Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Internet

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 167

Full-Text Articles in Law

From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan Jan 2024

From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan

University of Miami Business Law Review

But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …


The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page Feb 2023

The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page

University of Miami Law Review

The United States Department of Justice (“DOJ”) and three overlapping groups of states have filed federal antitrust cases alleging Google has monopolized internet search, search advertising, internet advertising technologies, and app distribution on Android phones. In this Article, we focus on the DOJ’s claims that Google has used contracts with tech firms that distribute Google’s search services in order to exclude rival search providers and thus to monopolize the markets for search and search advertising—the two sides of Google’s search platform. The primary mechanisms of exclusion, according to the DOJ, are the many contracts Google has used to secure its …


The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


Toward Stronger Data Protection Laws, Margot E. Kaminski Jan 2023

Toward Stronger Data Protection Laws, Margot E. Kaminski

Publications

No abstract provided.


On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery Oct 2021

The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery

St. Mary's Law Journal

Abstract forthcoming.


The Future Of The Americans With Disabilities Act: Website Accessibility Litigation After Covid-19, Randy Pavlicko Jun 2021

The Future Of The Americans With Disabilities Act: Website Accessibility Litigation After Covid-19, Randy Pavlicko

Cleveland State Law Review

The Americans with Disabilities Act (ADA) was enacted in 1990 to eliminate discrimination against individuals with disabilities. Over time, as society has become more reliant on the internet, the issue of whether the ADA’s scope extends beyond physical places to online technology has emerged. A circuit split developed on this issue, and courts have discussed three interpretations of the ADA’s scope: (1) the ADA applies to physical places only; (2) the ADA applies to a website or mobile app that has a sufficient nexus to a physical place; or (3) the ADA broadly applies beyond physical places to online technology. …


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Internet Architecture And Disability, Blake Reid Apr 2020

Internet Architecture And Disability, Blake Reid

Indiana Law Journal

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


The Problems With Decision-Making, Joanna K. Sax Jan 2020

The Problems With Decision-Making, Joanna K. Sax

Faculty Scholarship

Our society faces major challenges in numerous areas, including climate change and healthcare. Addressing these problems with technological advances are of great importance. Increasingly, however, consumers are resisting or rejecting such technological interventions based on inappropriate assignment of risk. In other words, the consumer assessment of risk is not in line with evidence-based assessment of risk. This article focuses on two controversial areas, vaccines and genetically engineered food, as examples in which consumers assign a high risk despite an evidence-based assessment of low risk. This article describes how empirically tested decision-making theories explain why consumers inappropriately assign risk. While these …


The Internet Of Bodies, Andrea M. Matwyshyn Oct 2019

The Internet Of Bodies, Andrea M. Matwyshyn

William & Mary Law Review

This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …


Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran Oct 2019

Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran

IP Theory

How can Internet research be used properly and reliably in law? This paper analyzes several key and very different issues affecting judges, jurors, and lawyers. With respect to judges, this paper discusses the rules of judicial conduct and how they guide the appropriate use of the Internet for research; the standards for judicial notice; and whether judges can consider a third category of non-adversarially presented, non-judicially noticed factual evidence. With respect to jurors, this paper discusses causes of and deterrents to jurors conducting Internet research during trials; and the recourse available to parties who are adversely impacted by such behavior. …


Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir May 2019

Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir

William & Mary Bill of Rights Journal

In this Article we argue that the digital revolution requires a reshaping of the Doctrine of Prior Restraint, which prohibits the implementation of any regulations that prevent the publication of speech prior to its distribution. We describe the prohibition on prior restraint of speech, its rationales and its exceptions; present the characteristics of the media in the digital age; suggest that the traditional design of the Doctrine does not fit these characteristics; and describe the reshaping that we propose in order to adapt the Doctrine to the age of the Internet and social networking.


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


The Internet Adopts Two-Way Radio, Henry Perritt Apr 2019

The Internet Adopts Two-Way Radio, Henry Perritt

All Faculty Scholarship

The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …


The Airwaves Meet The Highways, David Redl Apr 2019

The Airwaves Meet The Highways, David Redl

Journal of Law and Mobility

I applaud and congratulate the University of Michigan for launching the Journal of Law and Mobility. The timing is perfect. The information superhighway is no longer just a clever metaphor. We are living in an era where internet connectivity is a critical part of making transportation safer and more convenient. Internet connectivity has powered the U.S. and global economies for years now. In the early stages, dial-up connections enabled users to access a vast store of digital information. As the internet and its usage grew, so did the demand for faster broadband speeds. Finally, wireless networks untethered the power of …


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright Feb 2019

Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright

Articles

Best known for their role in the creation of cryptocurrencies like bitcoin, blockchains are revolutionizing the way technology entrepreneurs finance their business enterprises. In 2017 alone, tech entrepreneurs raised over $6 billion through the sale of blockchain-based digital tokens, with some sales lasting mere seconds before selling out. In a token sale, also referred to as an “initial coin offering” or “ICO,” organizers of a project sell digital tokens to members of the public to finance the development of new technological platforms and services. After the initial sale, cryptocurrency exchanges scattered across the globe list tokens for trading and facilitate …


Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan Jan 2019

Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan

Articles in Law Reviews & Other Academic Journals

You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.

Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …


Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman Jan 2019

Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman

Catholic University Journal of Law and Technology

Social lives are increasingly unmoored from physical location. 21st century developments in social media, virtual worlds, augmented reality, electronic financial transactions, drones, robotics, and artificial intelligence allow human beings to interact in more and more robust ways at a physical remove from their location. Meanwhile, the ubiquity of multinational corporations, global supply chains, and cloud-based data all mean that our lives are more likely to be affected by activity that is spatially distant. Virtual effects often replace direct territorial effects.

Three important consequences flow from this ubiquitous technology-enabled, data-driven virtual global societal activity. First, the territorial location of data …


The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman Jan 2019

The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman

Catholic University Journal of Law and Technology

More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …


Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish Jan 2019

Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish

Journal of Law, Technology, & the Internet

The data subject’s (or the individual to whom the data relates) right to erasure under the new EU’s data protection law is likely to cause tensions with the right to freedom of expression. Using Article 17(1)(d)-(e) of the General Data Protection Regulation as a nexus to trigger and apply the right to privacy in EU law to the right to erasure, this Note presents a balancing test of four factors that can be used to consistently determine whether individual cases that request a right to erasure for published material are entitled to privacy protections. The proposed balancing test “Elements of …


"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar Jan 2019

"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar

Journal of Law, Technology, & the Internet

President Donald Trump’s affinity for Twitter has raised novel issues of constitutional law, tested the norms for presidential etiquette, and opened up a dialogue about whether tweets are considered the actual directives of the President. This note explores four subject areas that the President has tweeted about: judicial legitimacy, executive orders, removal of appointees, and entering into armed conflicts. Then, these topics will be considered in terms of whether presidential speech on social media should be regulated to protect against the risks of posting on the Internet and to ensure the preservation of the principles of democracy embedded in the …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …