Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Law
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Michigan Journal of International Law
The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Cynthia R. Farina
This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …
Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern
Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern
Catholic University Law Review
In an ever-changing technological landscape, strictly adhering to the language and definitions of the Copyright Act in cases involving emerging technologies may contravene the purpose and intent of copyright law. However, the Supreme Court’s 2014 opinion in American Broadcasting Cos. v. Aereo Inc. puts forth a commercial interest rationale that suggests copyright infringers may no longer be able to avoid liability based on perceived technological loopholes that have typically absolved online infringers of infringement liability. This Note argues that Aereo’s commercial interest rationale paves the way for a new approach to technologically complex copyright cases, particularly where in-line linking …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Anarchy, Status Updates, And Utopia, James Grimmelmann
Anarchy, Status Updates, And Utopia, James Grimmelmann
Pace Law Review
Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.
Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Copyright, Consumerism, And The Cloud: Proposing Standards-Essential Technology To Support First Sale In Digital Copyright, Marco Puccia
Copyright, Consumerism, And The Cloud: Proposing Standards-Essential Technology To Support First Sale In Digital Copyright, Marco Puccia
Seattle University Law Review
America’s entertainment industry, and the creative talent that drives it, is a national treasure. Equally valuable, however, is America’s drive and commitment toward technological innovation. These two sectors have been in tension since at least 1908, when the U.S. Supreme Court was asked to determine whether the makers of piano rolls for automatically playing pianos had to pay royalties to the composers. Since that time, the entertainment industry has continued to use copyright law to resist advances in technological innovation that it views as a threat to its existing business models. This Note seeks to provide the necessary context and …
Buying Teams, Andres Sawicki
Buying Teams, Andres Sawicki
Seattle University Law Review
The Sixth Annual Berle Symposium reflects on Margaret Blair and Lynn Stout’s classic article: A Team Production Theory of Corporate Law. Blair and Stout recast the modern law of public corporations through the lens of the team production theory of the firm. Here, I apply Blair and Stout’s insights—emphasizing the value of team production, independent monitors, and intellectual property rights—to a novel corporate transaction structure: the acqui-hire. In an acqui-hire, a publicly owned technology firm wants to add a start-up’s engineers. Instead of simply hiring them, though, it buys the start-up, discards most of its assets, and retains the start-up’s …