Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

2016

Institution
Keyword
Publication

Articles 1 - 30 of 131

Full-Text Articles in Law

Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills Dec 2016

Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills

Journal of Technology Law & Policy

In today's rapidly changing world of e-commerce, almost anything can be bought over the Internet and delivered right to your front door. Virtually every day there is news of yet another company selling some type of product online. Included in this barrage of products is prescription medication. Not only is it possible to order prescription medication over the Internet, in some cases it is not necessary to be examined, or even to consult with a physician. ~ To some, this new type of "cybermedicine" is an affront to traditional medicine, as well as potentially dangerous to consumers. In addition, the …


Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood Dec 2016

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood

Journal of Legislation

While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …


Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber Dec 2016

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur Nov 2016

Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur

University of Massachusetts Law Review

Commercial website publishers use false and misleading information to create distrust of vaccines by claiming vaccines are ineffective and contain contaminants that cause autism and other disorders. The misinformation has resulted in decreased childhood vaccination rates and imperiled the public by allowing resurgence of vaccine-preventable illnesses. This Article argues that tort liability attaches to publishers of commercial websites for foreseeable harm that results when websites dissuade parents from vaccinating their children in favor of purchasing alternative products offered for sale on the websites.


Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley Oct 2016

Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley

Journal of Intellectual Property Law

No abstract provided.


Privatization Of The Judiciary, Eldar Haber Oct 2016

Privatization Of The Judiciary, Eldar Haber

Seattle University Law Review

The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …


A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard Oct 2016

A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard

Seattle University Law Review

While various courts and numerous legal professionals have addressed the issue of inconsistent application of personal jurisdiction in cyberspace cases, the Supreme Court has yet to discuss the impact that technology might have on the analysis of personal jurisdiction; thus, many details remain unresolved. This Note examines the varying jurisdictional splits between the lower district courts, the courts of appeals, and the federal circuit court of appeals in determining the proper approach to take when dealing with Internet jurisdiction. After an examination of several key cases, this Note will explain why the Supreme Court, or the Legislature, should adopt an …


Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle Oct 2016

Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle

Villanova Law Review

No abstract provided.


The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise Oct 2016

The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise

Journal of Intellectual Property Law

No abstract provided.


Internet Payment Blockades, Annemarie Bridy Oct 2016

Internet Payment Blockades, Annemarie Bridy

Florida Law Review

Internet payment blockades are an attempt to enforce intellectual property rights by “following the money” that flows to online merchants who profit from piracy and counterfeiting. Where corporate copyright and trademark owners failed in the legislature and the judiciary to create binding public law requiring payment processors like MasterCard and Visa to act as intellectual property enforcers, “non-regulatory” intervention from the executive branch secured their cooperation as a matter of private ordering. The resulting voluntary best practices agreement prescribes a notice-and-termination protocol that extends the reach of U.S. intellectual property law into cyberspace, to merchants operating “foreign infringing sites.” It …


Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow Oct 2016

Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow

Loyola of Los Angeles Law Review

No abstract provided.


Consumers’ Obsession Becoming Retailers’ Possession: The Way That Retailers Are Benefiting From Consumers’ Presence On Social Media, Vivian Adame Oct 2016

Consumers’ Obsession Becoming Retailers’ Possession: The Way That Retailers Are Benefiting From Consumers’ Presence On Social Media, Vivian Adame

San Diego Law Review

Retailers can profit from consumers’ social media presence in two ways: (1) through inadequate privacy laws; and (2) through retailers’ reposting of consumers intellectual property uploaded to social media sites. The California Legislature passed the Online Privacy Protection Act (CalOPPA), which moved towards protecting the privacy rights of consumers. However, the Legislature’s inability to hold retailers accountable under CalOPPA leaves consumers susceptible to the invasive technologies retailers use to collect social media users’ information, which they in turn sell and profit from. To better protect consumers on social media, the legislature should first enact a privacy law restricting retailers’ and …


Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown Oct 2016

Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown

Loyola of Los Angeles Entertainment Law Review

No abstract provided.


How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim Oct 2016

How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim

Washington Journal of Law, Technology & Arts

In passing the Communications Decency Act of 1996 (CDA), Congress sought to promote and protect the ever-evolving free market of voices and ideas available on the internet. In order to reach this end, section 230(c) of the CDA extends protection from liability to those who provide a means for disseminating speech on the web, dubbed by the statute as “interactive computer service providers” (ICSP). Section 230 protects ICSPs from liability for harm inflicted by content created and posted by third parties on their respective forums. This Article focuses on a 2015 Washington State Supreme Court decision, J.S. v. Village Voice …


A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith Sep 2016

A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith

Journal of Intellectual Property Law

No abstract provided.


Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder Sep 2016

Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder

The University of Cincinnati Intellectual Property and Computer Law Journal

Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …


Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher Aug 2016

Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher

Pace International Law Review

Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


From Old Spice To The Texas Law Hawk: How Inbound Marketing, Content Leadership And Social Media Can Level The Playing Field For Solo Practitioners, J. Mark Phillips, Kyle A. Huggins, Lora Mitchell Harding Jun 2016

From Old Spice To The Texas Law Hawk: How Inbound Marketing, Content Leadership And Social Media Can Level The Playing Field For Solo Practitioners, J. Mark Phillips, Kyle A. Huggins, Lora Mitchell Harding

The Journal of Business, Entrepreneurship & the Law

The advent of technological tools such as social media present the legal industry with the potential for both perilous liability and unparalleled rainmaking. However, the full potential of social media remains untapped in the legal field because the topic has yet to be fully integrated into a broader understanding of inbound marketing and content leadership. The current treatment of social media in the legal literature is uneven-it tends to disproportionately emphasize the potential liabilities over the benefits, and it fails to provide a thorough framework to guide its optimal use. This article aims to rectify this uneven treatment by situating …


Prosecuting Online Threats After Elonis, Michael Pierce Jun 2016

Prosecuting Online Threats After Elonis, Michael Pierce

Northwestern University Law Review

In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …


The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard Jun 2016

The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard

Journal of Intellectual Property Law

No abstract provided.


Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq. Jun 2016

Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.

Journal of Intellectual Property Law

No abstract provided.


"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch Jun 2016

"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch

University of Arkansas at Little Rock Law Review

No abstract provided.


Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy Jun 2016

Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy

Canadian Journal of Law and Technology

In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie Jun 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie

Canadian Journal of Law and Technology

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.

Using a pending border case …


Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma Jun 2016

Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma

Canadian Journal of Law and Technology

2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …