Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman Mar 2010

Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman

All Faculty Scholarship

Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …


Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller Jan 2010

Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller

Proxy

No abstract provided.


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


Privacy As Product Safety, James Grimmelmann Dec 2009

Privacy As Product Safety, James Grimmelmann

James Grimmelmann

Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …


Real Name System On The Internet: Origins, Practices And Reflections(中国网络实名制管理:由来、实践与反思,Forthcoming), Henry L. Hu Dec 2009

Real Name System On The Internet: Origins, Practices And Reflections(中国网络实名制管理:由来、实践与反思,Forthcoming), Henry L. Hu

Henry L Hu

No abstract provided.