Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

The University of Akron

Series

Internet

Articles 1 - 5 of 5

Full-Text Articles in Law

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton Sep 2014

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton

Akron Law Faculty Publications

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton Sep 2014

“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton

Akron Law Faculty Publications

In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation – the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …


Law Of The Intermediated Information Exchange, Jacqueline D. Lipton Sep 2014

Law Of The Intermediated Information Exchange, Jacqueline D. Lipton

Akron Law Faculty Publications

When Wikipedia, Google and other online service providers staged a ‘blackout protest’ against the Stop Online Piracy Act in January 2012, their actions inadvertently emphasized a fundamental truth that is often missed about the nature of cyberlaw. In attempts to address what is unique about the field, commentators have failed to appreciate that the field could – and should – be reconceputalized as a law of the global intermediated information exchange. Such a conception would provide a set of organizing principles that are lacking in existing scholarship. Nothing happens online that does not involve one or more intermediaries – the …


Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Sep 2014

Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Akron Law Faculty Publications

In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright …


Combating Cyber-Victimization, Jacqueline D. Lipton Sep 2014

Combating Cyber-Victimization, Jacqueline D. Lipton

Akron Law Faculty Publications

In today’s interconnected society, high profile examples of online victimization abound. Cyber-bullies, stalkers and harassers launch attacks on the less powerful, causing a variety of harms. Recent scholarship has identified some of the more salient damage, including reputational harms, severe emotional distress, loss of employment, and physical assault. Extreme cases of online abuse have resulted in death through suicide or as a result of targeted attacks. This article makes two major contributions to the cyber-victimization literature. It proposes specific reforms to criminal and tort laws to address this conduct more effectively. Further, it situates those reforms within a new multi-modal …