Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Internet Law

Michigan Telecommunications & Technology Law Review

Websites

Articles 1 - 11 of 11

Full-Text Articles in Law

Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren Jan 2011

Does Law Matter Online - Empirical Evidence On Privacy Law Compliance, Michael Birnhack, Niva Elkin-Koren

Michigan Telecommunications & Technology Law Review

Does law matter in the information environment? What can we learn from the experience of applying a particular legal regime to the online environment? Informational privacy (or to use the European term, data protection) provides an excellent illustration of the challenges faced by regulators who seek to secure user rights and shape online behavior. A comprehensive study of Israeli website compliance with information privacy regulation in 2003 and 2006 provides insights for understanding these challenges. The study examined the information privacy practices of 1360 active websites, determining the extent to which these sites comply with applicable legal requirements related to …


Market For Private Dispute Resolution Services - An Empirical Re-Assessment Of Icann-Udrp Performance, The, Jay P. Kesan, Andres A. Gallo Apr 2005

Market For Private Dispute Resolution Services - An Empirical Re-Assessment Of Icann-Udrp Performance, The, Jay P. Kesan, Andres A. Gallo

Michigan Telecommunications & Technology Law Review

We present a thorough analysis of one of the ADR regimes that is considered a significant success in Internet markets, the Uniform Dispute Resolution Policy (UDRP) implemented by the Internet Corporation for Assigned Names and Numbers (ICANN). In this work, we perform a complete empirical analysis of the UDRP and evaluate its performance. We then extrapolate the results to other sectors of the Internet market and to private dispute resolution in general.[...] In this paper, we thoroughly critique the performance of the UDRP providers and identify the main variables that determine ICANN's efficiency. For example, one of the key variables, …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin Apr 2003

Regulating Speech Across Borders: Technology Vs. Values, Matthew Fagin

Michigan Telecommunications & Technology Law Review

The disfavored status within international law of unilateral state-based regulations that target extraterritorial actors arises from the inherent challenges such actions represent to state sovereignty. In the context of the Internet, the complexity of choice-of-law analysis is heightened: regulations imposed by one state have the potential to effectively block communications to citizens of all states and undermine the conflicting regulatory aims of neighboring states. Early legal commentators built upon this cascading chilling effect of state-based regulation to proclaim both the futility and illegitimacy of state-based action in the online environment. Subsequent scholars have demonstrated the commensurability of state-based online regulation …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


The Emergence Of Website Privacy Norms, Steven A. Hetcher Jun 2001

The Emergence Of Website Privacy Norms, Steven A. Hetcher

Michigan Telecommunications & Technology Law Review

Part I of the Article will first look at the original privacy norms that emerged at the Web's inception in the early 1990s. Two groups have been the main contributors to the emergence of these norms; the thousands of commercial websites on the early Web, on the one hand, and the millions of users of the early Web, on the other hand. The main structural feature of these norms was that websites benefitted through the largely unrestricted collection of personal data while consumers suffered injury due to the degradation of their personal privacy from this data collection. In other words, …


Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont Jun 2001

Criminalization Of True Anonymity In Cyberspace, The, George F. Du Pont

Michigan Telecommunications & Technology Law Review

The question of whether a state or the federal government can create a narrowly tailored restriction on cyberspace anonymity without violating the First Amendment remains unresolved[...]The Supreme Court has not directly addressed the issue, but it may soon consider the constitutionality of criminalizing certain kinds of cyber-anonymity in light of the unique nature of cyberspace. This comment explores the various forms of anonymity, examines the First Amendment status of anonymity in and outside of cyberspace, analyzes relevant scholarly commentary, and concludes that a narrowly tailored legislative restriction on "true" anonymity in cyberspace would not violate the First Amendment.


Looking A Gift Horse In The Mouth: An Analysis Of Free Internet Stock Offerings, Joel Michael Schwarz Jun 2000

Looking A Gift Horse In The Mouth: An Analysis Of Free Internet Stock Offerings, Joel Michael Schwarz

Michigan Telecommunications & Technology Law Review

How much should an investor pay for one share of stock in Yahoo? Or a share of stock in America Online? As publicly traded companies, one need only consult the stock charts in any local newspaper to determine the value the market has placed on these shares. Despite what many Internet sector analysts have professed to be astronomically high valuations, these publicly traded companies possess easily verifiable valuations determined by the free market forces that constitute the building blocks of our economy, and safeguarded by the oversight of federal regulators such as the Securities & Exchange Commission ("SEC"). But what …


Trademark Issues In Cyberspace: The Brave New Frontier, Sally M. Abel Jun 1999

Trademark Issues In Cyberspace: The Brave New Frontier, Sally M. Abel

Michigan Telecommunications & Technology Law Review

Cyberspace raises a variety of thought-provoking trademark and trademark-related issues. While many of the issues and problems that arise may be analyzed and resolved from the vantage point of traditional notions of trademark law, others present thornier questions requiring greater sensitivity to the practical effect of cyberspace on the commercial marketplace. The cyberspace trademark issue that continues to get the most press is the domain name controversy. Is a domain a trademark? When does use of a domain infringe trademark rights? If someone else registers a company's name or trademark as their domain, what can the company do? Beyond domains …


Internet Framing: Complement Or Hijack , Raymond Chan Jun 1999

Internet Framing: Complement Or Hijack , Raymond Chan

Michigan Telecommunications & Technology Law Review

Currently, the technology of "framing" allows a web site to: (1) pull in the contents of an external site into the local site; (2) "chop" up the contents of the external site into different "frames" or parts; and (3) display only the frames that are beneficial to the framing site. When an advertisements is blocked off by a frame, an advertiser who paid to advertise at an external (framed) site may cease to purchase advertising space from that external site if the framing activities of another web site prevent the advertisement from reaching prospective viewers. From the perspective of the …


Jurisdiction In Cyberspace: A Theory Of International Spaces, Darrel C. Menthe Jun 1998

Jurisdiction In Cyberspace: A Theory Of International Spaces, Darrel C. Menthe

Michigan Telecommunications & Technology Law Review

Unfortunately, when the law confronts cyberspace the usual mode of analysis is analogy, asking not "What is cyberspace?" but "What is cyberspace like?" The answers are varied: a glorified telephone, a bookstore, a bulletin board. I propose that we look at cyberspace not in these prosaic terms, but rather through the lens of international law in order to give cyberspace meaning in our jurisprudence. The thesis of this paper is that there exists in international law a type of territory which I call "international space." Currently there are three such international spaces: Antarctica, outer space, and the high seas. For …