Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (23)
- Internet Law (17)
- Science and Technology Law (11)
- Communications Law (8)
- First Amendment (6)
-
- Labor and Employment Law (5)
- Law and Society (5)
- Constitutional Law (4)
- Intellectual Property Law (4)
- Law and Economics (4)
- Privacy Law (4)
- Commercial Law (3)
- Contracts (3)
- Entertainment, Arts, and Sports Law (3)
- Administrative Law (2)
- Arts and Humanities (2)
- Business (2)
- Comparative and Foreign Law (2)
- Evidence (2)
- Fourth Amendment (2)
- International Law (2)
- Public Law and Legal Theory (2)
- Technology and Innovation (2)
- Air and Space Law (1)
- Business and Corporate Communications (1)
- Criminal Law (1)
- Criminal Procedure (1)
- E-Commerce (1)
- Education Law (1)
- Publication Year
- Publication
-
- Robert Sprague (8)
- Henry H. Perritt, Jr. (6)
- Ivo Teixeira Gico Jr. (5)
- Robert B. Ahdieh (5)
- Richard Warner (4)
-
- H. Brian Holland (3)
- Michael Katz (3)
- Roger M. Groves (3)
- Andrew Chin (2)
- Eric M Fink (2)
- Jennifer Hammitt (2)
- Jorge R Roig (2)
- Joshua A.T. Fairfield (2)
- Susan Brenner (2)
- A. Michael Froomkin (1)
- AMIT GUPTA Dr. (1)
- Allyson Haynes Stuart (1)
- Andrea Matwyshyn (1)
- Andrew Pierz (1)
- Assaf Jacob (1)
- Austin James Nowakowski (1)
- Bruce E. Boyden (1)
- David M. Longo (1)
- Douglas A Fretty (1)
- Eli Edwards (1)
- Graeme B. Dinwoodie (1)
- Jack F. Williams (1)
- Jacqueline D Lipton (1)
- Jeffrey T Biller (1)
- John Ehrett (1)
- File Type
Articles 1 - 30 of 84
Full-Text Articles in Law
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges
Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges
Patrick T. Ryan
This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Matthew Charles Quattrochi
The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.Part II of this work will be dedicated to explaining …
Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett
Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett
John Ehrett
This Essay evaluates the dimensions of courts’ current interpretive dilemma, and subsequently sketches a possible framework for extending traditional statutory interpretation principles into this new domain. Throughout the analysis, the Essay describes the process of attaching cognizable linguistic referents to emoticons and emojis throughout as symbolical reification, and proposes a normative way forward for those tasked with deriving meaning from emoji-laden communications.
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …
No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague
Robert Sprague
This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Richard Warner
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …
Incentives Must Change: Addressing The Unpredictability Of Reasonable Royalty Damages, Daniel Mcmanus
Incentives Must Change: Addressing The Unpredictability Of Reasonable Royalty Damages, Daniel Mcmanus
daniel mcmanus
ABSTRACT
INCENTIVES MUST CHANGE: ADDRESSING THE UNPREDICTABILITY OF REASONABLE ROYALTY DAMAGES
Current law encourages patentees and defendants in a patent infringement suit to make the most widely varying arguments for reasonable royalty damages. The parties have so much discretion in presenting calculations for reasonable royalty damages that it is not uncommon for the patentee to request damages 80-100 times greater than the infringer’s proposed damages. Permitting so much discretion makes it highly unlikely that the resulting damages will be reasonable, and thus fails to achieve the goal of determining a reasonable royalty.
The problem is simple. Patents are difficult to …
Online Social Media And The End Of The Employment-At-Will Doctrine, Robert Sprague, Abigail E. Fournier
Online Social Media And The End Of The Employment-At-Will Doctrine, Robert Sprague, Abigail E. Fournier
Robert Sprague
This article addresses the intersection of Section 7 protected concerted activities under the National Labor Relations Act and the common law employment-at-will doctrine. Employers are under pressure to ensure their online social media policies do not unlawfully chill protected Section 7 activities, freeing employees to discuss working conditions with coworkers through online social media platforms such as Facebook, Twitter, and LinkedIn. This article argues that once coworkers engage online in work-related conversations, for all practical purposes they cease to be at-will employees. Under the Wright Line standard, if an employee is fired or disciplined shortly after engaging in protected concerted …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller
Jeffrey T Biller
Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …
Crowdsourcing Indie Movies, Henry H. Perritt Jr.
Crowdsourcing Indie Movies, Henry H. Perritt Jr.
Henry H. Perritt, Jr.
Crowdsourcing Indie Movies
Henry H. Perritt, Jr.
Abstract
Internet-centered technology developments are revolutionizing the ways in which movies can be made. The use of crowdsourcing to make indie movies is a possibility that has not yet been explored fully, although the use of crowdsourcing to raise money for artistic works is growing. Crowdsourcing can be used for every step of making a movie, increasing the range of collaboration available to creators and reducing capital requirements. The article uses a fictional account of a team of young moviemakers to explain how they can use crowdsourcing for each step of making their …
The Large Immortal Machine And The Ticking Time Bomb, Susan Landau
The Large Immortal Machine And The Ticking Time Bomb, Susan Landau
Susan Landau
The 1994 Communications Assistance for Law Enforcement Act (CALEA) requires that digitally switched communications networks carrying voice be designed to accommodate (legally authorized) wiretaps. Since the law's passage, there have been a number of breaches in networks with CALEA-type switches. Despite the fact that CALEA is an "architected security breach," the Federal Communications Commission, whose role it is to promulgate CALEA requirements, the agency does not require any type of security testing or threat modeling for the switches. In this paper, I discuss the implications of the law to switch design, the breaches that have occurred, and what changes the …
Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel
Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel
Joshua M. Koppel
With the proliferation in recent years of electronically stored information and the skyrocketing cost of retaining large amounts of data, issues of preservation have played an increasing role in litigation. Companies and individuals that anticipate that they will be involved in litigation in the future may be obligated to preserve relevant evidence even before litigation is initiated. Because litigation has not yet commenced, they cannot seek clarification regarding their obligations from a court or negotiate them with an adverse party. Statutory or common law preservation duties play a large role in guiding potential litigants in this area.
The federal courts …
A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz
A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz
Andrew Pierz
Android began as a project by Andy Rubin after developing the Sidekick. The project was soon acquired by Google and licensed as open-source technology for third parties, like Samsung and HTC, to use in their phones. After Microsoft fell in mobile market share, they began to pursue aggressive litigation and licensing deals. Google, after pledging to defend their manufacturing partners, announced they would acquire Motorola Mobility for their patent portfolio. The paper will explore the history of Android and Windows Mobile, the extent of Microsoft’s mobile patent portfolio, the structure of Microsoft’s various deals, the planned acquisition of Motorola Mobility …
Law, Dissonance And Remote Computer Searches, Susan W. Brenner
Law, Dissonance And Remote Computer Searches, Susan W. Brenner
Susan Brenner
This article examines the rule dissonance that can arise when law enforcement officers from one jurisdiction, e.g., the United States, remotely search a computer in another jurisdiction, e.g., Russia. It explains that such a search occurred in 2000, when Federal Bureau of Investigation agents tricked two Russian cybercriminals to Seattle and tricked them into using laptops loaded with spyware to access their computer in Russia. The FBI agents then used the usernames and passwords the spyware recorded to access the Russian computer and download data, which was used to prosecute the Russians for violating U.S. cybercrime law. One moved to …
Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner
Cyber-Threats And The Limits Of Bureaucratic Control, Susan W. Brenner
Susan Brenner
This article argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats, i.e., cybercrime, cyberterrorism and cyberwar. It explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratically organized response structure. It explains why this is not an effective way of approaching cyber-threat control and examines the two federal initiatives that are intended to improve the U.S. cybersecurity: legislative proposals put forward by four U.S. Senators and by the White House; and the military’s development of six distinct …
Can A Computer Intercept Your Email?, Bruce E. Boyden
Can A Computer Intercept Your Email?, Bruce E. Boyden
Bruce E. Boyden
In recent years it has become feasible for computers to rapidly scan the contents of large amounts of communications traffic to identify certain characteristics of those messages: that they are spam, contain malware, discuss various products or services, are written in a particular dialect, contain copyright-infringing files, or discuss symptoms of particular diseases. There is a wide variety of potential uses for this technology, such as research, filtering, or advertising. But the legal status of automated processing, if it is done without advance consent, is unclear. Where it results in the disclosure of the contents of a message to others, …
The Law Of The Zebra, Andrea Matwyshyn
The Law Of The Zebra, Andrea Matwyshyn
Andrea Matwyshyn
At the dawn of internet law, scholars and judged debated whether a “law of the horse” – a set of specific laws addressing technology problems – was ever needed. Time has demonstrated that, in some cases, the answer is yes. However, today courts are inherently confused regarding the trajectory for contract law in technology contexts: a technology-centric analysis is threatening to subvert traditional contract law and the future of entrepreneurship: circuit splits have emerged in what might be called an undesirable “law of the zebra.” Do contracts that involve technology indeed require exceptional contract rules? In particular, does the use …
Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague
Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague
Robert Sprague
In the past eighteen months, the National Labor Relations Board (“NLRB”) has received approximately one hundred charges from employees that were disciplined or fired as a result of their work-related online communications, principally through Facebook. These and other charges have resulted in twenty-one NLRB Office of the General Counsel Advice Memoranda, ten General Counsel reviews, four Administrative Law Judge (“ALJ”) decisions, and one Board decision, all addressing employee use of social media. This Article is the first to examine in detail those employee charges and the thirty-six incidents addressed by the Office of the General Counsel, the ALJs, and the …
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Richard Warner
When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington
Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington
Sarah H. Ludington
No abstract provided.
Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo
Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo
David M. Longo
No abstract provided.