Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Law

Regulating Data Breaches: A Data Superfund Statute, Kyle Mckibbin Jan 2021

Regulating Data Breaches: A Data Superfund Statute, Kyle Mckibbin

Vanderbilt Journal of Entertainment & Technology Law

Collecting and processing large amounts of personal data has become a fundamental feature of the modern economy. Personal data, combined with good data analytics, are valuable to businesses as they can provide highly detailed information about individual preferences and behaviors. This data collection can also be valuable to the consumer as it generates innovative products and digital platforms. The era of big data promises great rewards, but it is not without its costs. Data breaches, or the release of personal data into unwanted hands, are pervasive and increasingly massive in scale. Despite the personal privacy harm caused by data breaches, …


What's In Your Box? Removing The Tiffany Standard Of Knowledge In Online Marketplaces, Hayley Dunn Jan 2021

What's In Your Box? Removing The Tiffany Standard Of Knowledge In Online Marketplaces, Hayley Dunn

Catholic University Journal of Law and Technology

Online shopping is a quintessential component of modern life. Millions of products from trusted brands are conveniently available at single-stop online marketplaces such as Amazon, eBay, and Alibaba with the click of a button from the comfort of home. But is the product delivered to the consumer’s front door actually the same as the one found on a store shelf? Pervasive trademark infringement in online marketplaces makes the answer to this question difficult, that is, until the consumer experiences negative consequences from a counterfeited product.

Under Tiffany (NJ) Inc. v. eBay, Inc., online marketplaces face almost no liability …


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Fosta: A Necessary Step In Advancement Of The Women’S Rights Movement, Alexandra Sanchez Jan 2020

Fosta: A Necessary Step In Advancement Of The Women’S Rights Movement, Alexandra Sanchez

Touro Law Review

No abstract provided.


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas Nov 2017

Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas

Michigan Telecommunications & Technology Law Review

The Digital Millennium Copyright Act (DMCA) has shaped the Internet as we know it. This legislation shields online service providers from secondary copyright infringement liability in exchange for takedown of infringing content of their users. Yet online payment processors, the backbone of $300 billion in U.S. e-commerce, are completely outside of the DMCA’s protection. This Article uses PayPal, the most popular online payment company in the U.S., to illustrate the growing risk of secondary liability for payment processors. First it looks at jurisprudence that expands secondary copyright liability online, and explains how it might be applied to PayPal. Then it …


Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson Sep 2017

Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon Apr 2017

Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon

Penn State Journal of Law & International Affairs

No abstract provided.


Lenz V. Universal: A Call To Reform Section 512(F) Of The Dmca And To Strengthen Fair Use, Marc J. Randazza Jan 2016

Lenz V. Universal: A Call To Reform Section 512(F) Of The Dmca And To Strengthen Fair Use, Marc J. Randazza

Vanderbilt Journal of Entertainment & Technology Law

Under 17 U.S.C. § 512(f) of the Digital Millennium Copyright Act (DMCA), those who issue materially false takedown notices are liable for damages. However, Section 512(f) has not effectively protected fair use. Currently, the DMCA issuer only has to prove he considered fair use before issuing a takedown notice, but faces no liability for actually taking action against fair use. The outcome of the recent Ninth Circuit Court of Appeals case Lenz v. Universal shows the flaws in the language of the DMCA. This Article calls for a mild adjustment to Section 512(f) for the purpose of protecting fair use …


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage Sep 2015

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher Jan 2015

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

University of Richmond Law Review

No abstract provided.


Liability For Massive Online Leaks Of National Defense Information, Rodney A. Smolla Jan 2014

Liability For Massive Online Leaks Of National Defense Information, Rodney A. Smolla

Georgia Law Review

Imagine that a group of activist American journalists and lawyers launch a new Internet site called "AmeriLeaks." The site is incorporated as a nonprofit organization with its principal place of business in Washington, D.C. The announced purpose of the site is to provide an American alternative to the WikiLeaks site led by Julian Assange. AmeriLeaks encourages whistleblowers across the United States to post documents on the site exposing corruption and crime in government, with an emphasis on American foreign policy and national security issues. "American universities have launched Moocs-Massive Open Online Courses-and we are now launching a site for American …


Bricks, Mortar, And Google: Defining The Relevant Antitrust Market For Internet-Based Companies, Jared Kagan Jan 2011

Bricks, Mortar, And Google: Defining The Relevant Antitrust Market For Internet-Based Companies, Jared Kagan

NYLS Law Review

No abstract provided.


Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant May 2008

Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant

San Diego International Law Journal

This Article confronts the limits this issue imposes on the First Amendment in four parts. Part I described the potential for conflicting defamation laws and forum shopping to undermine the American media's speech protections in the context of the Internet and global publications and outlines the Article's overall method of analysis. Part II first orients these conflicting defamation laws with respect to their development from the common law. It then frames them in terms of the underlying structural and policy differences that have produced their substantive divergence. This frame provides the analytical perspective through which this Article examines the varying …


Cyber-Libeling The Glitterati: Protecting The First Amendment For Internet Speech, Abbey L. Mansfield Jan 2007

Cyber-Libeling The Glitterati: Protecting The First Amendment For Internet Speech, Abbey L. Mansfield

Vanderbilt Journal of Entertainment & Technology Law

Celebrity gossip is disseminated on the Internet not only by profitable publications and Internet tabloids with professional writers and sophisticated legal teams, but also by countless numbers of "blogs" posted by ordinary individuals, often with nothing more than a dial-up connection. Americans posting speech on the Internet must be aware of the implications of the Gutnick decision and recognize that they could be dragged into court and held liable for defamation abroad. This note explores theoretical changes to the law that should be adopted to protect the First Amendment as it applies to Internet speech. Additionally, this note discusses various …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Oct 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

Michigan Telecommunications & Technology Law Review

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans Apr 2004

From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans

Michigan Telecommunications & Technology Law Review

If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …


Turning Worms: Some Thoughts On Liabilities For Spreading Computer Infections, Richard Owens Jan 2004

Turning Worms: Some Thoughts On Liabilities For Spreading Computer Infections, Richard Owens

Canadian Journal of Law and Technology

Two aspects of the virus/worm liability problem are of particular note. The first is how tightly the Internet binds together many possible defendants; those who build and run it, those who populate it with increasingly complex electronic commerce Web sites, those who provide terminal software, those who send electronic mails, those who design its security algorithms, those who insure it, and those who hack it, amongst others.

The second aspect is how speculative such a review is. Little case law pertains. Even the language of the law(what does it really mean when we assess liability on the basis of a …


Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale Apr 2003

Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale

Michigan Telecommunications & Technology Law Review

The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …


Immunizing Internet Service Providers From Third-Party Internet Defamation Claims: How Far Should Courts Go?, Sewali K. Patel Mar 2002

Immunizing Internet Service Providers From Third-Party Internet Defamation Claims: How Far Should Courts Go?, Sewali K. Patel

Vanderbilt Law Review

On April 25, 1995, a notice titled "Naughty Oklahoma T- shirts" appeared on an America Online ("AOL") bulletin board. The notice advertised T-shirts with slogans such as "Visit Oklahoma... It's a BLAST!" and "Putting the kids to bed ... Oklahoma 1995." In short, the notice glorified the Oklahoma City bombings of 1995, which killed 168 people. Under the only known identity of "Ken ZZ03," the author invited readers to call "Ken" at the listed phone number, which belonged to a Mr. Kenneth Zeran. While Mr. Zeran's first name was in fact Ken, Mr. Zeran was not responsible for posting the …


Transmissions Of Music On The Internet, Daniel J. Gervais Jan 2001

Transmissions Of Music On The Internet, Daniel J. Gervais

Vanderbilt Journal of Transnational Law

This Article examines the status of copyright laws in several countries as they pertain to transmissions of music on the Internet. Because the exact legal ramifications of music transmissions over the Internet are currently unclear, the Author compares copyright laws of six major markets and examines the potential application of the copyright laws and other rights that may apply. The Article also discusses rules concerning which transborder transmissions are likely to be covered by a country's national laws, as well as specific rules applying to the liability of intermediaries. Next, the Article summarizes the comparative findings and discusses the relevant …


Why Traditional Insurance Policies Are Not Enough: The Nature Of Potential E-Commerce Losses & Liabilities, Anna Lee Jan 2001

Why Traditional Insurance Policies Are Not Enough: The Nature Of Potential E-Commerce Losses & Liabilities, Anna Lee

Vanderbilt Journal of Entertainment & Technology Law

There are two general categories of insurance policies: first-party policies and third-party/liability policies. First-party polices provide benefits directly to policyholders for losses suffered by the policyholders. For example, fire damage to the policyholder's plant or financial loss resulting from the interruption of the policyholder's business would be covered under the first-party insurance. Generally, these first-party losses are covered under policies such as "all risk," "named peril," "business interruption," or "expense to reduce loss" coverages. Among these various types of first-party policies, "all risk" insurance policies provide the broadest coverages.

Third-party or liability policies provide protection for claims against the policyholder …


Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler Jun 2000

Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler

Michigan Telecommunications & Technology Law Review

Though the rapid development of the Internet has created a fertile ground for legal innovation, more often than not legislators and courts have sought to address this relatively new medium by attempting to squeeze it into precedents and paradigms better suited to older forms of communication, technology, and media. Part I of this article looks back at the courts' initial efforts at addressing defamation via the Internet. From the start the courts attempted to fit the role of the ISP into the common law's categorizing of print media as either "publishers" or "distributors" of information. One court's misstep in overextending …


Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick Nov 1999

Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick

Michigan Law Review

Speech, it is said, divides into three sorts - (1) speech that everyone has a right to (political speech, speech about public affairs); (2) speech that no one has a right to (obscene speech, child porn); and (3) speech that some have a right to but others do not (in the United States, Ginsberg speech, or speech that is "harmful to minors," to which adults have a right but kids do not). Speech-protective regimes, on this view, are those where category (1) speech predominates; speech-repressive regimes are those where categories (2) and (3) prevail. This divide has meaning for speech …


Computer Bulletin Board Operator Liability For Users' Infringing Acts, M. David Dobbins Oct 1995

Computer Bulletin Board Operator Liability For Users' Infringing Acts, M. David Dobbins

Michigan Law Review

This Note argues that a computer bulletin board operator's liability for copyright infringement by users of the bulletin board should be analyzed under the theory of contributory copyright infringement. This Note calls for a standard of liability under contributory copyright infringement that accommodates the competing interests at stake in the resolution of this issue. Part I provides an overview of copyright infringement law and argues that in most situations the operator's actions, viewed independently, do not constitute copyright infringement. Part II explores theories of third-party liability. This Part rejects the doctrine of vicarious liability as an effective means for establishing …