Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Incendiary Speech And Social Media, Lyrissa Barnett Lidsky Dec 2014

Incendiary Speech And Social Media, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky Dec 2014

Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons-some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat these suits …


Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe Dec 2014

Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe

Elizabeth A Rowe

This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …


Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Dec 2014

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

Elizabeth A Rowe

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Dec 2014

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

Elizabeth A Rowe

When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …


'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino Sep 2014

'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino

Laurie B. Serafino

Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …


Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall Mar 2014

Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall

Adam A Marshall

In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

William L. Reynolds

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


A Methodological Proposal For A National Survey Of Data Protection In E-Government In Mexico, Teresa M. G. Da Cunha Lopes Dec 2013

A Methodological Proposal For A National Survey Of Data Protection In E-Government In Mexico, Teresa M. G. Da Cunha Lopes

Teresa M. G. Da Cunha Lopes

The present research paper is an attempt to study the aspects related to e-government and data protection in Mexico, and at the same time, in view of the lack of empirical data presents a methodological proposal for the urgent implementation of a national survey. We focus in the protection of personal data used by public administrators to provide public services.


Internet Transforms Finance - Understanding Regulation Of Online Insurance Business In China, Tao (Tim) Liang Dec 2013

Internet Transforms Finance - Understanding Regulation Of Online Insurance Business In China, Tao (Tim) Liang

Tao LIANG

China’s internet population grew to 591 million by this June, with an internet penetration rate increasing from 20% in 2008 to 44% in June 2013. The last five years have also witnessed an explosion in the growth of electronic commerce transactions in China whose trading volume increases from 3.1 trillion RMB in 2008 to 7.9 trillion RMB in 2012. More specifically, the internet and related technology developments are significantly changing the characteristics and landscapes of the financial service industries of China.


"¿Qué Información Hay Que Facilitar Al Consumidor Cuando Adquiere Productos Alimenticios Por Internet O Mediante Otros Sistemas De Comunicación A Distancia?", Luis González Vaqué Dec 2013

"¿Qué Información Hay Que Facilitar Al Consumidor Cuando Adquiere Productos Alimenticios Por Internet O Mediante Otros Sistemas De Comunicación A Distancia?", Luis González Vaqué

Luis González Vaqué

Para garantizar la información alimentaria, es necesario tener en cuenta todas las formas de suministrar alimentos a los consumidores, como la venta de alimentos mediante técnicas de comunicación a distancia. Es evidente que cualquier alimento suministrado a través de la venta a distancia debe cumplir los mismos requisitos de información que los alimentos vendidos en los comercios; por lo tanto, el art. 14 del Reglamento nº 1169/2011 establece la información alimentaria obligatoria pertinente en tales casos y que también debe estar disponible antes de realizar la compra.