Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson Oct 2021

Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson

Seattle University Law Review SUpra

No abstract provided.


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer Mar 2014

The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer

Seattle University Law Review

Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …


Internet Voting With Initiatives And Referendums: Stumbling Towards Direct Democracy, Rebekah K. Browder Jan 2005

Internet Voting With Initiatives And Referendums: Stumbling Towards Direct Democracy, Rebekah K. Browder

Seattle University Law Review

Imagine that it is Tuesday, November 4, 2008, and you realize that you have not yet voted for the candidate that you want to be President of the United States. The polls close at 7 p.m., and it is already 6:45 p.m. Instead of rushing off to the nearest polling place, you simply go to your computer, log in, fill out a ballot, and email your ballot to your designated polling website. The whole process takes fewer than ten minutes, and you have done your civic duty. Leading proponents of Internet voting point to five possible benefits of electronic voting: …


Cybersmear Or Cyber-Slapp: Analyzing Defamation Suits Against Online John Does As Strategic Lawsuits Against Public Participation, Joshua R. Furman Jan 2001

Cybersmear Or Cyber-Slapp: Analyzing Defamation Suits Against Online John Does As Strategic Lawsuits Against Public Participation, Joshua R. Furman

Seattle University Law Review

This Comment will first survey the law of cybersmear, illustrating the paradigmatic issues and legal theories employed. Then, it will discuss the free speech issues and theoretical bases argued in court and legal journals, paying special attention to the shortcomings in current protection of defendant anonymity. Next, it will examine the value of online anonymity and the protections that the Strategic Lawsuit Against Public Participation (SLAPP) theory offers. Finally, given the breakdown in the public and private space dichotomy, this Comment will argue for a new understanding of the SLAPP constitutional protections in cyberspace. This understanding will recognize the powerful …


"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat Jan 2000

"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat

Seattle University Law Review

Although there are a wide array of unresolved trademark issues with regard to the Internet, this Comment will not address disputes involving anything beyond the visible content of an individual's website. Domain name and meta-tag issues, though often referenced in order to demonstrate trends in analysis, are not the subjects of this inquiry. Rather, this Comment will focus on the triumvirate of claims most frequently asserted against individual web masters in the battle over the propriety of consumer commentary: trademark infringement, unfair competition, and trademark dilution. A recent court decision, Bally Total Fitness v. Faber, provides an example of the …


Cyberspace And The "Devil's Hatband", Jonathan J. Rusch Jan 2000

Cyberspace And The "Devil's Hatband", Jonathan J. Rusch

Seattle University Law Review

In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …