Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The Catholic University of America, Columbus School of Law (19)
- Schulich School of Law, Dalhousie University (17)
- University of Oklahoma College of Law (13)
- Southern Methodist University (12)
- University of Michigan Law School (11)
-
- American University Washington College of Law (8)
- Boston University School of Law (8)
- Selected Works (7)
- University of Maine School of Law (7)
- Fordham Law School (6)
- UIC School of Law (6)
- University of Richmond (6)
- Brooklyn Law School (5)
- Maurer School of Law: Indiana University (5)
- University of Colorado Law School (5)
- University of Pittsburgh School of Law (5)
- Columbia Law School (4)
- Duke Law (4)
- Singapore Management University (4)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (4)
- University of Rhode Island (4)
- William & Mary Law School (4)
- Loyola Marymount University and Loyola Law School (3)
- New York Law School (3)
- Pepperdine University (3)
- University of Maryland Francis King Carey School of Law (3)
- University of Missouri School of Law (3)
- University of Pennsylvania Carey Law School (3)
- Vanderbilt University Law School (3)
- Georgetown University Law Center (2)
- Keyword
-
- Internet (30)
- Privacy (27)
- Cybersecurity (12)
- Copyright (11)
- First Amendment (10)
-
- Technology (9)
- Social media (7)
- Fourth Amendment (6)
- Information (6)
- DMCA (5)
- Data (5)
- Liability (5)
- Security (5)
- Big data (4)
- Communications Decency Act (4)
- Digital (4)
- E-commerce (4)
- Facebook (4)
- Freedom of speech (4)
- Government surveillance (4)
- Human rights (4)
- Online (4)
- Regulation (4)
- Search (4)
- Sex trafficking (4)
- Sexual exploitation (4)
- Surveillance (4)
- Advertising (3)
- Bitcoin (3)
- Blockchain (3)
- Publication
-
- Catholic University Journal of Law and Technology (19)
- Faculty Scholarship (16)
- Canadian Journal of Law and Technology (13)
- Oklahoma Journal of Law and Technology (13)
- SMU Science and Technology Law Review (10)
-
- Articles (8)
- Maine Law Review (7)
- Fordham Law Review (6)
- American University Law Review (5)
- Publications (5)
- University of Richmond Law Review (5)
- All Faculty Scholarship (4)
- Boyd Briefs / Road Scholars (4)
- Dignity: A Journal of Analysis of Exploitation and Violence (4)
- Michigan Telecommunications & Technology Law Review (4)
- University of Michigan Journal of Law Reform (4)
- Articles & Chapters (3)
- Articles, Book Chapters, & Popular Press (3)
- Daniel Lyons (3)
- Indiana Law Journal (3)
- The Business, Entrepreneurship & Tax Law Review (3)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Articles in Law Reviews & Other Academic Journals (2)
- Brooklyn Journal of Corporate, Financial & Commercial Law (2)
- Brooklyn Law Review (2)
- Duke Law & Technology Review (2)
- Faculty Journal Articles and Book Chapters (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Indiana Journal of Global Legal Studies (2)
- Publication Type
Articles 1 - 30 of 216
Full-Text Articles in Law
Slipping Through The Cracks: How Digital Music Streaming Cuts Corners On Artists’ Royalty Revenues Globally, Frances Lewis
Slipping Through The Cracks: How Digital Music Streaming Cuts Corners On Artists’ Royalty Revenues Globally, Frances Lewis
Brooklyn Journal of International Law
At a time when the digital distribution of music is dominating the music industry, there are more music consumers than ever. This makes it vitally important for performing artists to receive the credit they are due. An inherent problem in music’s digital distribution market is that music streaming companies often fail to acquire proper licenses to expand their music libraries faster than their competitors. Performing artists who may not have the same income stream as their A-list counterparts often cannot bear the cost of litigation to pursue uncredited royalties. The U.S. class action model provides performing artists with a legal …
Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge
Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge
Brooklyn Journal of Corporate, Financial & Commercial Law
The Video Privacy Protection Act of 1988 (VPPA) creates a private cause of action for any consumer whose personally identifiable information has been disclosed by a video tape service provider to a third party. The rapid growth of media companies that provide free internet-based video-streaming services, and the technologically-advanced advertising methods employed to fund this business model, have created uncertainty regarding the specific consumer segments the VPPA is designed to protect. The extensive role that third-party providers play in the collection, analysis, and segmentation of user data in the personalized advertising process raises justifiable privacy concerns for consumers. Recent VPPA …
Something's Gotta Give: Origin-Based E-Commerce Sales Tax, Juliana Frenkel
Something's Gotta Give: Origin-Based E-Commerce Sales Tax, Juliana Frenkel
Brooklyn Journal of Corporate, Financial & Commercial Law
How to tax interstate online purchases is a frequently debated and contentious topic in the business and tax arena. There are numerous parties affected when a transaction occurs and each affected party would like a taxation policy that benefits its own economic interests, without regard for others. Neither the legislative nor the judicial branch has successfully resolved this e-commerce taxation issue. With the growing need for tax revenue, it is prudent for Congress to finally resolve this circuit split and agree on a unifying Online Sales Tax Law. As opposed to the vast majority of proposals pending in Congress, this …
Piracy, Policy, And Pandora: Outdated Copyright In A Digital World, Stephanie Caress
Piracy, Policy, And Pandora: Outdated Copyright In A Digital World, Stephanie Caress
Student Scholar Symposium Abstracts and Posters
This project examines how current copyright laws and digital distribution practices in music can be improved for both the creator and the consumer. The laws that govern our digital atmosphere, and thus a large portion of music distribution, are outdated and cause a wide variety of problems for both artists and fans. To create a comprehensive picture and establish the scope of this problem, I start by outlining the process a song goes through from when it is written to when it is in the hands, or rather ears, of listeners. From there, copyright laws are entwined with this process. …
"The Exclusive Right To Their Writings": Copyright And Control In The Digital Age, Jane C. Ginsburg
"The Exclusive Right To Their Writings": Copyright And Control In The Digital Age, Jane C. Ginsburg
Maine Law Review
The recent coincidence of new technology and new legislation in the United States may have enhanced the ability of U.S. copyright owners to wield electronic protective measures to control the exploitation of their works. The legislation, which reinforces the technology, has led many to perceive and to deplore a resulting imbalance between copyright owners and the copyright-using public. Critics assert that the goals of copyright law have never been, and should not now become, to grant “control” over works of authorship. Instead, copyright should accord certain limited rights over some kinds of exploitations. Economic incentives to create may be needed …
An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short
An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short
Maine Law Review
The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article …
Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky
Maine Law Review
Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …
Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen
Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen
Maine Law Review
The subject matter we are going to talk about is variously named and the words have some resonances of importance. I am going to use the phrase “Free Software” to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
All Faculty Scholarship
Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …
Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden
Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden
Akron Law Review
In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.
Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein
Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein
Maine Law Review
For those within the information technology (IT) industry, the phrase “open source” has been as prominent at water cooler and boardroom discussions over the last several years as the phrase “out source.” Open source is at once a software development model, a business model, a social movement, and a philosophy that has recently garnered attention from outside of the IT sphere. As such, the topic has become increasingly fertile ground for academic scholarship from several disciplines. Economists, legal academics and practitioners, computer engineers, and social commentators have offered their varying perspectives on open source software. Whether or not this attention …
New Wine, Old Wineskins: Emerging Issues In Internet-Based Personal Jurisdiction, Jeffrey Hunter Moon, Esq.
New Wine, Old Wineskins: Emerging Issues In Internet-Based Personal Jurisdiction, Jeffrey Hunter Moon, Esq.
The Catholic Lawyer
No abstract provided.
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
Popular Media
No abstract provided.
Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman
Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman
Michigan Telecommunications & Technology Law Review
Consumer reviews are vitally important to our modern economy. Markets become stronger and more efficient when consumers share their marketplace experiences and guide other consumers toward the best vendors and away from poor ones. Businesses recognize the importance of consumer reviews, and many businesses take numerous steps to manage how consumer reviews affect their public image. Unfortunately, in a misguided effort to control consumer reviews, some businesses have deployed contract provisions that ban or inhibit their consumers from reviewing them. I call those provisions “antireview clauses.”
Anti-review clauses distort the marketplace benefits society gets from consumer reviews by suppressing peer …
How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila
How Elonis Failed To Clarify The Analysis Of "True Threats" In Social Media Cases And The Subsequent Need For Congressional Response, Jessica L. Opila
Michigan Telecommunications & Technology Law Review
Social media and other internet communications have altered the way people communicate with one another, including the way people threaten one another. In 2015, the United States Supreme Court decided Elonis v. United States, which imposed a heightened mental state requirement for federal prosecutions of threats issued in interstate commerce. Although the statute, 18 U.S.C. § 875(c), has no mental state requirement, the Supreme Court held that, consistent with the principles of criminal law, only those with guilty minds should be convicted and thus some showing of subjective intent is required. The opinion did not name the requisite mental …
Property Rights In Augmented Reality, Declan T. Conroy
Property Rights In Augmented Reality, Declan T. Conroy
Michigan Telecommunications & Technology Law Review
Increasingly, cities, towns, and even rural communities are being slowly reshaped by a dynamic yet initially imperceptible phenomenon: the elaboration of augmented reality. Through applications that place virtual features over specific, real-world locations, layers of augmented reality are proliferating, adding new elements to an increasingly wide range of places. However, while many welcome the sudden appearance of arenas for battling digital creatures in their neighborhood or the chance to write virtual messages on their neighbor’s wall, the areas being augmented oftentimes are privately owned, thereby implicating property rights. Many intrusions, of course, are de minimis: an isolated, invisible Pikachu unexpectedly …
Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas
Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas
Michigan Telecommunications & Technology Law Review
The Digital Millennium Copyright Act (DMCA) has shaped the Internet as we know it. This legislation shields online service providers from secondary copyright infringement liability in exchange for takedown of infringing content of their users. Yet online payment processors, the backbone of $300 billion in U.S. e-commerce, are completely outside of the DMCA’s protection. This Article uses PayPal, the most popular online payment company in the U.S., to illustrate the growing risk of secondary liability for payment processors. First it looks at jurisprudence that expands secondary copyright liability online, and explains how it might be applied to PayPal. Then it …
The Evolution Of E-Commerce In Virginia Real Property Transactions, Ronald D. Wiley Jr.
The Evolution Of E-Commerce In Virginia Real Property Transactions, Ronald D. Wiley Jr.
University of Richmond Law Review
No abstract provided.
“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao
“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao
Fordham Law Review
The popularity of “esports,” also known as “electronic sports” or competitive video gaming, has exploded in recent years and captured the attention of cord-cutting millennials—often to the detriment of sports such as basketball, football, baseball, and hockey. In the United States, the commercial dominance of such traditional sports stems from decades of regulatory support. Consequently, while esports regulation is likely to emulate many aspects of traditional sports governance, the esports industry is fraught with challenges that inhibit sophisticated ownership and capital investment. Domestic regulation is complicated by underlying intellectual property ownership and ancillary considerations such as fluctuations in a video …
Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb
Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb
Fordham Law Review
Under the current interpretations of authorization, instances where an individual harmlessly accesses the cloud data of another user could be classified as hacking and a violation of this federal statute. As such, this Note demonstrates that all of the current interpretations of the CFAA are too broad because they could result in this nonsensical outcome. This Note accordingly proposes an amendment to the CFAA specifically addressing user access to data on the cloud. Such an amendment would eliminate the unusual result of innocuous cloud-computing users being deemed hackers under federal law.
Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble
Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble
Fordham Law Review
This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under the revised …
Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman
Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman
University of Michigan Journal of Law Reform
Yelp, Angie’s List, Avvo, and similar entities enable consumers to access an incredibly useful trove of information about peer experiences with businesses and their goods and services. These “mediated reputation systems,” gatherers and disseminators of consumer peer opinions, are more trusted by consumers than traditional commercial channels. They are omnipresent, carried everywhere on mobile devices, and used by consumers ready to transact.
Though this information is valuable, a troubling conflict emerges in its presentation. Most of these reputation platforms rely heavily on advertising sales to support their business models. This reliance compels these entities to display persuasive advertising right along …
Password Please: The Effectiveness Of New York's First-In-Nation Cybersecurity Regulation Of Banks, Melissa Knerr
Password Please: The Effectiveness Of New York's First-In-Nation Cybersecurity Regulation Of Banks, Melissa Knerr
The Business, Entrepreneurship & Tax Law Review
In March of 2017, New York enacted new cybersecurity legislation focused on regulating banking security. Cybersecurity attacks on the financial sector have risen recently and the federal and state governments are looking to combat data breaches. The regulations themselves strive to regulate security conduct by the financial institutions, including required testing and risk assessment, training for cybersecurity personnel, and mandated reporting to upperlevel staff as well as the New York Department of Financial Services. While these regulations are the first of their kind and strive to set in place certain basic requirements for cybersecurity, it remains to be seen how …
The Technology Requirements Of The First Electronic Monitoring Agreement In Us For Zappers, Phantomware, And Other Sales Suppression Devices, Richard Thompson Ainsworth, Robert Chicoine
The Technology Requirements Of The First Electronic Monitoring Agreement In Us For Zappers, Phantomware, And Other Sales Suppression Devices, Richard Thompson Ainsworth, Robert Chicoine
Faculty Scholarship
On August 30, 2017, a plea was entered in the case of case of State of Washington v. Wong, Wash. Super. Ct., No. 16-1-00179-0, and as a result the first electronic monitoring agreement of sales transactions in the US (the “Monitoring Agreement”) was legislatively imposed on a retail business.
The Monitoring Agreement was negotiated between the State of Washington Department of Revenue (the “WA DOR”) and the taxpayer over a period of several months and is comprised of two parts: the basic agreement, which covered the obligations and rights of the parties, and an appendix, which defines the scope of …
Search, Seizure, And Snapchat: How The Fourth Amendment Fits Within The Evolving World Of Civil E-Discovery, Anna Mcmullen
Search, Seizure, And Snapchat: How The Fourth Amendment Fits Within The Evolving World Of Civil E-Discovery, Anna Mcmullen
William & Mary Bill of Rights Journal
No abstract provided.
Three Strikes For Copyright, Jessica Silbey
Three Strikes For Copyright, Jessica Silbey
Faculty Scholarship
How should copyright law change to take account of the internet? Should copyright expand to plug the internet’s leakiness and protect content that the internet would otherwise make more freely available? Or, should copyright relax its strict liability regime given diverse and productive reuses in the internet age and the benefits networked diffusion provides users and second-generation creators? Answering these questions depends on what we think copyright is for and how it is used and confronted by creators and audiences. In a new article studying these questions in the very focused setting of Wikipedia articles about baseball and baseball players …
User-Friendly Taxpaying, Kathleen Delaney Thomas
User-Friendly Taxpaying, Kathleen Delaney Thomas
Indiana Law Journal
Technology is revolutionizing our lives. With the touch of a button or a simple voice command, we can instantly order groceries, get directions, or find the nearest sushi restaurant. Sensibly, the private sector has capitalized on these recent innovations to drive up profits. To sell more laundry detergent, Amazon now enables consumers to order refills by simply pressing the “dash button” mounted above their laundry machines. Starbucks lures more customers by allowing them to pre-order online and have their drink waiting when they arrive at the store. The theory behind this approach is simple: if you want someone to use …
"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin
"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin
Indiana Law Journal
This Note argues that courts should narrow the scope of examined speech and place little weight on the amount of media attention that the speech received. Although courts sometimes reject First Amendment protection on the Pickering balancing test instead of the public concern issue, the public concern requirement is a threshold issue that plays a critical role in successful First Amendment claims. Accordingly, courts need to revisit the public concern doctrine to ensure that its analysis is sound and yields the correct outcome.
Part I provides background concerning retaliation claims, criticism of the public concern requirement, and special issues that …
Guardians Of The Galaxy Of Personal Data: Assessing The Threat Of Big Data And Examining Potential Corporate And Governmental Solutions, Timothy A. Asta
Guardians Of The Galaxy Of Personal Data: Assessing The Threat Of Big Data And Examining Potential Corporate And Governmental Solutions, Timothy A. Asta
Florida State University Law Review
No abstract provided.
Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita
Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita
St. Mary's Journal on Legal Malpractice & Ethics
The use of electronic social communication has grown at a phenomenal rate. Facebook, the most popular social networking website, has over 1,968,000,000 users—a number that has exponentially grown since its inception in 2004. The number of judges accessing and using electronic social media (ESM) has also increased. However, unlike the general population, judges must consider constitutional, ethical, technical, and evidentiary implications when they use and access ESM. The First Amendment forbids “abridging the freedom of speech” and protects the expression of personal ideas, positions, and views. However, the American Bar Association’s Model Code of Judicial Conduct and the Texas Code …