Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (19)
- Internet Law (14)
- Science and Technology Law (8)
- Communications Law (5)
- First Amendment (5)
-
- Constitutional Law (4)
- Law and Economics (4)
- Law and Society (4)
- Commercial Law (3)
- Contracts (3)
- Entertainment, Arts, and Sports Law (3)
- Intellectual Property Law (3)
- Labor and Employment Law (3)
- Administrative Law (2)
- Privacy Law (2)
- Public Law and Legal Theory (2)
- Air and Space Law (1)
- Arts and Humanities (1)
- Business (1)
- Criminal Law (1)
- Criminal Procedure (1)
- E-Commerce (1)
- Education Law (1)
- Energy and Utilities Law (1)
- Environmental Law (1)
- Evidence (1)
- Fourth Amendment (1)
- Law Enforcement and Corrections (1)
- Legislation (1)
- Publication Year
- Publication
-
- Henry H. Perritt, Jr. (6)
- Robert Sprague (6)
- Ivo Teixeira Gico Jr. (5)
- Robert B. Ahdieh (5)
- Richard Warner (4)
-
- H. Brian Holland (3)
- Roger M. Groves (3)
- Andrew Chin (2)
- Eric M Fink (2)
- Jorge R Roig (2)
- Michael Katz (2)
- Susan Brenner (2)
- A. Michael Froomkin (1)
- AMIT GUPTA Dr. (1)
- Allyson Haynes Stuart (1)
- Andrew Pierz (1)
- Assaf Jacob (1)
- Austin James Nowakowski (1)
- Bruce E. Boyden (1)
- David M. Longo (1)
- Douglas A Fretty (1)
- Eli Edwards (1)
- Graeme B. Dinwoodie (1)
- Jack F. Williams (1)
- Jacqueline D Lipton (1)
- Jeffrey T Biller (1)
- John L Hughes III (1)
- Joshua M. Koppel (1)
- Lyrissa Barnett Lidsky (1)
- Marc Adam Sherman (1)
Articles 1 - 30 of 70
Full-Text Articles in Law
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Matthew Charles Quattrochi
The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.Part II of this work will be dedicated to explaining …
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …
No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague
Robert Sprague
This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Richard Warner
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …
Online Social Media And The End Of The Employment-At-Will Doctrine, Robert Sprague, Abigail E. Fournier
Online Social Media And The End Of The Employment-At-Will Doctrine, Robert Sprague, Abigail E. Fournier
Robert Sprague
This article addresses the intersection of Section 7 protected concerted activities under the National Labor Relations Act and the common law employment-at-will doctrine. Employers are under pressure to ensure their online social media policies do not unlawfully chill protected Section 7 activities, freeing employees to discuss working conditions with coworkers through online social media platforms such as Facebook, Twitter, and LinkedIn. This article argues that once coworkers engage online in work-related conversations, for all practical purposes they cease to be at-will employees. Under the Wright Line standard, if an employee is fired or disciplined shortly after engaging in protected concerted …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller
Jeffrey T Biller
Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …
Crowdsourcing Indie Movies, Henry H. Perritt Jr.
Crowdsourcing Indie Movies, Henry H. Perritt Jr.
Henry H. Perritt, Jr.
Crowdsourcing Indie Movies
Henry H. Perritt, Jr.
Abstract
Internet-centered technology developments are revolutionizing the ways in which movies can be made. The use of crowdsourcing to make indie movies is a possibility that has not yet been explored fully, although the use of crowdsourcing to raise money for artistic works is growing. Crowdsourcing can be used for every step of making a movie, increasing the range of collaboration available to creators and reducing capital requirements. The article uses a fictional account of a team of young moviemakers to explain how they can use crowdsourcing for each step of making their …
The Large Immortal Machine And The Ticking Time Bomb, Susan Landau
The Large Immortal Machine And The Ticking Time Bomb, Susan Landau
Susan Landau
The 1994 Communications Assistance for Law Enforcement Act (CALEA) requires that digitally switched communications networks carrying voice be designed to accommodate (legally authorized) wiretaps. Since the law's passage, there have been a number of breaches in networks with CALEA-type switches. Despite the fact that CALEA is an "architected security breach," the Federal Communications Commission, whose role it is to promulgate CALEA requirements, the agency does not require any type of security testing or threat modeling for the switches. In this paper, I discuss the implications of the law to switch design, the breaches that have occurred, and what changes the …
Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel
Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel
Joshua M. Koppel
With the proliferation in recent years of electronically stored information and the skyrocketing cost of retaining large amounts of data, issues of preservation have played an increasing role in litigation. Companies and individuals that anticipate that they will be involved in litigation in the future may be obligated to preserve relevant evidence even before litigation is initiated. Because litigation has not yet commenced, they cannot seek clarification regarding their obligations from a court or negotiate them with an adverse party. Statutory or common law preservation duties play a large role in guiding potential litigants in this area.
The federal courts …
A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz
A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz
Andrew Pierz
Android began as a project by Andy Rubin after developing the Sidekick. The project was soon acquired by Google and licensed as open-source technology for third parties, like Samsung and HTC, to use in their phones. After Microsoft fell in mobile market share, they began to pursue aggressive litigation and licensing deals. Google, after pledging to defend their manufacturing partners, announced they would acquire Motorola Mobility for their patent portfolio. The paper will explore the history of Android and Windows Mobile, the extent of Microsoft’s mobile patent portfolio, the structure of Microsoft’s various deals, the planned acquisition of Motorola Mobility …
Law, Dissonance And Remote Computer Searches, Susan W. Brenner
Law, Dissonance And Remote Computer Searches, Susan W. Brenner
Susan Brenner
This article examines the rule dissonance that can arise when law enforcement officers from one jurisdiction, e.g., the United States, remotely search a computer in another jurisdiction, e.g., Russia. It explains that such a search occurred in 2000, when Federal Bureau of Investigation agents tricked two Russian cybercriminals to Seattle and tricked them into using laptops loaded with spyware to access their computer in Russia. The FBI agents then used the usernames and passwords the spyware recorded to access the Russian computer and download data, which was used to prosecute the Russians for violating U.S. cybercrime law. One moved to …
Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner
Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner
Susan Brenner
This article argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats, i.e., cybercrime, cyberterrorism and cyberwar. It explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratically organized response structure. It explains why this is not an effective way of approaching cyber-threat control and examines the two federal initiatives that are intended to improve the U.S. cybersecurity: legislative proposals put forward by four U.S. Senators and by the White House; and the military’s development of six distinct …
Can A Computer Intercept Your Email?, Bruce E. Boyden
Can A Computer Intercept Your Email?, Bruce E. Boyden
Bruce E. Boyden
In recent years it has become feasible for computers to rapidly scan the contents of large amounts of communications traffic to identify certain characteristics of those messages: that they are spam, contain malware, discuss various products or services, are written in a particular dialect, contain copyright-infringing files, or discuss symptoms of particular diseases. There is a wide variety of potential uses for this technology, such as research, filtering, or advertising. But the legal status of automated processing, if it is done without advance consent, is unclear. Where it results in the disclosure of the contents of a message to others, …
Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague
Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague
Robert Sprague
In the past eighteen months, the National Labor Relations Board (“NLRB”) has received approximately one hundred charges from employees that were disciplined or fired as a result of their work-related online communications, principally through Facebook. These and other charges have resulted in twenty-one NLRB Office of the General Counsel Advice Memoranda, ten General Counsel reviews, four Administrative Law Judge (“ALJ”) decisions, and one Board decision, all addressing employee use of social media. This Article is the first to examine in detail those employee charges and the thirty-six incidents addressed by the Office of the General Counsel, the ALJs, and the …
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Richard Warner
When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo
Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo
David M. Longo
No abstract provided.
Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes
Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes
John L Hughes III
As the use of social media increases and becomes an integral part of nearly every student’s life, problems arise when student expression on these sites turns into threats against the school or other students, implicating both student safety and the speaker’s right to free speech. Facing a lack of Supreme Court precedent, school officials need guidance on whether and how to take action when a student makes threats on a social network—how to prevent any danger at school while respecting the student’s right to free speech. This Article provides that guidance. It develops an approach that combines the Supreme Court’s …
Face-Recognition Surveillance: A Moment Of Truth For Fourth Amendment Rights In Public Places, Douglas Fretty
Face-Recognition Surveillance: A Moment Of Truth For Fourth Amendment Rights In Public Places, Douglas Fretty
Douglas A Fretty
Americans are increasingly monitored with face-recognition technology (FRT), a surveillance tool that allows the state to identify a pedestrian based on a pre-existing database of facial photographs. This Article argues that FRT embodies the fundamental Fourth Amendment dilemmas raised by contemporary digital surveillance and will serve as harbinger for the Amendment’s future. FRT cases will test whether people retain a reasonable expectation of privacy in their identities when they move in public, and whether the aggregation of information about a person’s movements amounts to an unreasonable search. Further, the suspicionless identification of pedestrians will test whether a seizure can occur …
Public Forum 2.0, Lyrissa Lidsky
Public Forum 2.0, Lyrissa Lidsky
Lyrissa Barnett Lidsky
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media, or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
Gene Probes As Unpatentable Printed Matter, Andrew Chin
Gene Probes As Unpatentable Printed Matter, Andrew Chin
Andrew Chin
In this Article, I argue that the most problematic kind of gene patents — those claiming short DNA molecules used to probe for longer gene sequences — should be held invalid as directed to unpatentable printed matter. This argument, which emerges from recent developments in biotechnology and information technology, is grounded in the printed matter doctrine’s structural role of obviating patentability inquiries directed to inapposite information-management considerations. Where the inventive contribution in a claimed gene probe subsists solely in stored sequence information, these inapposite considerations lead the novelty and nonobviousness analyses to anomalous results that the printed matter doctrine was …
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague
Robert Sprague
Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …