Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (23)
- UIC School of Law (22)
- Maurer School of Law: Indiana University (21)
- University of Richmond (10)
- University of Michigan Law School (7)
-
- Duke Law (6)
- Vanderbilt University Law School (4)
- University of Maryland Francis King Carey School of Law (3)
- New York Law School (2)
- University of Kentucky (2)
- University of Washington School of Law (2)
- American University Washington College of Law (1)
- Barry University School of Law (1)
- Brigham Young University Law School (1)
- Campbell University School of Law (1)
- Chicago-Kent College of Law (1)
- Loyola University Chicago, School of Law (1)
- Mercer University School of Law (1)
- Seattle University School of Law (1)
- Southern Methodist University (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of the Pacific (1)
- Villanova University Charles Widger School of Law (1)
- Keyword
-
- Internet (12)
- Technology (6)
- Regulation (5)
- Copyright (4)
- Digital Communications Policy (4)
-
- Federal Communications Commission (4)
- Broadband (3)
- Communications Decency Act (3)
- Consumers (3)
- Google (3)
- Media & Communications (3)
- PIPEDA (3)
- Access (2)
- AdWords (2)
- Bandwidth (2)
- Book reviews (2)
- Child Pornography Prevention Act (2)
- Copyright Infringement (2)
- Copyright Law (2)
- Copyright law (2)
- Cyberlaw (2)
- DMCA (2)
- Digital Communications (2)
- Digital Millennium Copyright Act (2)
- Digital copyright (2)
- ECommerce (2)
- ESI (2)
- Electronically stored information (2)
- FCC (2)
- Federal Sentencing Guidelines (2)
- Publication
-
- Canadian Journal of Law and Technology (23)
- Federal Communications Law Journal (20)
- UIC John Marshall Journal of Information Technology & Privacy Law (17)
- Richmond Journal of Law & Technology (9)
- Duke Law & Technology Review (6)
-
- Maryland Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- UIC Review of Intellectual Property Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Kentucky Law Journal (2)
- Michigan Law Review (2)
- NYLS Law Review (2)
- UIC Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Washington Journal of Law, Technology & Arts (2)
- Barry Law Review (1)
- Brigham Young University International Law & Management Review (1)
- Campbell Law Review (1)
- Chicago-Kent Law Review (1)
- Indiana Journal of Global Legal Studies (1)
- Legislation and Policy Brief (1)
- McGeorge Law Review (1)
- Mercer Law Review (1)
- Nevada Law Journal (1)
- Public Interest Law Reporter (1)
- SMU Science and Technology Law Review (1)
- Seattle University Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Richmond Law Review (1)
- Vanderbilt Law Review (1)
Articles 1 - 30 of 115
Full-Text Articles in Law
The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey
The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda
Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda
Federal Communications Law Journal
Symposium: The Future of Digital Communications: Essays from Time Warner Cable's Research Program on Digital Communications.
The Future Of Digital Communications Research And Policy, Scott Wallsten
The Future Of Digital Communications Research And Policy, Scott Wallsten
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding
Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding
Federal Communications Law Journal
A decade of broadband access deregulation has landed the FCC at a legal deadend. After the D.C. Circuit's Comcast decision, the FCC finds itself unable to enforce its "net neutrality" goals. To reassert its jurisdiction over "net neutrality," the FCC proposes to reclassify broadband Internet access as a Title II "telecommunications service" while continuing to forbear from most other facets of common carrier regulation. The FCC's current dilemma results from an unfortunate combination of unverified predictive judgments associating deregulation with investment; overly optimistic assessments of competition in the consumer broadband market; the abandonment of the "bright line" between transmission and …
The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee
The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield
The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell
Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell
Federal Communications Law Journal
In 2009, the Supreme Court upheld the FCC's finding in Fox TV Stations v. Federal Communications Commission that the broadcast of "fleeting expletives" violated a federal law prohibiting the broadcast of indecency, but remanded the case for consideration of the broadcast networks' claims that the FCC action violated the First Amendment. On remand, the Second Circuit found that the FCC's prohibition against "fleeting expletives" was unconstitutionally vague. It is widely expected that the Supreme Court will review this decision and that the networks will ask the Court to reconsider its 1978 decision in Pacifica Foundation v. Federal Communications Commission. This …
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
University of Michigan Journal of Law Reform
This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …
Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung
Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung
Chicago-Kent Law Review
Within the past couple of years, social networking websites have become an immensely popular destination for people from all walks of life. Websites like Facebook and Twitter now count tens of millions of worldwide users, including world leaders and a number of celebrities. Eventually, users realized that social networking websites lent themselves to the quick and easy impersonation of celebrities through the creation of fake social networking accounts, often as a form of parody. One subject of such impersonation was professional baseball manager Tony La Russa, who took the then-unprecedented step of suing his impersonators and Twitter over the incident. …
The Rise Of Computerized High Frequency Trading: Use And Controversy, Michael J. Mcgowan
The Rise Of Computerized High Frequency Trading: Use And Controversy, Michael J. Mcgowan
Duke Law & Technology Review
Over the last decade, there has been a dramatic shift in how securities are traded in the capital markets. Utilizing supercomputers and complex algorithms that pick up on breaking news, company/stock/economic information and price and volume movements, many institutions now make trades in a matter of microseconds, through a practice known as high frequency trading. Today, high frequency traders have virtually phased out the "dinosaur" floor-traders and average investors of the past. With the recent attempted robbery of one of these high frequency trading platforms from Goldman Sachs this past summer, this "rise of the machines" has become front page …
Interpreting Copyright Law And Internet Facts, Cameron Hutchison
Interpreting Copyright Law And Internet Facts, Cameron Hutchison
Canadian Journal of Law and Technology
This paper probes interpretation issues elicited by the impact of digital technologies and the Internet on copyright law. The purpose of the paper is to instill a coherent framework for analyzing copyright law when it encounters Internet or digital facts. In part one, I propose a methodology of statutory interpretation that helps suitably adapt statutory language to technological developments. In essence it is this: courts should examine the language of the operative provision in its statutory context and in light of its purpose. A contextual interpretation of a broadly conceived rule can reveal a legislative intention that certain kinds of …
The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke
The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke
Canadian Journal of Law and Technology
This paper analyzes the regulatory regime for PHR systems in Canada. The first part of the paper consists of an introduction to some of the major issues associ- ated with these applications, with a focus on privacy, security, data quality, and interoperability. Following this preliminary discussion, the bulk of the analysis deals with the legal instruments that apply to PHR products developed by private sector organizations. Due to space constraints, the paper concentrates on legislative and regulatory instruments, deferring a discussion of the possible impacts of tort, product liability, and contract law on PHR systems. Despite this omission, it is …
Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque
Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque
Canadian Journal of Law and Technology
In the first part of our analysis, we will examine the impact which pharmacogenomics is expected to have on drug research and development, on the drug approval process and on post-marketing surveillance and clinical practice. This will allow us to show how pharmacogenomic testing could be beneficial to drug companies, regulatory bodies, and patients. The second part of our analysis will focus on the regulatory framework applicable to the approval of pharmacoge- nomic tests in Canada, although we are aware of the fact that most manufacturers decide to approve their tests outside of Canada. As mentioned, the applicable regu- lations …
The Admissibility Of Electronic Business Records, Ken Chasse
The Admissibility Of Electronic Business Records, Ken Chasse
Canadian Journal of Law and Technology
The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …
Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist
Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist
Canadian Journal of Law and Technology
This essay is an expanded version of my submission to the digital economy consultation. It opens with general issues such as digital policy leadership, cost issues, and emphasizes the need for a principle-based strategy that embraces the benefits associated with “open,” whether open access, open spectrum or open data. It then provides specific recommendations on a wide range of issues including tele- communications policy, privacy, and copyright.
Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton
Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton
Canadian Journal of Law and Technology
No abstract provided.
Space Age Love Song: The Mix Tape In A Digital Universe, Megan M. Carpenter
Space Age Love Song: The Mix Tape In A Digital Universe, Megan M. Carpenter
Nevada Law Journal
No abstract provided.
Death Of The Spam Wrangler: Can-Spam Private Plaintiffs Required To Show Actual Harm, Susuk Lim
Death Of The Spam Wrangler: Can-Spam Private Plaintiffs Required To Show Actual Harm, Susuk Lim
Washington Journal of Law, Technology & Arts
In Gordon v. Virtumundo, the United States Court of Appeals for the Ninth Circuit published its first opinion on private plaintiff standing requirements for actions under the federal CAN-SPAM Act. The court strictly interpreted CAN-SPAM’s enforcement language, rejecting attempts by professional litigants to insert themselves into CAN-SPAM’s limited private right of action. This Article analyzes Gordon’s treatment of CAN-SPAM’s private right of action and federal preemption provisions. It concludes by assessing the decision’s expected effect on future spam-related litigation.
Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer
Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer
Duke Law & Technology Review
Public school teachers have little opportunity for redress if they are dismissed for their activities on social networking websites. With the exception of inappropriate communication with students, a school district should not be able to consider a public educator’s use of a social networking website for disciplinary or employment decisions. Insisting that the law conform to twenty-first century social norms, this iBrief argues that the law should protect teachers’ speech on popular social networking websites like Facebook and MySpace.
Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman
Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman
Legislation and Policy Brief
In the modern digitized and networked world, personal identifying information has quickly become a commodity that can be traded, sold, or given away like any other. The uses and potential abuses of personal identifying information, however, distinguish this commodity from any other. Personal identifying information can be copied infinitely, is often not protected nearly as well as physical commodities, and, most importantly, can have particular importance to the person identified by that information. The producer of a bushel of apples presumably cares very little about where his apples end up, as long as he is paid for them to begin …
Who Owns The Virtual Items?, Leah Shen
Who Owns The Virtual Items?, Leah Shen
Duke Law & Technology Review
Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …
The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness
The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness
Duke Law & Technology Review
The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …
Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh
Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh
Washington Journal of Law, Technology & Arts
Information technology is evolving at an unprecedented rate; new forms of communication appear so often that it is difficult to keep track of them all. This presents a difficult problem for attorneys, who must carefully consider whether using new technology to communicate with clients is consistent with the duty of confidentiality. Google’s Gmail scans the content of e-mails to generate targeted advertising, a controversial practice that raises questions about whether its users have a reasonable expectation of privacy. The New York Bar responded to this issue in Opinion 820, which states that using an e-mail provider that scans the e-mail …
Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig
Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig
Indiana Journal of Global Legal Studies
The Internet, 24-hour news sources, and a host of other telecommunications advances have allowed global citizens to become instantaneously informed. With the privilege of real-time updates and acute awareness of the world's events comes the responsibility of being more than a passive observer. Specifically, this Note focuses on the technological improvements in communication during natural disasters-improvements that can be used to assist and aid the victims of catastrophes. In the aftermath of a natural disaster, the country affected is rarely able to provide for its citizens; tsunamis, hurricanes, tornadoes, and earthquakes can (and often do) cripple an entire nation. This …
Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie
Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie
Brigham Young University International Law & Management Review
No abstract provided.
Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost
Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost
Canadian Journal of Law and Technology
This paper analyses and criticizes Canada’s position on sound marks registration in order to recommend the ways in which Canadian policy-makers could further act in order to advance this area of law. The first part of this paper exposes the fundamental concepts of trade-marks as they are necessary to the comprehension of the problems surrounding the registration of sound marks. In the second part, legal considerations associated with the registration of sound marks are discussed. More specifically, the visual requirement, the issue of “use,” the concept of distinctiveness and the question of overlap with copyright are assessed. In the third …
La Cyberintimidation: Analyse Juridique, Karen D. Levin
La Cyberintimidation: Analyse Juridique, Karen D. Levin
Canadian Journal of Law and Technology
Dans ce mémoire va être traitée une analyse juridique de la cyberintimidation. Dans une première partie, nous tenterons de définir le terme « cyberintimidation » et les enjeux qui s’y rattachent. En deuxième lieu, nous examinerons la motivation qui mène à la cyberintimidation, ainsi que la manière dans laquelle l’acte se produit. Troisièmement, nous évaluerons les provisions du droit criminel fédéral, des droits de la personne, et du droit des délits civils afin de déterminer l’efficacité de notre système juridique à détourner la cyberintimidation. Finalement, nous trancherons la question de réforme qui se propose au Canada, la comparant aux réformes …
Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam
Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam
Canadian Journal of Law and Technology
Our so-called post-industrial society is one whose axial feature is the interac- tion between computer-driven digital and life science-driven bio-technologies. The primary legal mechanism that undergirds the allocation of rights in this new infor- mation-centred epoch is intellectual property. Perhaps only a few industrial sectors have benefitted more from the dynamics of that interaction than the pharmaceutical industry. Perhaps also, only a few industrial sectors have fully appreciated and opti- mally exploited the power of intellectual property than that sector. How did that happen? How has it continued to unfold, and what does the future hold for the continued co-evolution …
Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves
Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves
Canadian Journal of Law and Technology
The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …