Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Computer Law

Discipline
Publication Year
Publication
File Type

Articles 1 - 30 of 84

Full-Text Articles in Law

Employee Electronic Communications In A Boundaryless World, Robert Sprague Dec 2015

Employee Electronic Communications In A Boundaryless World, Robert Sprague

Robert Sprague

In 2007, the National Labor Relations Board decided that an employer could maintain an email communications policy that prohibits nonwork-related messages, even if those messages involved communications otherwise protected under the National Labor Relations Act. In December 2014, the National Labor Relations Board reversed this holding, but in doing so, limited its decision to just workplace email. This article argues that such a prescription is outdated and archaic in light of today’s modern workplace filled with communications devices and systems that blur the distinction between work and personal life. This article explains that such a prescription can cause employees to …


Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges Dec 2015

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Net Neutrality - Computer Law, Matthew Charles Quattrochi Feb 2015

Net Neutrality - Computer Law, Matthew Charles Quattrochi

Matthew Charles Quattrochi

The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.Part II of this work will be dedicated to explaining …


Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett Dec 2014

Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett

John Ehrett

This Essay evaluates the dimensions of courts’ current interpretive dilemma, and subsequently sketches a possible framework for extending traditional statutory interpretation principles into this new domain. Throughout the analysis, the Essay describes the process of attaching cognizable linguistic referents to emoticons and emojis throughout as symbolical reification, and proposes a normative way forward for those tasked with deriving meaning from emoji-laden communications.


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Mar 2014

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

A. Michael Froomkin

US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart Aug 2013

Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart

Allyson Haynes Stuart

This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …


Incentives Must Change: Addressing The Unpredictability Of Reasonable Royalty Damages, Daniel Mcmanus Feb 2013

Incentives Must Change: Addressing The Unpredictability Of Reasonable Royalty Damages, Daniel Mcmanus

daniel mcmanus

ABSTRACT

INCENTIVES MUST CHANGE: ADDRESSING THE UNPREDICTABILITY OF REASONABLE ROYALTY DAMAGES

Current law encourages patentees and defendants in a patent infringement suit to make the most widely varying arguments for reasonable royalty damages. The parties have so much discretion in presenting calculations for reasonable royalty damages that it is not uncommon for the patentee to request damages 80-100 times greater than the infringer’s proposed damages. Permitting so much discretion makes it highly unlikely that the resulting damages will be reasonable, and thus fails to achieve the goal of determining a reasonable royalty.

The problem is simple. Patents are difficult to …


Online Social Media And The End Of The Employment-At-Will Doctrine, Robert Sprague, Abigail E. Fournier Dec 2012

Online Social Media And The End Of The Employment-At-Will Doctrine, Robert Sprague, Abigail E. Fournier

Robert Sprague

This article addresses the intersection of Section 7 protected concerted activities under the National Labor Relations Act and the common law employment-at-will doctrine. Employers are under pressure to ensure their online social media policies do not unlawfully chill protected Section 7 activities, freeing employees to discuss working conditions with coworkers through online social media platforms such as Facebook, Twitter, and LinkedIn. This article argues that once coworkers engage online in work-related conversations, for all practical purposes they cease to be at-will employees. Under the Wright Line standard, if an employee is fired or disciplined shortly after engaging in protected concerted …


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller Oct 2012

Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller

Jeffrey T Biller

Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …


Crowdsourcing Indie Movies, Henry H. Perritt Jr. Aug 2012

Crowdsourcing Indie Movies, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

Crowdsourcing Indie Movies

Henry H. Perritt, Jr.

Abstract

Internet-centered technology developments are revolutionizing the ways in which movies can be made. The use of crowdsourcing to make indie movies is a possibility that has not yet been explored fully, although the use of crowdsourcing to raise money for artistic works is growing. Crowdsourcing can be used for every step of making a movie, increasing the range of collaboration available to creators and reducing capital requirements. The article uses a fictional account of a team of young moviemakers to explain how they can use crowdsourcing for each step of making their …


The Large Immortal Machine And The Ticking Time Bomb, Susan Landau Aug 2012

The Large Immortal Machine And The Ticking Time Bomb, Susan Landau

Susan Landau

The 1994 Communications Assistance for Law Enforcement Act (CALEA) requires that digitally switched communications networks carrying voice be designed to accommodate (legally authorized) wiretaps. Since the law's passage, there have been a number of breaches in networks with CALEA-type switches. Despite the fact that CALEA is an "architected security breach," the Federal Communications Commission, whose role it is to promulgate CALEA requirements, the agency does not require any type of security testing or threat modeling for the switches. In this paper, I discuss the implications of the law to switch design, the breaches that have occurred, and what changes the …


Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel Aug 2012

Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel

Joshua M. Koppel

With the proliferation in recent years of electronically stored information and the skyrocketing cost of retaining large amounts of data, issues of preservation have played an increasing role in litigation. Companies and individuals that anticipate that they will be involved in litigation in the future may be obligated to preserve relevant evidence even before litigation is initiated. Because litigation has not yet commenced, they cannot seek clarification regarding their obligations from a court or negotiate them with an adverse party. Statutory or common law preservation duties play a large role in guiding potential litigants in this area.

The federal courts …


A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz Jun 2012

A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz

Andrew Pierz

Android began as a project by Andy Rubin after developing the Sidekick. The project was soon acquired by Google and licensed as open-source technology for third parties, like Samsung and HTC, to use in their phones. After Microsoft fell in mobile market share, they began to pursue aggressive litigation and licensing deals. Google, after pledging to defend their manufacturing partners, announced they would acquire Motorola Mobility for their patent portfolio. The paper will explore the history of Android and Windows Mobile, the extent of Microsoft’s mobile patent portfolio, the structure of Microsoft’s various deals, the planned acquisition of Motorola Mobility …


Law, Dissonance And Remote Computer Searches, Susan W. Brenner Jun 2012

Law, Dissonance And Remote Computer Searches, Susan W. Brenner

Susan Brenner

This article examines the rule dissonance that can arise when law enforcement officers from one jurisdiction, e.g., the United States, remotely search a computer in another jurisdiction, e.g., Russia. It explains that such a search occurred in 2000, when Federal Bureau of Investigation agents tricked two Russian cybercriminals to Seattle and tricked them into using laptops loaded with spyware to access their computer in Russia. The FBI agents then used the usernames and passwords the spyware recorded to access the Russian computer and download data, which was used to prosecute the Russians for violating U.S. cybercrime law. One moved to …


Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner Jun 2012

Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner

Susan Brenner

This article argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats, i.e., cybercrime, cyberterrorism and cyberwar. It explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratically organized response structure. It explains why this is not an effective way of approaching cyber-threat control and examines the two federal initiatives that are intended to improve the U.S. cybersecurity: legislative proposals put forward by four U.S. Senators and by the White House; and the military’s development of six distinct …


Can A Computer Intercept Your Email?, Bruce E. Boyden Mar 2012

Can A Computer Intercept Your Email?, Bruce E. Boyden

Bruce E. Boyden

In recent years it has become feasible for computers to rapidly scan the contents of large amounts of communications traffic to identify certain characteristics of those messages: that they are spam, contain malware, discuss various products or services, are written in a particular dialect, contain copyright-infringing files, or discuss symptoms of particular diseases. There is a wide variety of potential uses for this technology, such as research, filtering, or advertising. But the legal status of automated processing, if it is done without advance consent, is unclear. Where it results in the disclosure of the contents of a message to others, …


The Law Of The Zebra, Andrea Matwyshyn Feb 2012

The Law Of The Zebra, Andrea Matwyshyn

Andrea Matwyshyn

At the dawn of internet law, scholars and judged debated whether a “law of the horse” – a set of specific laws addressing technology problems – was ever needed. Time has demonstrated that, in some cases, the answer is yes. However, today courts are inherently confused regarding the trajectory for contract law in technology contexts: a technology-centric analysis is threatening to subvert traditional contract law and the future of entrepreneurship: circuit splits have emerged in what might be called an undesirable “law of the zebra.” Do contracts that involve technology indeed require exceptional contract rules? In particular, does the use …


Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague Dec 2011

Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague

Robert Sprague

In the past eighteen months, the National Labor Relations Board (“NLRB”) has received approximately one hundred charges from employees that were disciplined or fired as a result of their work-related online communications, principally through Facebook. These and other charges have resulted in twenty-one NLRB Office of the General Counsel Advice Memoranda, ten General Counsel reviews, four Administrative Law Judge (“ALJ”) decisions, and one Board decision, all addressing employee use of social media. This Article is the first to examine in detail those employee charges and the thirty-six incidents addressed by the Office of the General Counsel, the ALJs, and the …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan Dec 2011

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan

Richard Warner

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …


Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington Oct 2011

Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington

Sarah H. Ludington

No abstract provided.


Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo Sep 2011

Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo

David M. Longo

No abstract provided.