Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (26)
- University of Richmond (19)
- Brigham Young University Law School (10)
- Maurer School of Law: Indiana University (9)
- University of Michigan Law School (7)
-
- University of Kentucky (5)
- Villanova University Charles Widger School of Law (4)
- Washington and Lee University School of Law (4)
- Vanderbilt University Law School (3)
- American University Washington College of Law (2)
- Seattle University School of Law (2)
- University of Arkansas at Little Rock William H. Bowen School of Law (2)
- University of the District of Columbia School of Law (2)
- Embry-Riddle Aeronautical University (1)
- Penn State Law (1)
- University of San Diego (1)
- University of Washington School of Law (1)
- Keyword
-
- Internet (13)
- CDA (4)
- Regulation (4)
- Technology (4)
- UCITA (4)
-
- Uniform Computer Information Transactions Act (4)
- Cyberspace (3)
- Digital Millennium Copyright Act (3)
- Internet gambling (3)
- NCCUSL (3)
- Trademark infringement (3)
- Unfair competition (3)
- World Wide Web (3)
- ACLU v. Reno (2)
- America Online (2)
- Book Review (2)
- COPA (2)
- Child Online Protection Act (2)
- Communications Decency Act (2)
- Communications Decency Act of 1996 (2)
- DMCA (2)
- E-mail (2)
- FTC (2)
- Federal Trade Commission (2)
- Federal Trademark Dilution Act (2)
- Internet service providers (2)
- Lanham Act (2)
- Law reform (2)
- Miller v. California (2)
- NSI (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (25)
- Richmond Journal of Law & Technology (19)
- BYU Law Review (7)
- Federal Communications Law Journal (7)
- Kentucky Law Journal (5)
-
- Jeffrey S. Moorad Sports Law Journal (4)
- Michigan Telecommunications & Technology Law Review (4)
- Washington and Lee Law Review (4)
- Brigham Young University Education and Law Journal (3)
- Michigan Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- American University Law Review (2)
- Indiana Law Journal (2)
- Seattle University Law Review (2)
- University of Arkansas at Little Rock Law Review (2)
- University of the District of Columbia Law Review (2)
- International Bulletin of Political Psychology (1)
- Penn State International Law Review (1)
- San Diego Law Review (1)
- UIC Law Review (1)
- Washington Law Review (1)
Articles 1 - 30 of 99
Full-Text Articles in Law
Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty
Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty
Federal Communications Law Journal
Book Review: Tangled Web: Tales of Digital Crime From the Shadows of Cyberspace, Richard Power, Que, 2000, 450 pages.
Richard Power’s Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace presents a comprehensive account of computer crime. The book unveils and explores in meticulous detail the nature and scope, and—more importantly—the tremendous potential that common criminals, terrorists, and nation-states now have at their fingertips. This Review describes Tangled Web as a must-read for all cyber cops, prosecutors, and information technology heads and policy-makers.
Www.Wildwest.Gov: The Impact Of The Internet On State Power To Enforce The Law, Terrence Berg
Www.Wildwest.Gov: The Impact Of The Internet On State Power To Enforce The Law, Terrence Berg
BYU Law Review
No abstract provided.
Proactive Legislation And The First Amendment, Stuart Minor Benjamin
Proactive Legislation And The First Amendment, Stuart Minor Benjamin
Michigan Law Review
It is a commonplace that the world is changing rapidly, with whole sectors of the economy being transformed. New forms of communication, like the World Wide Web, e-mail, and satellite television, have risen from obscurity to ubiquity in less than a decade. The speed of these changes has led some to express concern about the ability of governments to respond. The fear is that governments cannot keep up with developments as they occur and thus get hopelessly behind. The solution, according to some, is for the government to act proactively - before a harm has arisen, so that the government …
The Internet Down Under: Can Free Speech Be Protected In A Democracy Without A Bill Of Rights, Robert Trager, Susan Turner
The Internet Down Under: Can Free Speech Be Protected In A Democracy Without A Bill Of Rights, Robert Trager, Susan Turner
University of Arkansas at Little Rock Law Review
No abstract provided.
Doctoring Prescriptions: Federal Barriers To Combating Prescription Drug Fraud Against On-Line Pharmacies In Washington, Eric M. Peterson
Doctoring Prescriptions: Federal Barriers To Combating Prescription Drug Fraud Against On-Line Pharmacies In Washington, Eric M. Peterson
Washington Law Review
Prescription drug abuse represents a significant portion of drg abuse in the United States. Drug-seeking individuals alter, steal, or forge prescriptions to sustain their own dependence on prescription medications or to divert the drugs to sell to others at inflated rates. On-line pharmacies are a relatively new source for prescription medications and a potential target for prescription drug fraud. The federal government recently enacted the Electronic Signatures in Global and National Commerce Act (E-SIGN), which governs electronic signatures and preempts inconsistent provisions of state laws, such as the Washington Electronic Authentication Act (WEAA). WEAA is a legal framework that could …
Icravetv And The New Rules Of Internet Broadcasting, Michael A. Geist
Icravetv And The New Rules Of Internet Broadcasting, Michael A. Geist
University of Arkansas at Little Rock Law Review
No abstract provided.
The Technologically Enabled Legal Services Delivery System From The Perspective Of Senior Management, John A. Tull
The Technologically Enabled Legal Services Delivery System From The Perspective Of Senior Management, John A. Tull
University of the District of Columbia Law Review
No abstract provided.
Technology And Client Community Access To Legal Services - Suggestive Scenarios On Community Legal Education, Intake And Referral And Pro Se, Michael Genz
University of the District of Columbia Law Review
The papers prepared for the Conference provide a broad perspective on emerging technologies and the potential they offer Legal Services. This paper, building on those perspectives, first offers a real world scenario showing how these technologies might be deployed to maximize client and community access to Legal Services resources. For each scenario, the paper then lays out what needs to be in place - technologically, managerially and institutionally, for the scenario to be made real.
Are We Overprotecting Code? Thoughts On First-Generation Internet Law, Orin S. Kerr
Are We Overprotecting Code? Thoughts On First-Generation Internet Law, Orin S. Kerr
Washington and Lee Law Review
No abstract provided.
The Initial Interest Confusion Doctrine And Trademark Infringement On The Intemet, Byrce J. Maynard
The Initial Interest Confusion Doctrine And Trademark Infringement On The Intemet, Byrce J. Maynard
Washington and Lee Law Review
No abstract provided.
Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites In The Evolving Internet , Xuan-Thao N. Nguyen
Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites In The Evolving Internet , Xuan-Thao N. Nguyen
American University Law Review
No abstract provided.
Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok
Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok
Michigan Telecommunications & Technology Law Review
This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …
Looking A Gift Horse In The Mouth: An Analysis Of Free Internet Stock Offerings, Joel Michael Schwarz
Looking A Gift Horse In The Mouth: An Analysis Of Free Internet Stock Offerings, Joel Michael Schwarz
Michigan Telecommunications & Technology Law Review
How much should an investor pay for one share of stock in Yahoo? Or a share of stock in America Online? As publicly traded companies, one need only consult the stock charts in any local newspaper to determine the value the market has placed on these shares. Despite what many Internet sector analysts have professed to be astronomically high valuations, these publicly traded companies possess easily verifiable valuations determined by the free market forces that constitute the building blocks of our economy, and safeguarded by the oversight of federal regulators such as the Securities & Exchange Commission ("SEC"). But what …
Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler
Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler
Michigan Telecommunications & Technology Law Review
Though the rapid development of the Internet has created a fertile ground for legal innovation, more often than not legislators and courts have sought to address this relatively new medium by attempting to squeeze it into precedents and paradigms better suited to older forms of communication, technology, and media. Part I of this article looks back at the courts' initial efforts at addressing defamation via the Internet. From the start the courts attempted to fit the role of the ISP into the common law's categorizing of print media as either "publishers" or "distributors" of information. One court's misstep in overextending …
Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert
Telemedicine: Rx For The Future Of Health Care, Susan E. Volkert
Michigan Telecommunications & Technology Law Review
Quite simply, telemedicine symbolizes and catalyzes the clash between the reality of our legal and political approach to health care and the American dream of bringing health care to all patients. Telemedicine, like our health care delivery systems, is regulated by many layers of government. Unlike other issues, telemedicine cuts through and challenges the traditional controls of access and cost. As such, telemedicine is a microcosm of our health care delivery system and a lens through which one may analyze the obstacles to access in the current system. This article examines these issues, proposes that telemedicine's goal should be to …
The Direct Marketing Model And Virtual Identity: Why The United States Should Not Create Legislative Controls On The Use Of Online Consumer Personal Data, Shaun A. Sparks
The Direct Marketing Model And Virtual Identity: Why The United States Should Not Create Legislative Controls On The Use Of Online Consumer Personal Data, Shaun A. Sparks
Penn State International Law Review
No abstract provided.
When Channel Surfers Flip To The Web: Copyright Liability For Internet Broadcasting, Baoding Hsieh Fan
When Channel Surfers Flip To The Web: Copyright Liability For Internet Broadcasting, Baoding Hsieh Fan
Federal Communications Law Journal
Digital streaming capabilities have enabled real-time Internet transmission of video signals. The advent of "Webcasting" will potentially change the way in which programming reaches audiences-increasing diversity in content as well as customer choice. Currently, cable and satellite systems secure retransmission rights to broadcast programming through statutory copyrights, and debate has ensued over whether online retransmitters should benefit from the same. This Article describes the evolution of streaming video over the Internet and examines the economic exploitation of such technology. After offering an overview of the compulsory copyright system, the Article analyzes the applicability of statutory licenses to Internet retransmissions of …
Limiting Tort Liability For Online Third-Party Content Under Section 230 Of The Communications Act, Jonathan A. Friedman, Francis M. Buono
Limiting Tort Liability For Online Third-Party Content Under Section 230 Of The Communications Act, Jonathan A. Friedman, Francis M. Buono
Federal Communications Law Journal
Section 230 of the Communications Act provides online service providers (OSPs) with immunity from liability for harms arising from third-party content that is made available through an OSP's services. Some courts have recently held that section 230 immunity covers not only defamation but any tort claim that would make an OSP liable for information originating from the OSP's users or commercial partners. This Article argues that section 230 has been properly interpreted by the courts and that, contrary to the claims of critics, those decisions have not created a disincentive for OSPs aggressively to monitor their sites for defamatory or …
Computer Code Vs. Legal Code: Setting The Rules In Cyberspace, Mark S. Nadel
Computer Code Vs. Legal Code: Setting The Rules In Cyberspace, Mark S. Nadel
Federal Communications Law Journal
Book Review: Code and Other Laws of Cyberspace, by Lawrence Lessig, Basic Books, 1999, 230 pages.
Business-Only E-Mail Policies In The Labor Organizing Context: It Is Time To Recognize Employee And Employer Rights, Allegra Kirsten Weiner
Business-Only E-Mail Policies In The Labor Organizing Context: It Is Time To Recognize Employee And Employer Rights, Allegra Kirsten Weiner
Federal Communications Law Journal
Cyberspace changed communication in the workplace. Now that employees are on employers' e-mail systems, union organizers can contact employees in the workplace, during working hours, without any of the obstacles that more traditional forms of union communication impose. Of course this new technologically-advanced labor organizing is ideal for the labor organizers, but it also interferes with the rights of employers. Which groups interests' prevail? Unfortunately there is no precedent. Normally, adherence to the National Labor Relations Board (NLRB) decisions is the answer but no case has come before the NLRB that solves this issue. Therefore, employers and employees are left …
Www.Franchisedisclosure.Com: Assessing The Ftc's Proposed Franchise Rule Provisions Involving Electronic Disclosure, Perry C. Siatis
Www.Franchisedisclosure.Com: Assessing The Ftc's Proposed Franchise Rule Provisions Involving Electronic Disclosure, Perry C. Siatis
BYU Law Review
No abstract provided.
Climbing The Walls Of Your Electronic Cage, Steven Hetcher
Climbing The Walls Of Your Electronic Cage, Steven Hetcher
Michigan Law Review
Space. The final frontier. Not so, say the doyennes of the firstgeneration Internet community, who view themselves as the new frontiersmen and women staking out a previously unexplored territory - cyberspace. Numerous metaphors in the Internet literature picture cyberspace as a new, previously unexplored domain. Parallels are frequently drawn to the American colonies, the Western frontier, or outer space. In Code: And Other Laws of Cyberspace, Lawrence Lessig says, "Cyberspace is a place. People live there." In this place, we will build a "new society" (p. 4). A sense of this background is helpful in appraising Lessig's claims. He argues …
Racial Profiling In The Persian Gulf: Ethical, Moral, And Legal Implications, Ibpp Editor
Racial Profiling In The Persian Gulf: Ethical, Moral, And Legal Implications, Ibpp Editor
International Bulletin of Political Psychology
This article describes attributions about race and ethnicity that color the discourse on the ethics, morality, and legality of profiling.
Legal And Ethical Issues Related To The Use Of The Internet In K-12 Schools, Nancy Willard
Legal And Ethical Issues Related To The Use Of The Internet In K-12 Schools, Nancy Willard
Brigham Young University Education and Law Journal
Supplemental Files:
- Recommended District Internet Policy and Regulations
- Student Internet Policy Handbook Template
- Sample Student Account Agreement
- Sample Guest Account Agreement
- Sample Letter to Parents or Guardians
Who Owns Course Materials Prepared By A Teacher Or Professor? The Application Of Copyright Law To Teaching Materials In The Internet Age, Georgia Holmes, Daniel A. Levin
Who Owns Course Materials Prepared By A Teacher Or Professor? The Application Of Copyright Law To Teaching Materials In The Internet Age, Georgia Holmes, Daniel A. Levin
Brigham Young University Education and Law Journal
No abstract provided.
Internet Speech And The First Amendment Rights Of Public School Students, Leora Harpaz
Internet Speech And The First Amendment Rights Of Public School Students, Leora Harpaz
Brigham Young University Education and Law Journal
No abstract provided.
Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel
Don’T Talk To Strangers: An Analysis Of Government And Industry Efforts To Protect A Child’S Privacy Online, Dorothy A. Hertzel
Federal Communications Law Journal
Studies indicate that nearly two-thirds of children use the Internet. Children online users have created unique concerns for Internet providers and lawmakers. The collection, storage, and sale of a child online user's personal information without the child or parent's knowledge or consent has elicited much concern. Such a practice is commonplace in the world of the Internet. Congress, through the Child Online Privacy Protection Act, and the Internet industry have addressed how to curb this practice. In addition to these efforts, technological tools are currently available that block the transfer of personally identifiable information from the user to the computer. …
Online Auction Fraud: Are The Auction Houses Doing All They Should Or Could To Stop Online Fraud?, James M. Snyder
Online Auction Fraud: Are The Auction Houses Doing All They Should Or Could To Stop Online Fraud?, James M. Snyder
Federal Communications Law Journal
In April 1998, the FTC released a consumer alert pertaining to the increasing problem of online auction fraud. As the number of online auction participants increased, online auction fraud was becoming more prevalent. The FTC requested comments regarding methods that would be appropriate for curbing the increase in consumer deception. Many in the online auction industry proposed voluntary self-regulation. This Note exposes the inadequacy of industry self-regulation by analogizing online auction abuse with the misuse and near downfall of the 900-number industry. This Note proposes that only a regime of strict industry guidelines that the FTC initiates will halt online …
The History, Purpose, And Procedures Of The Advisory Commission On Electronic Commerce, Thomas Griffith
The History, Purpose, And Procedures Of The Advisory Commission On Electronic Commerce, Thomas Griffith
BYU Law Review
No abstract provided.
Electronic Commerce And The State And Federal Tax Bases, J. Clifton Fleming Jr.
Electronic Commerce And The State And Federal Tax Bases, J. Clifton Fleming Jr.
BYU Law Review
The federal income tax does not apply to profits generated by pure mail order sales originating from outside the United States, and state and local consumption taxes are effectively inapplicable to pure mail order sales originating from outside the taxing jurisdiction. These conclusions seem fully applicable to federal taxation of income from sales that are initially solicited through Internet advertising and then transacted over the Internet between a customer in the United States and an out-of-country seller's out-of-country website. Similar conclusions are also, arguably, applicable in the case of state and local consumption taxes. Extension of the mail order tax …