Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (25)
- University of Michigan Law School (11)
- Seattle University School of Law (6)
- Roger Williams University (2)
- University of Colorado Law School (2)
-
- University of Pennsylvania Carey Law School (2)
- University of Washington School of Law (2)
- American University Washington College of Law (1)
- Boston University School of Law (1)
- Brooklyn Law School (1)
- Claremont Colleges (1)
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Penn State Dickinson Law (1)
- Schulich School of Law, Dalhousie University (1)
- Selected Works (1)
- SelectedWorks (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Cincinnati College of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Rhode Island (1)
- University of Richmond (1)
- University of San Diego (1)
- Publication Year
- Publication
-
- Federal Communications Law Journal (25)
- Michigan Telecommunications & Technology Law Review (6)
- Seattle University Law Review (5)
- All Faculty Scholarship (2)
- Publications (2)
-
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Book Chapters, & Popular Press (1)
- Books (1)
- Brooklyn Journal of International Law (1)
- CMC Senior Theses (1)
- Catholic University Journal of Law and Technology (1)
- Dickinson Law Review (2017-Present) (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- Faculty Scholarship (1)
- Gregory M Dickinson (1)
- Life of the Law School (1993- ) (1)
- Michigan Business & Entrepreneurial Law Review (1)
- Michigan Law Review (1)
- NYLS Law Review (1)
- Northwestern University Law Review (1)
- Paulo Ferreira da Cunha (1)
- San Diego International Law Journal (1)
- Scholarly Works (1)
- School of Law Conferences, Lectures & Events (1)
- Seattle Journal of Technology, Environmental, & Innovation Law (1)
- University of Cincinnati Law Review (1)
- University of Michigan Journal of Law Reform (1)
- University of Michigan Journal of Law Reform Caveat (1)
- University of Richmond Law Review (1)
- Washington Law Review (1)
- Publication Type
Articles 1 - 30 of 66
Full-Text Articles in Law
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Washington Law Review Online
In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …
A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey
A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey
Faculty Scholarship
The Article begins with a puzzle: the curious absence of an express fact-exclusion from copyright protection in both the Copyright Act and its legislative history despite it being a well-founded legal principle. It traces arguments in the foundational Supreme Court case (Feist Publications v. Rural Telephone Service) and in the Copyright Act’s legislative history to discern a basis for the fact-exclusion. That research trail produces a legal genealogy of the fact-exclusion based in early copyright common law anchored by canonical cases, Baker v. Selden, Burrow-Giles v. Sarony, and Wheaton v. Peters. Surprisingly, none of them …
Section 230 As Civil Rights Statute, Enrique Armijo
Section 230 As Civil Rights Statute, Enrique Armijo
University of Cincinnati Law Review
Many of our most pressing discussions about justice, progress, and civil rights have moved online. Activists advocating for social change no longer need to be in the same physical space to connect with others who share their challenges and aspirations. But the convergence of mobility, connectivity, and technology is not the only reason why. Thanks to Section 230 of the Communications Decency Act’s (“Section 230”) immunity for online platforms, websites, and their hosts, speakers can engage in speech about protest, equality, and dissent without fear of collateral censorship from governments, authorities, and others in power who hope to silence them. …
The Five Internet Rights, Nicholas J. Nugent
The Five Internet Rights, Nicholas J. Nugent
Washington Law Review
Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …
On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek
On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek
Seattle Journal of Technology, Environmental, & Innovation Law
The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.
IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …
Sex, Money, And Free Speech: The Many Harms Of Fosta/Sesta, Desmond Mantle
Sex, Money, And Free Speech: The Many Harms Of Fosta/Sesta, Desmond Mantle
CMC Senior Theses
This thesis tracks the development of the Fight Online Sex Trafficking Act/Stop Enabling Sex Traffickers Act, or FOSTA/SESTA, which became federal law in 2018. The law's passage followed as a natural consequence of popular concerns about human trafficking. Congress passed the legislation by large margins in both houses given bipartisan opposition to sex trafficking. This thesis identifies plausible reasons for the only two Senate votes against the bill: those of Senators Rand Paul and Ron Wyden. Though these senators came from opposite sides of the aisle, they shared concerns about the future of free speech online and the potential failure …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Illuminating Regulatory Guidance, Cary Coglianese
Illuminating Regulatory Guidance, Cary Coglianese
All Faculty Scholarship
Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Seattle University Law Review
Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …
Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson
Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson
Articles in Law Reviews & Other Academic Journals
In TC Heartland v. Kraft Foods Group Brands, the Supreme Court tightened the venue requirement for patent cases, making it more difficult for a plaintiff to demonstrate that a district court has venue over a defendant. Many commentators, however, view TC Heartland as merely a “reshuffling” of the district courts that receive patent cases. Whereas before the case, a large percentage of patent cases were filed in the Eastern District of Texas, now, after TC Heartland, various other U.S. district courts (principally, the District of Delaware) have experienced an increase in patent infringement filings. Some commentators are unconvinced that this …
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
Seattle University Law Review
Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
All Faculty Scholarship
Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Federal Communications Law Journal
In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …
From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro
From Betamax To Youtube: How Sony Corporation Of America V. Universal City Studios, Inc. Could Still Be A Standard For New Technology, Veronica Corsaro
Federal Communications Law Journal
Internet technological innovations, particularly the development of Peer-to-Peer ("P2P") networks and the proliferation of user-generated content sites, have introduced considerable challenges for the application of copyright law and infringement liability. The response from the courts and Congress has been mixed, with severe legal curtails being applied to P2P technology while usergenerated content sites have been afforded a level of protection against infringement claims as part of the Digital Millennium Copyright Act's section 512 "safe harbor" provisions. However, these provisions have raised concerns about the issue of secondary copyright liability, a matter that has still been left undefined. This Note will …
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Wiretapping The Internet: The Expansion Of The Communications Assistance To Law Enforcement Act To Extend Government Surveillance, Christa M. Hibbard
Federal Communications Law Journal
Criminal use of the Internet to circumvent traditional government phone wiretaps has inspired the Obama Administration to create a proposal to expand the Communications Assistance to Law Enforcement Act ("CALEA"). CALEA was passed in 1994 to regulate telephone and broadband companies to ensure compliance with standards to enable government wiretapping. The proposed amendment of CALEA would allow the government to require all communications service providers to meet technical standards necessary to comply with a wiretap order. The expansion of CALEA would likely widen its scope to social networking sites, instant messaging, gaming consoles that allow conversation among multiple players, and …
Argh, Matey! The Faux-Pas Of The Sopa (Stop Online Piracy Act), Anna S. Han
Argh, Matey! The Faux-Pas Of The Sopa (Stop Online Piracy Act), Anna S. Han
University of Michigan Journal of Law Reform Caveat
Earlier, I posted about a network neutrality case, Verizon v. FCC, which could have far-reaching consequences for the Internet industry. Another concerted attempt to regulate the Internet, disguised in the form of a piracy protection bill, recently came before the House Judiciary Committee and garnered widespread disapproval. Representative Lamar Smith (R-TX) and a bipartisan group of twelve co-sponsors introduced the “Stop Online Piracy Act” (“SOPA”) on October 26, 2011, which punishes websites that are accused of facilitating copyright infringement. Although touted by its supporters as a weapon against foreign sites that steal and sell American inventions, SOPA is problematic because …
A Very Quiet Revolution: A Primer On Securities Crowdfunding And Title Iii Of The Jobs Act, Thaya Brook Knight, Huiwen Leo, Adrian A. Ohmer
A Very Quiet Revolution: A Primer On Securities Crowdfunding And Title Iii Of The Jobs Act, Thaya Brook Knight, Huiwen Leo, Adrian A. Ohmer
Michigan Business & Entrepreneurial Law Review
This essay introduces the complex regulatory regime that governs the public sale of all securities, no matter how small the offeror. It is intended as a rudimentary roadmap for the start-up or its counsel and will, hopefully, help to illuminate the traps for the unwary while providing an overview of the regulatory universe in which securities crowdfunding will operate.
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Publications
As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …
Facebook, Paulo Ferreira Da Cunha
Facebook, Paulo Ferreira Da Cunha
Paulo Ferreira da Cunha
Fascínios, possibilidades e perigos do Facebook e de tecnologias afins e seu uso. Sobretudo, a pseudo-democracia electrónica, tentação dos demagogos.
Internet Governance And Democratic Legitimacy, Oliver Sylvain
Internet Governance And Democratic Legitimacy, Oliver Sylvain
Federal Communications Law Journal
Even as the Internet goes pop, federal policymakers continue to surrender their statutory obligation to regulate communications in the first instance to extralegal nongovernmental organizations comprised of technical experts. The FCC's adjudication of a dispute concerning a major broadband service provider's network management practices is a case in point. There, in the absence of any enforceable legislative or regulatory rule, the FCC turned principally to the transmission principles of the Internet Engineering Taskforce, the preeminent nongovernmental Internet engineering standard-setting organization. This impulse to defer as a matter of course to such an organization without any legal mechanism requiring as much …
An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson
An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson
Gregory M Dickinson
Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.
This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …