Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Columbia Law School (7)
- Santa Clara Law (6)
- Georgetown University Law Center (2)
- Singapore Management University (2)
- University of Maryland Francis King Carey School of Law (2)
-
- University of Pennsylvania Carey Law School (2)
- Boston University School of Law (1)
- Brooklyn Law School (1)
- Cornell University Law School (1)
- Duke Law (1)
- New York Law School (1)
- Notre Dame Law School (1)
- UIC School of Law (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Kentucky (1)
- University of Missouri School of Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Windsor (1)
- Washington University in St. Louis (1)
- William & Mary Law School (1)
- Keyword
-
- Internet (5)
- Google (4)
- Adwords (3)
- Network neutrality (3)
- Privacy (3)
-
- Cyberlaw (2)
- Cyberspace (2)
- Data privacy (2)
- European Union (2)
- Law (2)
- Rosetta Stone (2)
- SSRN (2)
- Technology (2)
- Telecommunications (2)
- Torts (2)
- Trademark (2)
- Trademarked terms (2)
- (TCP/IP) (1)
- (Transmission Control Protocol/Internet Protocol) (1)
- Abstention (1)
- Access (1)
- Adam Walsh Child Protection and Safety Act 2006 (1)
- Ads (1)
- Affiliates (1)
- Alasdair MacIntyre (1)
- American Society of International Law Proceedings (1)
- Antitrust (1)
- Asymmetrical information (1)
- At-will employment (1)
- Auctions (1)
- Publication
-
- Faculty Scholarship (12)
- Rosetta Stone v. Google (Joint Appendix) (5)
- Faculty Publications (3)
- All Faculty Scholarship (2)
- Georgetown Law Faculty Publications and Other Works (2)
-
- Research Collection Yong Pung How School Of Law (2)
- Articles (1)
- Articles & Chapters (1)
- Cornell Law Faculty Publications (1)
- Journal Articles (1)
- Law Faculty Scholarly Articles (1)
- Law Faculty Scholarship (1)
- Law Publications (1)
- Publications (1)
- Scholarship@WashULaw (1)
- UF Law Faculty Publications (1)
- UIC Law Open Access Faculty Scholarship (1)
Articles 31 - 37 of 37
Full-Text Articles in Law
The Future Of Internet Governance, Tim Wu, David A. Gross
The Future Of Internet Governance, Tim Wu, David A. Gross
Faculty Scholarship
The issues surrounding Internet naming and Internet governance have been controversial since the mid-1990s. But public attention was drawn to Internet governance in the early 2000s when Europe and other countries declared themselves unhappy with how Internet governance was working, how the domain names were being assigned, and other issues. David, can you summarize what was happening in the early 2000s that created controversy in this area?
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Law Faculty Scholarly Articles
This Article provides a timely examination of the European Union's approach to information privacy on the internet, an approach that some legal scholars have held up as a model for law reform in the United States. Building on the author's recent piece discussing the U.S. approach to internet privacy, this Article applies to the EU's internet privacy regime a theoretical framework constructed from the writings of philosopher and social theorist Alasdair MacIntyre on the failures of Enlightenment and post-Enlightenment thought. The EU internet privacy regime is shown to reflect and reinforce three key elements of the "post-Enlightenment paradigm," i.e., the …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Journal Articles
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
A Tale Of Two Platforms, Tim Wu
A Tale Of Two Platforms, Tim Wu
Faculty Scholarship
This paper discusses future competitions between cellular and computer platforms, in the context of a discussion of Jonathan Zittrain, The Generative Internet, 119 Harv. L. Rev. 1974 (2006).
Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo
Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo
Faculty Scholarship
"Net neutrality" has been among the leading issues of telecommunications policy this decade. Is the neutrality of the Internet fundamental to its success, and worth regulating to protect, or simply a technical design subject to improvement? In this debate-form commentary, Tim Wu and Christopher Yoo make clear the connection between net neutrality and broader issues of national telecommunications policy.
A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg
A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg
Faculty Scholarship
Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …