Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 44

Full-Text Articles in Law

The Destruction Of An Empire: Will Viacom End Youtube's Reign?, Adam Shatzkes Dec 2012

The Destruction Of An Empire: Will Viacom End Youtube's Reign?, Adam Shatzkes

Touro Law Review

In a pre-Napster world Congress sought to promote theadvancement and development of the Internet. To facilitate this expansion, Congress enacted the Digital Millennium Copyright Act ("DMCA"), which protects internet service providers from copyright infringement liability. Due, in part, to the DMCA, the Internet has expanded beyond Congress' expectations. With the growth of the Internet, however, inequities have been created. YouTube epitomizes these inequities and Viacom's suit highlights the injustices that have been created. The ease with which copyrighted materials are published on the Internet has made it impossible for copyright owners to adequately protect their works. It is time for …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert Oct 2012

Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert

Pepperdine Law Review

No abstract provided.


Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer Oct 2012

Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer

Pepperdine Law Review

No abstract provided.


An Innovative Link Between The Internet, The Capital Markets, And The Sec: How The Internet Direct Public Offering Helps Small Companies Looking To Raise Capital, Daniel Everett Giddings Oct 2012

An Innovative Link Between The Internet, The Capital Markets, And The Sec: How The Internet Direct Public Offering Helps Small Companies Looking To Raise Capital, Daniel Everett Giddings

Pepperdine Law Review

No abstract provided.


The Legal World Wide Web: Electronic Personal Jurisdiction In Commercial Litigation, Or How To Expose Yourself To Liability Anywhere In The World With The Press Of A Button, Robert M. Harkins Jr. Oct 2012

The Legal World Wide Web: Electronic Personal Jurisdiction In Commercial Litigation, Or How To Expose Yourself To Liability Anywhere In The World With The Press Of A Button, Robert M. Harkins Jr.

Pepperdine Law Review

No abstract provided.


Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel Oct 2012

Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel

Pepperdine Law Review

No abstract provided.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Managing The Impact Of New Media On The Employment Relationship, Susan A. O'Sullivan-Gavin, John H. Shannon Sep 2012

Managing The Impact Of New Media On The Employment Relationship, Susan A. O'Sullivan-Gavin, John H. Shannon

The Journal of Business, Entrepreneurship & the Law

Attention to privacy issues in the workplace has increased over the past two decades as use of electronic mail and text messages has made these means of communication commonplace. Beyond text messages and emails, employees can access the internet at their place of employment at many different entry points. This access can be through company issued desktops or laptops, mobile phones, mobile internet devices (MIDs), Smartphone technology (photography; video and voice recording capabilities; file transfer and storage), off-site internet connections, Wi-Fi access or hot spots. Employees can access and/or post information on various sites including blogs, wikis, RSS feeds, instant …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative Sep 2012

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt, Cornell Erulemaking Initiative

Michigan Journal of Environmental & Administrative Law

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky Aug 2012

Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky

Lee Kovarsky

This paper addresses the collection of "clickstream data," and sets forth a theory about the legal rules that should govern it. At the outset, I propose a typology for categorizing privacy invasions. A given state of informational privacy may be represented by: the observed behavior, the collecting agent, and the searching agent. Using this typology, I identify the specific sources of concern about collection of clickstream data. Then, based on expected levels of utility and expected transaction costs of "flipping" to a different rule, I argue for a particular set of privacy defaults for data mining.


Social Networking And Land Use Planning And Regulation: Practical Benefits, Pitfalls And Ethical Considerations, Patricia E. Salkin Jul 2012

Social Networking And Land Use Planning And Regulation: Practical Benefits, Pitfalls And Ethical Considerations, Patricia E. Salkin

Patricia E. Salkin

This article explores how social networking sites have been used or might be used in the land use context. Part I focuses on the use of social networking for land use planning and zoning. It includes a discussion of the pros and cons of the use of social networking sites to present public information and to gather public input and invite general participation in the process, as well as to provide notice to the public of forthcoming government decision-making. This section offers concrete examples of how this technology is currently being used in the land use context. Part II focuses …


Building Bridges To Remedies For Consumers In International Conflicts, Amy J. Schmitz Jul 2012

Building Bridges To Remedies For Consumers In International Conflicts, Amy J. Schmitz

University of Arkansas at Little Rock Law Review

This essay addresses the lack of consumer remedy mechanism, and attempts to open consideration of expanded use of online processes for resolving business-to-consumer (B2C) eConflicts. Specifically, the essay attempts to highlight the problems created by problematic and uncertain enforcement of B2C arbitration, and proposes the use of the Internet to create fair and globally enforceable Online Dispute Resolution and Online Arbitration (OArb) mechanisms. These mechanisms would capitalize on the growth and efficiency of the Internet while protecting consumers from burdensome and/or expensive procedures that render existing remedies meaningless.

The essay begins by discussing the importance of fair and accepted B2C …


Proposal For An International Convention On Online Gambling, Marketa Trimble Jun 2012

Proposal For An International Convention On Online Gambling, Marketa Trimble

Scholarly Works

The proposal, which will be published as a chapter in a volume from the Internet Gaming Regulation Symposium co-organized by the William S. Boyd School of Law of the University of Nevada, Las Vegas, in May 2012, presents the outline of an international convention ('Convention') that will facilitate cooperation among countries in enforcement of their online gambling regulations while allowing the countries to maintain their individual legal approaches to online gambling. Countries continue to vary in their approaches - some permit and regulate, and others prohibit online gambling, and even countries that permit and regulate online gambling approach the issue …


Corporate Criticism On The Internet: The Fine Line Between Anonymous Speech And Cybersmear, Scot Wilson May 2012

Corporate Criticism On The Internet: The Fine Line Between Anonymous Speech And Cybersmear, Scot Wilson

Pepperdine Law Review

No abstract provided.


International Dispute Settlement At The Trademark-Domain Name Interface, Laurence R. Helfer May 2012

International Dispute Settlement At The Trademark-Domain Name Interface, Laurence R. Helfer

Pepperdine Law Review

No abstract provided.


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Mediating On The Internet Today And Tomorrow , James C. Melamed Apr 2012

Mediating On The Internet Today And Tomorrow , James C. Melamed

Pepperdine Dispute Resolution Law Journal

This paper will examine Internet opportunities for mediators and mediation participants. We will examine current Internet opportunities as well as where all of this may be taking us. The author suggests that there are unique qualities and opportunities for mediators on the Internet, including cost and convenience.


Internet Dispute Resolution (Idr): Bringing Adr Into The 21st Century , Richard Michael Victorio Apr 2012

Internet Dispute Resolution (Idr): Bringing Adr Into The 21st Century , Richard Michael Victorio

Pepperdine Dispute Resolution Law Journal

It was only a matter of time before ADR hit the Interet. The Internet has sweepingly transformed society just as ADR has wrought tremendous change in our society, by enabling the swift and economical settlement of disputes, and unclogging the legal system in the process. The application of alternative dispute resolution methods to the Internet, termed "iDR" in this comment, has the potential to impact the landscape of both traditional ADR and the Internet itself. It brings the communication technology of the Internet to the practice of traditional, non-virtual, "real world" ADR, reducing costs and speeding up the exchange of …


Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero Mar 2012

Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero

Pepperdine Dispute Resolution Law Journal

Music is becoming increasingly synonymous with big business and corporate influence. The advent of Internet radio and streaming webcasts are simply one example of this shift. Organizations such as the Radio Industry Association of America ("RIAA") have discovered a new way to receive royalties from the performance of musical works, and have fought vigorously to obtain favorable rates to achieve the maximum profit. On the other hand, small webcasters have fought equally hard to avoid these large rates. Although arguments for each side are equally persuasive, neither is persuasive enough to force a compromise. In attempting to solve these disputes, …


Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard Mar 2012

Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard

Federal Communications Law Journal

Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …


From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro Mar 2012

From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro

Federal Communications Law Journal

Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …


Personal Use Of Workplace Computers: A Threat To Otherwise Privileged Communications, Louise Hill Feb 2012

Personal Use Of Workplace Computers: A Threat To Otherwise Privileged Communications, Louise Hill

Louise L Hill

This article is an adaptation of "Gone but Not Forgotten: When Privacy, Policy and Privilege Collide" originally published in the Northwestern Journal of Technology and Intellectual Property, Volume 9, Issue 8, 2011


The Future Of Free Expression In A Digital Age, Jack M. Balkin Feb 2012

The Future Of Free Expression In A Digital Age, Jack M. Balkin

Pepperdine Law Review

In the twenty-first century, at the very moment that our economic and social lives are increasingly dominated by information technology and information flows, the judge-made doctrines of the First Amendment seem increasingly irrelevant to the key free speech battles of the future. The most important decisions affecting the future of freedom of speech will not occur in constitutional law; they will be decisions about technological design, legislative and administrative regulations, the formation of new business models, and the collective activities of end-users. Moreover, the values of freedom of expression will become subsumed within a larger set of concerns that I …


Network Neutrality: Verizon V. Fcc, Anna S. Han Jan 2012

Network Neutrality: Verizon V. Fcc, Anna S. Han

University of Michigan Journal of Law Reform Caveat

The Federal Communications Commission (“FCC”) is once again locking horns with the broadband behemoth, Verizon, over the issue of network neutrality. Although this conflict between the government and corporate giants is far from new, recent events have forced courts to give it close scrutiny. Given the explosive pace at which technology has expanded and permeated citizens’ daily lives, the judgments rendered have greater significance now than ever before.


Technology Convergence And Federalism: The Case Of Voip Regulation, Daniel A. Lyons Jan 2012

Technology Convergence And Federalism: The Case Of Voip Regulation, Daniel A. Lyons

University of Michigan Journal of Law Reform Caveat

The Vermont Supreme Court may soon consider whether federal law permits the Public Service Board to regulate certain voice-over-internet-protocol (VoIP) services. Across the Hudson, Governor Andrew Cuomo recently sought to bar the New York Public Service Commission from adopting similar regulations. And these states are not alone: from Maine to Florida, several states are considering whether their jurisdiction over traditional telephone service encompasses this new technology, through which nearly one-third of American landline households receive telephone service. If so, nationwide VoIP providers could face up to fifty new legal regimes with which they must comply before offering service. If not, …


Argh, Matey! The Faux-Pas Of The Sopa (Stop Online Piracy Act), Anna S. Han Jan 2012

Argh, Matey! The Faux-Pas Of The Sopa (Stop Online Piracy Act), Anna S. Han

University of Michigan Journal of Law Reform Caveat

Earlier, I posted about a network neutrality case, Verizon v. FCC, which could have far-reaching consequences for the Internet industry. Another concerted attempt to regulate the Internet, disguised in the form of a piracy protection bill, recently came before the House Judiciary Committee and garnered widespread disapproval. Representative Lamar Smith (R-TX) and a bipartisan group of twelve co-sponsors introduced the “Stop Online Piracy Act” (“SOPA”) on October 26, 2011, which punishes websites that are accused of facilitating copyright infringement. Although touted by its supporters as a weapon against foreign sites that steal and sell American inventions, SOPA is problematic because …


Chopping Down The Rainforest: Finding A Solution To The "Amazon Problem", Eric Andrew Felleman Jan 2012

Chopping Down The Rainforest: Finding A Solution To The "Amazon Problem", Eric Andrew Felleman

University of Michigan Journal of Law Reform Caveat

Current economic conditions in the United States have led to a dramatic decrease in state tax revenue. Without these funds, states will be unable to support important public services, and hundreds of thousands of jobs in the public and private sectors are at risk of being cut, as states work to close $103 billion in budget gaps. Accomplishing that will involve overcoming many hurdles, such as the unpopularity of raising taxes during times of economic trouble, but one largely untapped source could provide a significant amount of income to states. States currently lose around $23 billion annually in uncollected use …


The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick Jan 2012

The Need To Prevent Employers From Accessing Private Social Network Profiles, Brett Novick

University of Michigan Journal of Law Reform Caveat

In March 2012, social network privacy became a conversation topic after news reports of the story of Justin Bassett, a job applicant who withdrew his application in the middle of an interview when the interviewer asked him for the username and password of his private Facebook account. Although the issue has received much attention from the public and media, the Department of Justice (DOJ) has stated that it has no interest in prosecuting employers for asking for social networking account information. Fortunately, legislation that would make it illegal for employers to ask for the username and passwords for social networking …


"Like" Your President: A Case For Online Voting, Jeremy Garson Jan 2012

"Like" Your President: A Case For Online Voting, Jeremy Garson

University of Michigan Journal of Law Reform Caveat

In the wake of Hurricane Sandy, New Jersey allowed displaced residents to vote in the 2012 elections by email. The option to vote online has been available to military members stationed overseas since 2009. New Jersey’s decision to open online voting to civilians raises the question of why this shift didn’t take place sooner. Assuming New Jersey’s system holds up under post-election scrutiny, why not utilize it to the fullest extent possible? Online voter registration is already permitted by eleven states, including the liberal, infrastructure-rich, population-heavy California and the conservative, sparsely populated Alaska. Extending the registration system to voting itself …