Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (3)
- Computer networks (2)
- Computer servers (2)
- Search warrants (2)
- Searches (2)
-
- Seizures (2)
- Sovereignty (2)
- Websites (2)
- Access to information (1)
- Censorship (1)
- Choice-of-law (1)
- Consumers (1)
- Cybercrimes (1)
- Data security (1)
- Disclaimers (1)
- Electronic Communications Privacy Act (1)
- Electronic commerce (1)
- Email (1)
- Federal Wiretap Act (1)
- Filtering (1)
- Foreign nationals (1)
- Freedom of speech (1)
- Hate speech (1)
- History (1)
- Industries (1)
- Information (1)
- LICRA v. Yahoo! (1)
- Liability (1)
- Mail (1)
- Misrepresentation (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young
Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young
Michigan Telecommunications & Technology Law Review
This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …
The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky
The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky
Michigan Telecommunications & Technology Law Review
I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Michigan Telecommunications & Technology Law Review
The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin
Michigan Telecommunications & Technology Law Review
The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …