. This Article argues for a cash-out rule of taxation.

At a deeper level, the subject of this Article is timeless. Tax law is wickedly complex for a reason. This Article explores that complexity using the example of electronic gaming. It grapples with the …


Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick Nov 2019

Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick

Washington and Lee Law Review

Imagine you have decided to run for office, to speak out publicly against an injustice, to enter the job market, or even to join a new online forum. Now, imagine after starting your chosen endeavor, you go online to discover that someone who disagrees with your position posted your personal information on the internet and called for others to harass you. To make matters worse, you realize that you cannot determine who posted your personal data. You have been doxed. Because you cannot identify the person who posted your information, where can you turn for recourse? The next logical party …


A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman Jun 2009

A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman

Washington and Lee Law Review

No abstract provided.


Virtual Parentalism, Joshua A.T. Fairfield Jun 2009

Virtual Parentalism, Joshua A.T. Fairfield

Washington and Lee Law Review

Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.


Introduction [To The Symposium], Joan M. Shaughnessy Jun 2009

Introduction [To The Symposium], Joan M. Shaughnessy

Washington and Lee Law Review

No abstract provided.


Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer Jun 2009

Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer

Washington and Lee Law Review

No abstract provided.


Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske Jun 2009

Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske

Washington and Lee Law Review

Advances in virtual world technology pose risks for the safety and welfare of children. Those advances also alter the interpretations of key terms in applicable Laws. For example, in the Miller test for obscenity, virtual worlds constitute places, rather than "works," and may even constitute local communities from which standards are drawn. Additionally, technological advances promise to make virtual worlds places of such significant social benefit that regulators must take care to protect them, even as they protect children who engage with them.


Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger Jun 2009

Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger

Washington and Lee Law Review

No abstract provided.


Sex Play In Virtual Worlds, Robin Fretwell Wilson Jun 2009

Sex Play In Virtual Worlds, Robin Fretwell Wilson

Washington and Lee Law Review

No abstract provided.


Fertility And Virtual Reality, Edward Castronova Jun 2009

Fertility And Virtual Reality, Edward Castronova

Washington and Lee Law Review

No abstract provided.


Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam Jun 2009

Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam

Washington and Lee Law Review

As virtual worlds for children increase in popularity, it is important to examine their developmental implications. Given the limited research on this question, we use extant social science research on youth and digital media to understand how children 's participation in virtual worlds might mediate their development. We identify four different pathways by which new media can potentially mediate development. Then we review relevant research on video games, which, like virtual worlds, contain three-dimensional online fantasy worlds; we also review research on online communication forums, which are like virtual worlds in that they allow users to create online selves and …


Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman Jun 2009

Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman

Washington and Lee Law Review

No abstract provided.


Virtually Liable, Garrett Legerwood Mar 2009

Virtually Liable, Garrett Legerwood

Washington and Lee Law Review

No abstract provided.


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Sep 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Washington and Lee Law Review

When the Oscar-winning actress Julia Roberts fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developedfor these disputes are …


What Does Granholm V. Heald Mean For The Future Of The Twenty-First Amendment, The Three-Tier System, And Efficient Alcohol Distribution?, Gregory E. Durkin Jun 2006

What Does Granholm V. Heald Mean For The Future Of The Twenty-First Amendment, The Three-Tier System, And Efficient Alcohol Distribution?, Gregory E. Durkin

Washington and Lee Law Review

No abstract provided.


Search Engines And Internet Advertisers: Just One Click Away From Trademark Infringement?, Lauren Troxclair Jun 2005

Search Engines And Internet Advertisers: Just One Click Away From Trademark Infringement?, Lauren Troxclair

Washington and Lee Law Review

No abstract provided.


Internet Hate Speech: The European Framework And The Emerging American Haven, Christopher D. Van Blarcum Mar 2005

Internet Hate Speech: The European Framework And The Emerging American Haven, Christopher D. Van Blarcum

Washington and Lee Law Review

No abstract provided.


Private Harms In The Cyber-World: The Conundrum Of Choice Of Law For Defamation Posed By Gutnick V. Dow Jones & Co., Shawn A. Bone Jan 2005

Private Harms In The Cyber-World: The Conundrum Of Choice Of Law For Defamation Posed By Gutnick V. Dow Jones & Co., Shawn A. Bone

Washington and Lee Law Review

No abstract provided.


Defamation In The Digital Age: Some Comparative Law Observations On The Difficulty Of Reconciling Free Speech And Reputation In The Emerging Global Village, Ronald J. Krotoszynski, Jr. Jan 2005

Defamation In The Digital Age: Some Comparative Law Observations On The Difficulty Of Reconciling Free Speech And Reputation In The Emerging Global Village, Ronald J. Krotoszynski, Jr.

Washington and Lee Law Review

No abstract provided.


Pervasive Computing: Embedding The Public Sphere, Kang Lang, Dana Cuff Jan 2005

Pervasive Computing: Embedding The Public Sphere, Kang Lang, Dana Cuff

Washington and Lee Law Review

No abstract provided.


A Comment On Private Harms In The Cyber-World, Christopher Wolf Jan 2005

A Comment On Private Harms In The Cyber-World, Christopher Wolf

Washington and Lee Law Review

No abstract provided.


Deregulating Telecommunications In Internet Time, James B. Speta Jun 2004

Deregulating Telecommunications In Internet Time, James B. Speta

Washington and Lee Law Review

The Telecommunications Act of 1996 has yielded more litigation and less local competition than its supporters expected or intended. Calls for its reform are multiplying. In this Article, Professor Septa diagnoses the 1996 Act's failings and prescribes a framework for reform. The successful deregulations of the transportation industries and of long-distance telecommunications (precedents the 1996 Act sought to follow) demonstrate that the Act should have taken additional steps to promote intermodal telecommunications competition. Transportation deregulation successfully prompted competition where (as in the case of airlines and trucking) multiple firms could compete on an intramodal basis or where (as in the …


Applying Mcintyre V. Ohio Elections Commission To Anonymous Speech On The Internet And The Discovery Of John Doe's Identity, Caroline E. Strickland Sep 2001

Applying Mcintyre V. Ohio Elections Commission To Anonymous Speech On The Internet And The Discovery Of John Doe's Identity, Caroline E. Strickland

Washington and Lee Law Review

No abstract provided.


Technoliability: Corporate Websites, Hyperlinks, And Rule 10(B)-5, Mason Miller Jan 2001

Technoliability: Corporate Websites, Hyperlinks, And Rule 10(B)-5, Mason Miller

Washington and Lee Law Review

No abstract provided.


The Initial Interest Confusion Doctrine And Trademark Infringement On The Intemet, Byrce J. Maynard Sep 2000

The Initial Interest Confusion Doctrine And Trademark Infringement On The Intemet, Byrce J. Maynard

Washington and Lee Law Review

No abstract provided.


Are We Overprotecting Code? Thoughts On First-Generation Internet Law, Orin S. Kerr Sep 2000

Are We Overprotecting Code? Thoughts On First-Generation Internet Law, Orin S. Kerr

Washington and Lee Law Review

No abstract provided.