Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

2015

Institution
Keyword
Publication

Articles 31 - 60 of 171

Full-Text Articles in Law

Cyberspace: The Final Frontier, For Regulation?, Jay Krasovec Jul 2015

Cyberspace: The Final Frontier, For Regulation?, Jay Krasovec

Akron Law Review

This article will discuss the concept of anonymity on the Internet and argue for its protection. Part II provides background information on the Internet and illustrates the prominence the Internet has in today's global society. Part III discusses the concept of anonymity and its importance in our daily communications and how these principles necessarily extend to online communication. Part IV outlines the purported justifications for regulating Internet content, which is followed by Part V discussing current and attempted regulations of the Internet. This article then argues for the full protection of online anonymous speech as mandated by fundamental principles of …


Www.Obscenity.Com: An Analysis Of Obscenity And Indecency Regulation Of The Internet, Kelly M. Doherty Jul 2015

Www.Obscenity.Com: An Analysis Of Obscenity And Indecency Regulation Of The Internet, Kelly M. Doherty

Akron Law Review

This comment explores the constitutionality of federal regulations as applied to Internet content and alternatives to government regulation. Part II provides background on the Internet, First Amendment obscenity and indecency law as applied to communications media, and past and current legislation enacted to regulate Internet content. Part III analyzes the constitutionality of COPA, and discusses why other alternatives are more effective and preferable to government regulation. Part IV concludes that protecting children from harmful Internet content is the responsibility of parents, and therefore, Internet regulation should begin at home.


Copyright Tensions In A Digital Age, John D. Shuff, Geoffrey T. Holtz Jul 2015

Copyright Tensions In A Digital Age, John D. Shuff, Geoffrey T. Holtz

Akron Law Review

The rapid and exponential expansion of our ability to duplicate and disseminate information by digital means has rejuvenated inherent tensions in the law pertaining to copyright and has created some new ones. Not since the advent of radio in the early 1900s have such tensions come so squarely into focus. Even though courts are rarely, if ever, called upon to address certain of these tensions since the passage of the Copyright Act of 1976, they are being called upon to do so now


The Medium Is The Message: Copyright Law Confronts The Information Age In New York Times V. Tasini, Mark B. Radefeld Jul 2015

The Medium Is The Message: Copyright Law Confronts The Information Age In New York Times V. Tasini, Mark B. Radefeld

Akron Law Review

This Note analyzes the Supreme Court’s recent opinion in New York Times Co. v. Tasini and its implications for the future of copyright law and electronic publishing. Part II of this Note documents the background of copyright law, and details how the default provisions of §201(c) govern the publisher-author relationship. Part III of this Note introduces the parties and circumstances surrounding the Tasini case. Part III continues by outlining the District Court for the Southern District of New York, the Court of Appeals for the Second Circuit, and the Supreme Court decisions in this landmark case. Part IV of this …


Pole Position: National Cable & Telecommunications Ass'n V. Gulf Power Co. And The Implications Of The Fcc's Pole Attachments Act Reading Higher Ground, Darci Deltoro Jul 2015

Pole Position: National Cable & Telecommunications Ass'n V. Gulf Power Co. And The Implications Of The Fcc's Pole Attachments Act Reading Higher Ground, Darci Deltoro

Akron Law Review

Both high-speed Internet access via commingled cables and wireless communications are complex and cutting edge topics in today’s world of ever changing information technology. This Note examines how these issues were addressed recently in Nat’l Cable & Telecomms. Ass’n, Inc. v. Gulf Power Co. (Gulf Power). Part II of this Note provides a review of the Pole Attachments Act, focusing particularly on using the purpose behind the Act to establish the minimum and maximum limitations of its coverage. Part III discusses the factual and procedural history of the Gulf Power case, first addressing the Court of Appeals for the Eleventh …


United States V. American Library Association: The Choice Between Cash And Constitutional Rights, Barbara A. Sanchez Jul 2015

United States V. American Library Association: The Choice Between Cash And Constitutional Rights, Barbara A. Sanchez

Akron Law Review

This Note discusses the possibility that the Court, in its eagerness to protect children, twisted established First Amendment doctrines to uphold CIPA and declined to address other legal issues that weaken CIPA’s constitutionality. Part II provides a historical background of previous legislation attempting to protect children accessing the Internet, explains what CIPA is and compares it to previous legislation, and also discusses current filtering technology and its limitations. Part III provides a statement of the facts, including the procedural history of the case. Part IV analyzes the Court’s confusing and inconsistent application of firmly established rules dealing with Congress’ spending …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


The Case For Capsl: Architectural Solutions To Licensing And Distribution In Emerging Music Markets, Cody Duncan Jul 2015

The Case For Capsl: Architectural Solutions To Licensing And Distribution In Emerging Music Markets, Cody Duncan

Duke Law & Technology Review

Compulsory licensing in music has paved the way for a limited class of new noninteractive services. However, innovation and competition are stifled in the field of interactive or otherwise novel services due to high transaction costs inherent in direct licensing. While the creation of a new compulsory license available to a wider array of services may facilitate growth and diversity in new markets, it is unlikely that the legislative process can deliver a new compulsory regime in time to serve relevant interests. Furthermore, the risk exists that legislation written in response to contemporary technology will likely fail to recognize the …


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner Jul 2015

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini Jul 2015

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …


Towards An Internet Bill Of Rights, Giovanna De Minico Jul 2015

Towards An Internet Bill Of Rights, Giovanna De Minico

Loyola of Los Angeles International and Comparative Law Review

No abstract provided.


Regulating Electronic Legal Support Across State And National Boundaries, Cassandra Burke Robertson Jun 2015

Regulating Electronic Legal Support Across State And National Boundaries, Cassandra Burke Robertson

Akron Law Review

Given the combination of digital communications, porous state and national borders, and a growing need for affordable legal services, it is likely that practices now at the margins of legal practice will quickly grow in scope. Technological changes and increasing globalization allow foreign lawyers to compete in the U.S. market for legal service. The downward price movement from this increased competition allows middle-class individuals who would otherwise have represented themselves to hire legal counsel — albeit, in some cases, counsel from individuals not licensed to practice in the client’s jurisdiction, or even in the client’s home country. Regulators, used to …


Preventing Juror Misconduct In A Digital World, Thaddeus Hoffmeister Jun 2015

Preventing Juror Misconduct In A Digital World, Thaddeus Hoffmeister

Chicago-Kent Law Review

This article examines the reform efforts employed by common law countries to address internet-related juror misconduct, which generally arises when jurors use technology to improperly research or discuss a case. The three specific areas of reform are (1) punishment, (2) oversight, and (3) education. The first measure can take various forms ranging from fines to public embarrassment to incarceration. The common theme with all punishments is that once imposed, they make citizens less inclined to want to serve as jurors. Therefore, penalties should be a last resort in preventing juror misconduct.

The second reform measure is oversight, which occurs in …


Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern Jun 2015

Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern

Catholic University Law Review

In an ever-changing technological landscape, strictly adhering to the language and definitions of the Copyright Act in cases involving emerging technologies may contravene the purpose and intent of copyright law. However, the Supreme Court’s 2014 opinion in American Broadcasting Cos. v. Aereo Inc. puts forth a commercial interest rationale that suggests copyright infringers may no longer be able to avoid liability based on perceived technological loopholes that have typically absolved online infringers of infringement liability. This Note argues that Aereo’s commercial interest rationale paves the way for a new approach to technologically complex copyright cases, particularly where in-line linking …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione Jun 2015

Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione

Pace Intellectual Property, Sports & Entertainment Law Forum

“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …


Transforming “Transformative Use”: The Growing Misinterpretation Of The Fair Use Doctrine, Caile Morris Jun 2015

Transforming “Transformative Use”: The Growing Misinterpretation Of The Fair Use Doctrine, Caile Morris

Pace Intellectual Property, Sports & Entertainment Law Forum

Starting in late 2012, and continuing into late 2013, the United States District Court for the Southern District of New York wreaked havoc on the traditional interpretation of the copyright infringement defense known as “fair use.” Two cases stemming from the advent of the Google Books Project are Author’s Guild, Inc. v. HathiTrust and Author’s Guild, Inc. v. Google, Inc. These cases adopted a controversial interpretation of the fair use defense, codified in 17 U.S.C. § 107, when each case determined that the mass digitization of thousands of books constituted fair use merely because the digitization was what is known …


Unfair And Deceptive Robots, Woodrow Hartzog Jun 2015

Unfair And Deceptive Robots, Woodrow Hartzog

Maryland Law Review

No abstract provided.


Defending Deference: A Reply To Professor Sylvain’S Disruption And Deference, Zahr K. Said Jun 2015

Defending Deference: A Reply To Professor Sylvain’S Disruption And Deference, Zahr K. Said

Maryland Law Review

No abstract provided.


Disruption And Deference, Olivier Sylvain Jun 2015

Disruption And Deference, Olivier Sylvain

Maryland Law Review

No abstract provided.


"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr Jun 2015

"Three Parent Babies": Techniques Explained, Objections Examined, Rebecca Carr

Canadian Journal of Law and Technology

The UK Parliament has approved regulations, which come into force in October 2015, that permit the use of new treatment techniques to prevent the transmission of serious mitochondrial diseases from women to their children. The introduction of these techniques—which are not currently carried out in any country in the world—will fly in the face of the opposition that has been raised since discussions to permit clinical applications of the techniques first arose. After outlining some background to the techniques, this article briefly examines three of the objections that have been made against them: that the safety and effectiveness of the …


Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine Jun 2015

Leaving Dumb Phones Behind: A Commentary On The Warrantless Searches Of Smartphone Data Granted In R. V. Fearon, Jordan Fine

Canadian Journal of Law and Technology

Given the incredible rate of smartphone technological evolution, is it about time the Supreme Court of Canada devised a special test to give law enforcement agents significantly more power to search through phone data without a warrant upon arrest of a suspect? In R. v. Fearon, the majority did just that. But this article argues the opposite is true: the increasing potential for immense privacy infringements when police search powerful and constantly evolving technological devices demands a greater limitation to police powers.

In recent cases, the Supreme Court has agreed with the position that limitations are needed concerning computers. Additionally, …


Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi Jun 2015

Freedom Of Expression, Discrimination, And The Internet: Legislative Responses And Judicial Reactions, Talia Joundi

Canadian Journal of Law and Technology

In Part I of this article, I argue that cyber racism is inextricably linked with systemic discrimination. The definition of systemic discrimination relied on was first provided by Judge Abella in the Report of the Royal Commission on Equality in Employment (Abella Report), which states that systemic discrimination points to practices or attitudes that can result in inequality of opportunity for individuals or groups. The Supreme Court of Canada has since adopted this definition, and in some instances, has acknowledged that systemic problems require systemic remedies. The purpose of this discussion is to demonstrate how situating cyber racism within the …


International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent Jun 2015

International Law Enforcement Access To User Data: A Survival Guide And Call For Action, Kate Westmoreland, Gail Kent

Canadian Journal of Law and Technology

Effectively accessing and using online evidence is a critical part of modern investigations and prosecutions, but also has significant implications for users’ privacy. The current system of international sharing of online data in criminal matters is a patchwork of domestic and international law that is slow, uncertain, and not well understood. This article provides an overview of the current system for foreign governments seeking user data from US-based Internet companies. After describing the way in which the system currently operates, it identifies problems with the system, and outlines the reform efforts that are beginning to emerge.


Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough Jun 2015

Possession Of "Extreme" Pornography: Where's The Harm?, Jonathan Clough

Canadian Journal of Law and Technology

For decades, the traditional Western liberal approach to obscene material has been that while the availability of such material may be restricted, individuals are free to possess it so long as they do not distribute to others. Prior to the advent of the Internet, traditional means of control were effective in limiting the availability of such material. However, free of traditional restrictions the Internet allows easy access to a vast array of pornographic material, some of which challenges the most liberal of societies including images of child abuse, sexual violence, bestiality, and necrophilia.

In 2008, the UK became one of …


The Fda, Congress, And Mobile Health Apps: Lessons From Dshea And The Regulation Of Dietary Supplements, Natalie R. Bilbrough Jun 2015

The Fda, Congress, And Mobile Health Apps: Lessons From Dshea And The Regulation Of Dietary Supplements, Natalie R. Bilbrough

Maryland Law Review

No abstract provided.


Big Storms, Big Debt, And Biggery-Waters: Navigating Florida's Uncertain Flood Insurance Future, Loren M. Vasquez May 2015

Big Storms, Big Debt, And Biggery-Waters: Navigating Florida's Uncertain Flood Insurance Future, Loren M. Vasquez

Seattle Journal of Environmental Law

No abstract provided.


Can Sharks Be Saved? A Global Plan Of Action For Shark Conservation In The Regime Of The Convention On Migratory Species, James Kraska, Leo Chan Gaskins May 2015

Can Sharks Be Saved? A Global Plan Of Action For Shark Conservation In The Regime Of The Convention On Migratory Species, James Kraska, Leo Chan Gaskins

Seattle Journal of Environmental Law

Shark populations throughout the world are at grave risk; some spe-cies have declined by 95 percent. The most recent IUCN (Interna-tional Union for the Conservation of Nature) assessment by the Shark Specialist Group (SSG) found that one-fourth of shark and ray spe-cies face the prospect of extinction. This article proposes an engage-ment plan to accelerate efforts by states and international organiza-tions to conserve and protect sharks worldwide. Sharks are found throughout all of the world’s oceans, and collec-tively they occupy an indispensable niche as apex predators at the top of the ocean trophic ecosystem. These fish function as an im-portant …


Copyright Law And The Internet: The New Generation Of Legal Battles In The Courts, Catherine Pignataro May 2015

Copyright Law And The Internet: The New Generation Of Legal Battles In The Courts, Catherine Pignataro

Touro Law Review

No abstract provided.