Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 12 of 12
Full-Text Articles in Law
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Freedom Of Expression V. Social Responsibility On The Internet: Vivi Down Association V. Google, Raphael Cohen-Almagor, Natalina Stamile
Seattle Journal of Technology, Environmental & Innovation Law
The aim of the article is to reflect on Google’s social responsibility by analyzing a milestone court decision, Vivi Down Association v. Google, that took place in Italy, involving the posting of an offensive video clip on Google Video. It was a landmark decision because it refuted the assertion that the Internet knows no boundaries, that the Internet transcends national laws due to its international nature, and that Internet intermediaries, such as Google, are above the law. This case shows that when the legal authorities of a given country decide to assert their jurisdiction, Internet companies need to abide by …
Bipa: What Does It Stand For?, Paige Smith
Bipa: What Does It Stand For?, Paige Smith
Chicago-Kent Law Review
No abstract provided.
Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist
Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist
Catholic University Journal of Law and Technology
The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Fordham Intellectual Property, Media and Entertainment Law Journal
Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.
After objectively selecting and analyzing …
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Fordham Intellectual Property, Media and Entertainment Law Journal
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
The Right To Be Forgotten: Comparing U.S. And European Approaches, Samuel W. Royston
St. Mary's Law Journal
This Article compares the European and United States stances regarding the right to be forgotten. Within that context, this Article explores the implications of technological advances on constitutional rights, specifically the intersection of the right to free speech and the right to privacy, commonly referred to as the "right to be forgotten" paradox. In the United States, the trend is to favor free speech, while Europe places an emphasis on human rights. Each approach is analyzed based on supporting case law. The consequences of each approach on society, both long- and short-term, are also discussed. This Article argues that a …
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Richmond Journal of Law & Technology
Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create themselves—the full range of communications from voice calls, e-mails and texts to uploaded pictures, video, and music—pales in comparison to the amount of digital information created about them each day.
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Journal of Business & Technology Law
No abstract provided.
Privacy For Social Networking, Connie Davis Powell
Privacy For Social Networking, Connie Davis Powell
University of Arkansas at Little Rock Law Review
This article begins by considering the emergence of social networks as a major medium of communication and posits that the success of social networks is attributable to their users' willingness to share their information. Next, the article considers the expectation of privacy for users of social networks and whether such expectation is reasonable. In particular, the article discusses the privacy policies and legal terms governing the use of social networks, and tracks the evolution of such terms and policies as they slowly whittle away user control over time. The article then discusses public outcry regarding the disclosure of information contrary …
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Privacy Policies, Terms Of Service, And Ftc Enforcement: Broadening Unfairness Regulation For A New Era, G. S. Hans
Michigan Telecommunications & Technology Law Review
This Note examines website privacy policies in the context of FTC regulation. The relevant portion of Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a), uses the following language to define the scope of the agency's regulatory authority: "Unfair methods of competition in or affecting commerce, and unfair or deceptive acts or practices in or affecting commerce, are hereby declared unlawful." Specifically, this Note analyzes the FTC's power to regulate unfair practices (referred to as the FTC's "unfairness power") granted by Section 5, and also discusses the deception prong of Section 5, which allows the agency to …
The Google Dilemma, James Grimmelmann