Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

SelectedWorks

Computer Law

Articles 1 - 30 of 212

Full-Text Articles in Law

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Aug 2015

E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …


Toward A New Language Of Legal Drafting, Matthew Roach Jul 2015

Toward A New Language Of Legal Drafting, Matthew Roach

Matthew Roach

Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.


The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez Apr 2015

The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez

Christopher McElwain

Just as China’s factories disrupted the economics of IT hardware, its research labs have the potential to disrupt the economics of the technology itself. In 2014, China’s patent office received nearly 2.4 million patent applications, 93% from domestic applicants. China has also climbed to third place in terms of international applications, with over 21,000 WIPO PCT applications. Meanwhile, China has taken an assertive role in setting technology standards, both at the national and international levels. In the past, this has included developing and promoting alternatives to important IT standards as a means of challenging perceived monopolies by certain (foreign-dominated) technologies. …


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jan 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

This paper will examine new models for the carriage of Internet traffic with an eye toward providing insights on how the interconnection process has changed and what positive and negative consequences have resulted. Internet Service Provider (“ISP”) interconnection used to constitute a cooperative undertaking, but now it increasingly requires difficult and protracted negotiations between ventures that consider themselves adversaries in a winner take all transaction. The paper concludes that new commercial arrangements, such as paid peering, can achieve mutually beneficial outcomes. However, the paper also identifies instances where migration from traditional interconnection arrangements can harm consumers by reducing some of …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden Sep 2014

Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden

Rob Frieden

Many advocates for less intrusive government oversight of telecommunications support the migration from regulation by an expert agency to the use of adjudication remedies largely guided by antitrust/competition policy principles. They believe that competition authorities, or reviewing courts can resolve disputes after they have occurred in lieu of having expert regulatory agencies available to anticipate and resolve problems before they become acute. Such ex post remedies typically determine whether anticompetitive conduct has occurred and what marketplace harm has resulted. Advocates for retaining so-called ex ante regulation believe that an expert agency remains essential particularly in light of fast changing market …


What’S New In The Network Neutrality Debate, Rob Frieden Sep 2014

What’S New In The Network Neutrality Debate, Rob Frieden

Rob Frieden

For over ten years, academics, practitioners, policy makers, consumers and other stakeholders have debated whether and how governments should regulate the Internet with an eye toward promoting accessibility, affordability and neutrality. This issue has triggered grave concerns about the Internet’s ability to continue generating substantial and widespread benefits. Advocates for various outcomes have vastly different assessments about many baseline subjects including the viability of sustainable competition and self-regulation. Consumers become agitated and confused by different framing of the issues, particularly when participants in the Internet ecosystem cannot reach closure on interconnection and compensation issues. Increasingly these disputes trigger temporary degradation …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega Apr 2014

Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega

Guido Noto La Diega

‘Cloud computing’ in simplified terms can be understood as the storing, processing and use of data on remotely located computers accessed over the internet. This means that users can command almost unlimited computing power on demand, that they do not have to make major capital investments to fulfil their needs and that they can get to their data from anywhere with an internet connection (COM(2012) 529 final, unleashing the potential of cloud computing in Europe). The essay focuses on the problems of privacy and data security in european law and italian law from the perspective of cloud computing. Italian Abstract: …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum Jan 2014

How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum

Angela Goodrum

No abstract provided.


New Models And Conflicts In The Interconnection And Delivery, Rob Frieden Jan 2014

New Models And Conflicts In The Interconnection And Delivery, Rob Frieden

Rob Frieden

As the Internet has evolved and diversified, interconnection terms and conditions have changed between Internet Service Providers (“ISPs”). These carriers experiment with alternatives to conventional models that classify interconnection as either peering or transiting. The former typically involves interconnection between high capacity carriers whose transoceanic traffic volumes generally match thereby eliminating the need for a transfer of funds. Historically smaller carriers have paid transit fees to larger Tier-1 ISPs for the opportunity to secure upstream links throughout the Internet cloud. With the growing availability of bandwidth intensive, video content carried via the Internet, traffic volume disparities have increased between ISPs. …


Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden Jan 2014

Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum May 2013

Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum

Angela Goodrum

No abstract provided.


New Institutions For The Protection Of Privacy And Personal Dignity In Internet Communication – “Information Broker”, “Private Cyber Courts” And Network Of Contracts, Karl-Heinz Ladeur Apr 2013

New Institutions For The Protection Of Privacy And Personal Dignity In Internet Communication – “Information Broker”, “Private Cyber Courts” And Network Of Contracts, Karl-Heinz Ladeur

Karl-Heinz Ladeur

Symposium "Beyond Montesquieu: Re-thinking the architecture of contemporary governance" (Dublin, March 2012): The internet needs new types of legal ordering, which are adapted to self-regulation and the rapid transformation of knowledge and social norms. Data protection, public investigation, “social media” and financial markets challenge the classical orientation of the legal system towards individual behaviour. The new “addressees” of law are networks as quasi-subjects. New regimes of proceduralisation can structure the development of a “net-friendly” paradigm of a law beyond the individual. The article tries to demonstrate the feasibility of such a model with reference to the above-mentioned challenges.


Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor Feb 2013

Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor

Jonathan I. Ezor

No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.


Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser Jan 2013

Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser

Lily M Strumwasser

Dear Editor:

I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …


Holy Internet, Bringer Of Truth, Pray For The Church’S Sinners, Now And At The Hour Of It’S Death…: The Internet’S Impact On The Priest Abuse Crisis, Joanne E. Wilson Jan 2013

Holy Internet, Bringer Of Truth, Pray For The Church’S Sinners, Now And At The Hour Of It’S Death…: The Internet’S Impact On The Priest Abuse Crisis, Joanne E. Wilson

Joanne E Wilson

The Roman Catholic Church is being murdered. Yet, the attempted murderer is still free. The accused attempted murderer is the Internet. Throughout history, the Church has tried to halt communication in order to maintain control of its flock. But inventions in communication have empowered society while loosening the Church’s grip on the lives of its parishioners. A fatal wound was created in the mid fifteenth century with Johannes Gutenberg’s invention of the movable type printing press. An artery of the Church was spliced open in 1517 when Martin Luther nailed his ninety-five page written revolt against the Church on the …


Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance, Scott Shackelford Aug 2012

Toward Cyber Peace: Managing Cyber Attacks Through Polycentric Governance, Scott Shackelford

Scott Shackelford

Views range widely about the seriousness of cyber attacks and the likelihood of cyber war. But even framing cyber attacks within the context of a loaded category like war can be an oversimplification that shifts focus away from enhancing cybersecurity against the full range of threats now facing companies, countries, and the international community. Current methods are proving ineffective at managing cyber attacks, and as cybersecurity legislation is being debated in the U.S. Congress and around the world the time is ripe for a fresh look at this critical topic. This Article searches for alternative avenues to foster cyber peace …


The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, Steven Silver Aug 2012

The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, Steven Silver

Steven Silver

Once relegated to the Nevada desert and New Jersey shore, gambling is now everywhere in the United States. State governments strapped for cash and desperate for increased tax revenues are welcoming gambling with open arms as forty-three states sponsor lotteries and twenty-three states house casinos. Despite this gaming boom, the ease of access to casinos has not deterred entrepreneurs from successfully creating an offshoot industry of “convenience casinos.” Convenience casinos are simply Internet cafes that sell Internet time cards attached with instant-win sweepstakes entries, much like the code underneath a Coke bottle or a McDonald’s Monopoly game piece. Although seemingly …


The Mixed Blessing Of A Deregulatory Endpoint For The Public Switched Telephone Network, Rob Frieden Mar 2012

The Mixed Blessing Of A Deregulatory Endpoint For The Public Switched Telephone Network, Rob Frieden

Rob Frieden

Receiving authority to dismantle the wireline public switched telephone network (“PSTN”) will deliver a mixture of financial benefits and costs to incumbent carriers. Even if these carriers continue to provide basic telephone services via wireless facilities, they will benefit from substantial relaxation of common carriage duties, no longer having to serve as the carrier of last resort and having the opportunity to decide whether and where to provide service. On the other hand, incumbent carriers may have underestimated the substantial financial and marketplace advantages they also will likely lose in the deregulatory process. This paper will identify the potential problems …