Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber Dec 2016

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Pornography As Pollution, John C. Nagle Oct 2016

Pornography As Pollution, John C. Nagle

John Copeland Nagle

Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …


Prosecuting Online Threats After Elonis, Michael Pierce Jun 2016

Prosecuting Online Threats After Elonis, Michael Pierce

Northwestern University Law Review

In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …


"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch Jun 2016

"Hacking" Service Of Process: Using Social Media To Provide Constitutionally Sufficient Notice Of Process, Angela Upchurch

University of Arkansas at Little Rock Law Review

No abstract provided.


Elonis V. United States: The Need To Uphold Individual Rights To Free Speech While Protecting Victims Of Online True Threats, Alison J. Best May 2016

Elonis V. United States: The Need To Uphold Individual Rights To Free Speech While Protecting Victims Of Online True Threats, Alison J. Best

Maryland Law Review

No abstract provided.


Public Forum 2.0, Lyrissa Barnett Lidsky Apr 2016

Public Forum 2.0, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


The Right To Be Forgotten, Lisa Owings Apr 2016

The Right To Be Forgotten, Lisa Owings

Akron Intellectual Property Journal

This Article advocates a new test for balancing free speech and privacy interests online. There should be a three-prong test for whether, and under what circumstances, a user may request deletion of online data under the right to be forgotten. First, if the information is the publication of a private fact that is offensive to a reasonable person and not newsworthy, it should never be published unless the individual chooses to do so. Second, if individuals posted the information about themselves or as an expression of their opinion, they should have the right to remove it. This should apply not …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Trust And Social Commerce, Julia Y. Lee Feb 2016

Trust And Social Commerce, Julia Y. Lee

Julia Lee

Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace. The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …


Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli Jan 2016

Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli

Brooklyn Journal of International Law

In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …


Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray Jan 2016

Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray

Online Theses and Dissertations

Cybercrime currently poses a significant threat to the infrastructure of the United States. It can exploit vulnerabilities within the Critical Infrastructure or (CI) systems that are increasingly interconnected. Although the increased interconnectedness allows for easier and more efficient communication it creates vulnerabilities that did not exist ten years ago. A lack of a standardized definition of cybercrime has made it increasingly difficult to create policy that will allow for more efficient interagency cooperation and concrete laws regarding cybercrime. Cybercrime thrives on the anonymity of the Internet with the use of specific browsers, The Onion Router for example, to access information …


How The E-Government Can Save Money By Building Bridges Across The Digital Divide, Alison Rogers Jan 2016

How The E-Government Can Save Money By Building Bridges Across The Digital Divide, Alison Rogers

Michigan Journal of Race and Law

As government agencies and federal aid recipients begin to build a presence online, they must recognize that language accessibility is morally required, fiscally responsible, and compulsory under federal civil rights law. This Note explores statutes, federal policies, and case law that purport to protect the rights of limited English proficient (“LEP”) individuals in cyberspace. The Note suggests reforms, policies, and programs that should be adopted by federal aid recipients to ensure that LEP individuals have meaningful access to online services.


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.