Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (17)
- Schulich School of Law, Dalhousie University (13)
- Brooklyn Law School (11)
- Fordham Law School (11)
- University of Georgia School of Law (9)
-
- The Catholic University of America, Columbus School of Law (8)
- Case Western Reserve University School of Law (5)
- University of Richmond (5)
- American University Washington College of Law (4)
- Seattle University School of Law (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Michigan Law School (4)
- Loyola Marymount University and Loyola Law School (3)
- Maurer School of Law: Indiana University (3)
- Vanderbilt University Law School (3)
- Villanova University Charles Widger School of Law (3)
- Brigham Young University Law School (2)
- Pepperdine University (2)
- University of Cincinnati College of Law (2)
- University of Florida Levin College of Law (2)
- University of Minnesota Law School (2)
- University of Washington School of Law (2)
- Duke Law (1)
- Northwestern Pritzker School of Law (1)
- Notre Dame Law School (1)
- Pace University (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- The University of Akron (1)
- Keyword
-
- Internet (10)
- First Amendment (7)
- Privacy (7)
- Facebook (4)
- Social Media (4)
-
- Data Privacy (3)
- Digital Millennium Copyright Act (3)
- Federal Trade Commission (3)
- Google (3)
- Gramm-Leach-Bliley Act (3)
- Intellectual Property (3)
- Social media (3)
- Technology (3)
- Advertising (2)
- Bitcoin (2)
- Communication (2)
- Consumers (2)
- Copyright (2)
- Cybercrime (2)
- Cyberspace (2)
- Data (2)
- EBay (2)
- Ethics (2)
- European Union (2)
- FCC (2)
- FTC (2)
- Federal Communications Commission (2)
- Health (2)
- Inc. (2)
- Internet of Things (2)
- Publication
-
- Canadian Journal of Law and Technology (13)
- UIC John Marshall Journal of Information Technology & Privacy Law (13)
- Fordham Urban Law Journal (11)
- Catholic University Journal of Law and Technology (8)
- Journal of Intellectual Property Law (5)
-
- Journal of Law, Technology, & the Internet (5)
- Richmond Journal of Law & Technology (5)
- Georgia Law Review (4)
- Maryland Law Review (4)
- Seattle University Law Review (4)
- American University National Security Law Brief (3)
- Brooklyn Journal of Corporate, Financial & Commercial Law (3)
- Brooklyn Journal of International Law (3)
- Brooklyn Law Review (3)
- Indiana Law Journal (3)
- UIC Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Villanova Law Review (3)
- BYU Law Review (2)
- Journal of Law and Policy (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Law Review (2)
- Minnesota Journal of Law, Science & Technology (2)
- The Journal of Business, Entrepreneurship & the Law (2)
- The University of Cincinnati Intellectual Property and Computer Law Journal (2)
- Akron Intellectual Property Journal (1)
- American University International Law Review (1)
- Duke Law & Technology Review (1)
- Florida Law Review (1)
- Journal of Civil Rights and Economic Development (1)
Articles 1 - 30 of 131
Full-Text Articles in Law
Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills
Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills
Journal of Technology Law & Policy
In today's rapidly changing world of e-commerce, almost anything can be bought over the Internet and delivered right to your front door. Virtually every day there is news of yet another company selling some type of product online. Included in this barrage of products is prescription medication. Not only is it possible to order prescription medication over the Internet, in some cases it is not necessary to be examined, or even to consult with a physician. ~ To some, this new type of "cybermedicine" is an affront to traditional medicine, as well as potentially dangerous to consumers. In addition, the …
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood
Journal of Legislation
While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …
Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber
Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber
Brooklyn Law Review
No abstract provided.
The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera
The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera
St. Mary's Journal on Legal Malpractice & Ethics
This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur
Negative Portrayal Of Vaccines By Commercial Websites: Tortious Misrepresentation, Donald C. Arthur
University of Massachusetts Law Review
Commercial website publishers use false and misleading information to create distrust of vaccines by claiming vaccines are ineffective and contain contaminants that cause autism and other disorders. The misinformation has resulted in decreased childhood vaccination rates and imperiled the public by allowing resurgence of vaccine-preventable illnesses. This Article argues that tort liability attaches to publishers of commercial websites for foreseeable harm that results when websites dissuade parents from vaccinating their children in favor of purchasing alternative products offered for sale on the websites.
Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley
Journal of Intellectual Property Law
No abstract provided.
Privatization Of The Judiciary, Eldar Haber
Privatization Of The Judiciary, Eldar Haber
Seattle University Law Review
The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …
A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard
A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard
Seattle University Law Review
While various courts and numerous legal professionals have addressed the issue of inconsistent application of personal jurisdiction in cyberspace cases, the Supreme Court has yet to discuss the impact that technology might have on the analysis of personal jurisdiction; thus, many details remain unresolved. This Note examines the varying jurisdictional splits between the lower district courts, the courts of appeals, and the federal circuit court of appeals in determining the proper approach to take when dealing with Internet jurisdiction. After an examination of several key cases, this Note will explain why the Supreme Court, or the Legislature, should adopt an …
Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle
Trucks, Trains, And Transformation: Net Neutrality Lessons From The First Cyberlaw Symposium, Michael Risch, Christie L. Larochelle
Villanova Law Review
No abstract provided.
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
Journal of Intellectual Property Law
No abstract provided.
Internet Payment Blockades, Annemarie Bridy
Internet Payment Blockades, Annemarie Bridy
Florida Law Review
Internet payment blockades are an attempt to enforce intellectual property rights by “following the money” that flows to online merchants who profit from piracy and counterfeiting. Where corporate copyright and trademark owners failed in the legislature and the judiciary to create binding public law requiring payment processors like MasterCard and Visa to act as intellectual property enforcers, “non-regulatory” intervention from the executive branch secured their cooperation as a matter of private ordering. The resulting voluntary best practices agreement prescribes a notice-and-termination protocol that extends the reach of U.S. intellectual property law into cyberspace, to merchants operating “foreign infringing sites.” It …
Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow
Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow
Loyola of Los Angeles Law Review
No abstract provided.
Consumers’ Obsession Becoming Retailers’ Possession: The Way That Retailers Are Benefiting From Consumers’ Presence On Social Media, Vivian Adame
San Diego Law Review
Retailers can profit from consumers’ social media presence in two ways: (1) through inadequate privacy laws; and (2) through retailers’ reposting of consumers intellectual property uploaded to social media sites. The California Legislature passed the Online Privacy Protection Act (CalOPPA), which moved towards protecting the privacy rights of consumers. However, the Legislature’s inability to hold retailers accountable under CalOPPA leaves consumers susceptible to the invasive technologies retailers use to collect social media users’ information, which they in turn sell and profit from. To better protect consumers on social media, the legislature should first enact a privacy law restricting retailers’ and …
Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown
Fight Terror, Not Twitter: Insulating Social Media From Material Support Claims, Nina I. Brown
Loyola of Los Angeles Entertainment Law Review
No abstract provided.
How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim
How The Washington State Supreme Court Wrongly Applied The Communications Decency Act In Village Voice, And What It Means For Internet Service Providers, Samuel J. Daheim
Washington Journal of Law, Technology & Arts
In passing the Communications Decency Act of 1996 (CDA), Congress sought to promote and protect the ever-evolving free market of voices and ideas available on the internet. In order to reach this end, section 230(c) of the CDA extends protection from liability to those who provide a means for disseminating speech on the web, dubbed by the statute as “interactive computer service providers” (ICSP). Section 230 protects ICSPs from liability for harm inflicted by content created and posted by third parties on their respective forums. This Article focuses on a 2015 Washington State Supreme Court decision, J.S. v. Village Voice …
A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith
A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith
Journal of Intellectual Property Law
No abstract provided.
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
The University of Cincinnati Intellectual Property and Computer Law Journal
Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …
Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher
Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher
Pace International Law Review
Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Seattle University Law Review
Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …
From Old Spice To The Texas Law Hawk: How Inbound Marketing, Content Leadership And Social Media Can Level The Playing Field For Solo Practitioners, J. Mark Phillips, Kyle A. Huggins, Lora Mitchell Harding
From Old Spice To The Texas Law Hawk: How Inbound Marketing, Content Leadership And Social Media Can Level The Playing Field For Solo Practitioners, J. Mark Phillips, Kyle A. Huggins, Lora Mitchell Harding
The Journal of Business, Entrepreneurship & the Law
The advent of technological tools such as social media present the legal industry with the potential for both perilous liability and unparalleled rainmaking. However, the full potential of social media remains untapped in the legal field because the topic has yet to be fully integrated into a broader understanding of inbound marketing and content leadership. The current treatment of social media in the legal literature is uneven-it tends to disproportionately emphasize the potential liabilities over the benefits, and it fails to provide a thorough framework to guide its optimal use. This article aims to rectify this uneven treatment by situating …
Prosecuting Online Threats After Elonis, Michael Pierce
Prosecuting Online Threats After Elonis, Michael Pierce
Northwestern University Law Review
In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …
The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard
The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard
Journal of Intellectual Property Law
No abstract provided.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Journal of Intellectual Property Law
No abstract provided.
"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch
"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch
University of Arkansas at Little Rock Law Review
No abstract provided.
Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy
Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy
Canadian Journal of Law and Technology
In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie
Canadian Journal of Law and Technology
Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.
Using a pending border case …
Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma
Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma
Canadian Journal of Law and Technology
2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Canadian Journal of Law and Technology
Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …