Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Law

Unite In Privacy Diversity: A Kaleidoscopic View Of Privacy Definitions, Bert-Jaap Koops, Masa Galic Jan 2021

Unite In Privacy Diversity: A Kaleidoscopic View Of Privacy Definitions, Bert-Jaap Koops, Masa Galic

South Carolina Law Review

No abstract provided.


When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin Oct 2019

When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin

South Carolina Law Review

No abstract provided.


Dear John, You Are A Human Trafficker, Mary Graw Leary Apr 2017

Dear John, You Are A Human Trafficker, Mary Graw Leary

South Carolina Law Review

No abstract provided.


Whether You Like It Or Not Your Likes Are Out: An Analysis Of Nonverbal Internet Conduct In The Hearsay Context, Olivia A. League Apr 2017

Whether You Like It Or Not Your Likes Are Out: An Analysis Of Nonverbal Internet Conduct In The Hearsay Context, Olivia A. League

South Carolina Law Review

No abstract provided.


The Long-Arm Of The Law: South Carolina's Long-Arm Statute And The Internet, Harry Lowenstein, Carla F. Grabert-Lowenstein Oct 2016

The Long-Arm Of The Law: South Carolina's Long-Arm Statute And The Internet, Harry Lowenstein, Carla F. Grabert-Lowenstein

South Carolina Law Review

No abstract provided.


Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow Apr 2010

Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow

Faculty Publications

Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


Protecting Speech V. Protecting Children: An Examination Of The Judicial Refusal To Allow Legislative Action In The Realm Of Minors And Internet Pornography, William H. Jordan Apr 2006

Protecting Speech V. Protecting Children: An Examination Of The Judicial Refusal To Allow Legislative Action In The Realm Of Minors And Internet Pornography, William H. Jordan

South Carolina Law Review

No abstract provided.


Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow Jan 2006

Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow

Faculty Publications

As wireless computer networks are becoming commonplace, so also is the practice of accessing the Internet through another's wireless network. The practice raises a simple question of law: Does accessing a wireless network, without express authorization, violate the property rights of the network operator? This Article argues that it does. A neighbor who intentionally accesses the Internet through a network operator's connection appears to trespass on physical property of the operator - the operator's router. Recent Internet jurisprudence suggests that the electronic signals that the neighbor sends through the router are sufficient to find trespassory physical contact. The same jurisprudence …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …


Family Court Files: A Treasure Trove For Identity Thieves, Melissa F. Brown Jul 2004

Family Court Files: A Treasure Trove For Identity Thieves, Melissa F. Brown

South Carolina Law Review

No abstract provided.


That Which We Call A Domain By Any Other Name Would Smell As Sweet: The Overbroad Protection Of Trademark Law As It Applies To Domain Names On The Internet, Neil Batavia Jan 2002

That Which We Call A Domain By Any Other Name Would Smell As Sweet: The Overbroad Protection Of Trademark Law As It Applies To Domain Names On The Internet, Neil Batavia

South Carolina Law Review

No abstract provided.


Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter A. Effross Jul 1998

Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter A. Effross

South Carolina Law Review

No abstract provided.


Electronic Commerce On The Internet And The Statute Of Frauds, R. J. Robertson Jr. Jul 1998

Electronic Commerce On The Internet And The Statute Of Frauds, R. J. Robertson Jr.

South Carolina Law Review

No abstract provided.


Couriers Without Luggage: Negotiable Instruments And Digital Signatures, Jane Kaufman Winn Jul 1998

Couriers Without Luggage: Negotiable Instruments And Digital Signatures, Jane Kaufman Winn

South Carolina Law Review

No abstract provided.


Internet Solutions To Consumer Protection Problems, Gregory E. Maggs Jul 1998

Internet Solutions To Consumer Protection Problems, Gregory E. Maggs

South Carolina Law Review

No abstract provided.


A Business Lawyer Looks At The Internet, John P. Freeman Jul 1998

A Business Lawyer Looks At The Internet, John P. Freeman

South Carolina Law Review

No abstract provided.


Personal Jurisdiction In Cyberspace: Something More Is Required On The Electronic Stream Of Commerce, Howard B. Stravitz Jul 1998

Personal Jurisdiction In Cyberspace: Something More Is Required On The Electronic Stream Of Commerce, Howard B. Stravitz

South Carolina Law Review

No abstract provided.


The Restatement's Rejection Of The Misappropriation Tort: A Victory For The Public Domain, Gary Myers Jul 1996

The Restatement's Rejection Of The Misappropriation Tort: A Victory For The Public Domain, Gary Myers

South Carolina Law Review

No abstract provided.


Constitutional Law, S. Tate Lester Iii Oct 1987

Constitutional Law, S. Tate Lester Iii

South Carolina Law Review

No abstract provided.