Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Any Safe Harbor In A Storm: Sesta-Fosta And The Future Of § 230 Of The Communications Decency Act, Charles Matula May 2020

Any Safe Harbor In A Storm: Sesta-Fosta And The Future Of § 230 Of The Communications Decency Act, Charles Matula

Duke Law & Technology Review

No abstract provided.


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


Analysis Of Terminological Concept Of Information Technologies In Domestic And Foreign Literature, A.R. Davronov Dec 2018

Analysis Of Terminological Concept Of Information Technologies In Domestic And Foreign Literature, A.R. Davronov

Review of law sciences

In this article, the conceptual and terminological apparatus of information technologies in domestic and foreign literature has been studied and the concept of “Information technologies” has been analyzed using a comparative method. In addition, proposals are made to improve legislation in the field of information technology.


Ensuring National Security In The Information Sphere, D. Tadjibaeva Oct 2017

Ensuring National Security In The Information Sphere, D. Tadjibaeva

Review of law sciences

This article describes ideological threats to security, and stability of the republic, improvement of the information security system, timely and proportionate countermeasures,which are mentioned in the first part of the fifth priority directions of the Strategy of Action “Priority areas in the field of security, inter-ethnic harmony and religious tolerance, and implementation of balanced, mutually beneficial and constructive foreign policy”.


Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli Jan 2016

Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli

Brooklyn Journal of International Law

In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Mediating On The Internet Today And Tomorrow , James C. Melamed Apr 2012

Mediating On The Internet Today And Tomorrow , James C. Melamed

Pepperdine Dispute Resolution Law Journal

This paper will examine Internet opportunities for mediators and mediation participants. We will examine current Internet opportunities as well as where all of this may be taking us. The author suggests that there are unique qualities and opportunities for mediators on the Internet, including cost and convenience.


Internet Dispute Resolution (Idr): Bringing Adr Into The 21st Century , Richard Michael Victorio Apr 2012

Internet Dispute Resolution (Idr): Bringing Adr Into The 21st Century , Richard Michael Victorio

Pepperdine Dispute Resolution Law Journal

It was only a matter of time before ADR hit the Interet. The Internet has sweepingly transformed society just as ADR has wrought tremendous change in our society, by enabling the swift and economical settlement of disputes, and unclogging the legal system in the process. The application of alternative dispute resolution methods to the Internet, termed "iDR" in this comment, has the potential to impact the landscape of both traditional ADR and the Internet itself. It brings the communication technology of the Internet to the practice of traditional, non-virtual, "real world" ADR, reducing costs and speeding up the exchange of …


Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero Mar 2012

Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero

Pepperdine Dispute Resolution Law Journal

Music is becoming increasingly synonymous with big business and corporate influence. The advent of Internet radio and streaming webcasts are simply one example of this shift. Organizations such as the Radio Industry Association of America ("RIAA") have discovered a new way to receive royalties from the performance of musical works, and have fought vigorously to obtain favorable rates to achieve the maximum profit. On the other hand, small webcasters have fought equally hard to avoid these large rates. Although arguments for each side are equally persuasive, neither is persuasive enough to force a compromise. In attempting to solve these disputes, …


Cyberspace And The "Devil's Hatband", Jonathan J. Rusch Jan 2000

Cyberspace And The "Devil's Hatband", Jonathan J. Rusch

Seattle University Law Review

In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …