Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Climbing The Walls Of Your Electronic Cage, Steven Hetcher May 2000

Climbing The Walls Of Your Electronic Cage, Steven Hetcher

Michigan Law Review

Space. The final frontier. Not so, say the doyennes of the firstgeneration Internet community, who view themselves as the new frontiersmen and women staking out a previously unexplored territory - cyberspace. Numerous metaphors in the Internet literature picture cyberspace as a new, previously unexplored domain. Parallels are frequently drawn to the American colonies, the Western frontier, or outer space. In Code: And Other Laws of Cyberspace, Lawrence Lessig says, "Cyberspace is a place. People live there." In this place, we will build a "new society" (p. 4). A sense of this background is helpful in appraising Lessig's claims. He argues …


Much Ado About Spam: Unsolicited Advertising, The Internet, And You., Scot M. Graydon Jan 2000

Much Ado About Spam: Unsolicited Advertising, The Internet, And You., Scot M. Graydon

St. Mary's Law Journal

Internet users need protection from unsolicited commercial emails (UCEs), and this protection should come from federal legislation. Despite seventeen states having passed some sort of legislation regulating UCEs, this is insufficient to protect Internet users from UCEs. State laws are not uniformed and UCEs frequently cross state lines. Internet advertisers prefer commercial emails because of the ability to market to millions of consumers at a low cost. Consumers, however, suffer delays to their Internet access because of the amount of data UCEs accumulate, and in some cases may have to pay additional fees if they exceed the data limits of …


Principles Of Internet Privacy, Fred H. Cate Jan 2000

Principles Of Internet Privacy, Fred H. Cate

Articles by Maurer Faculty

The definition of privacy developed by Brandeis and Warren and Prosser, and effectively codified by Alan Westin in 1967 - the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others - worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.

But that definition's exclusive focus on individual control has grown incomplete in a world in which most privacy concerns involve …