Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (7)
- Surveillance (5)
- Cyberlaw (4)
- E-mail (4)
- Electronic mail (4)
-
- First Amendment (4)
- Copyright (3)
- Fourth Amendment (3)
- ISP (3)
- Internet (3)
- Internet Service Provider (3)
- Reasonable expectation of privacy (3)
- Warrant (3)
- Warshak v. United States (3)
- Cyber (2)
- Free speech (2)
- Insurance (2)
- Intellectual property (2)
- Internet law (2)
- Internet privacy (2)
- Trademark (2)
- ALA v. United States (1)
- Access controls (1)
- American Library Association v. United States (1)
- Biometrics (1)
- CGL (1)
- CIPA (1)
- Cell phones (1)
- Children's Internet Protection Act (1)
- China (1)
Articles 1 - 18 of 18
Full-Text Articles in Law
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Journal Articles
Cyber risks are the newest risks of the 21st century. The breadth and cost of cyber attacks are astonishing. Worldwide damages caused by cyber attack are predicted to reach $6 trillion by 2021. Between 2015 and 2017, ransomware damages alone increased from $325 million to approximately $5 billion. In 2017, WannaCry ransomware shut down over 300,000 computer systems across 150 countries.
On April 13, 2018, the Penn State Law Review held a symposium to discuss the evolution of cyber risks and cyber insurance. The symposium was comprised of an eclectic group of legal practitioners and scholars who presented four articles. …
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Journal Articles
On March 18, 2016, and March 22, 2016, a jury awarded Terry Bollea (a.k.a Hulk Hogan) a total of $140 million in compensatory and punitive damages against Gawker Media for posting less than two minutes of a video of Hulk Hogan having sex with his best friend’s wife. The award was based upon a finding that Gawker intentionally had invaded Hulk Hogan’s privacy by posting the video online. The case has been receiving extensive media coverage because it is a tawdry tale involving a celebrity, betrayal, adultery, sex, and the First Amendment. The case likely will be remembered by most …
Trust And Social Commerce, Julia Y. Lee
Trust And Social Commerce, Julia Y. Lee
Journal Articles
Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.
The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew
Journal Articles
It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In "Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment" Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Journal Articles
No abstract provided.
An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian
An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian
Journal Articles
Intellectual property regimes operate in the shadow of the First Amendment. By deeming a particular activity as infringing, the law of copyright, trademark, and the right of publicity all limit communication. As a result, judges and lawmakers must delicately balance intellectual property rights with expressive freedoms. Interestingly, each intellectual property regime strikes the balance between ownership rights and free speech in a dramatically different way. Despite a large volume of scholarship on intellectual property rights and free speech considerations, this Article represents the first systematic effort to detail, analyze, and explain the divergent evolution of expression-based defenses in copyright, trademark, …
Pornography As Pollution, John C. Nagle
Pornography As Pollution, John C. Nagle
Journal Articles
Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …
Copyright, Trademark And Secondary Liability After Grokster, Mark Bartholomew
Copyright, Trademark And Secondary Liability After Grokster, Mark Bartholomew
Journal Articles
Even though secondary infringement doctrine in both copyright and trademark stems from the same common law starting points, the doctrines have moved in very different directions, particularly in the last decade. As copyright litigants expanded their litigation strategy to include online intermediaries, secondary copyright liability was stretched to encompass a wider array of defendants with increasingly tangential relationships to the direct infringer. Meanwhile, even though similar online threats jeopardized the ability of trademark holders to safeguard their brands' goodwill, courts refused to implement a similar expansion for secondary trademark liability. Although courts are aware of this doctrinal double standard, they …
Federalization In Information Privacy Law, Patricia L. Bellia
Federalization In Information Privacy Law, Patricia L. Bellia
Journal Articles
In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Journal Articles
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
The Memory Gap In Surveillance Law, Patricia L. Bellia
The Memory Gap In Surveillance Law, Patricia L. Bellia
Journal Articles
U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Journal Articles
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
Making A Mark In The Internet Economy: A Trademark Analysis Of Search Engine Advertising, Mark Bartholomew
Making A Mark In The Internet Economy: A Trademark Analysis Of Search Engine Advertising, Mark Bartholomew
Journal Articles
No abstract provided.
Spyware And The Limits Of Surveillance Law, Patricia L. Bellia
Spyware And The Limits Of Surveillance Law, Patricia L. Bellia
Journal Articles
For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …
Defending Cyberproperty, Patricia L. Bellia
Defending Cyberproperty, Patricia L. Bellia
Journal Articles
This Article explores how the law should treat legal claims by owners of Internet-connected computer systems to enjoin unwanted uses of their systems. Over the last few years, this question has become increasingly urgent and controversial, as system owners have sought protection from unsolicited commercial e-mail and from robots that extract data from Web servers for competitive purposes. In the late 1990s and early 2000s, courts utilizing a wide range of legal doctrines upheld claims by network resource owners to prevent unwanted access to their computer networks. The vast weight of legal scholarship has voiced strong opposition to these cyberproperty …
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Journal Articles
The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.
This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Journal Articles
This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Journal Articles
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …