Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Journal

Internet Law

Institution
Keyword
Publication

Articles 1 - 30 of 115

Full-Text Articles in Law

The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey Dec 2010

The Challenge Of Developing Effective Public Policy On The Use Of Social Media By Youth, John Palfrey

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda Dec 2010

Introduction To Essays On The Future Of Digital Communications, Ferando R. Laguarda

Federal Communications Law Journal

Symposium: The Future of Digital Communications: Essays from Time Warner Cable's Research Program on Digital Communications.


The Future Of Digital Communications Research And Policy, Scott Wallsten Dec 2010

The Future Of Digital Communications Research And Policy, Scott Wallsten

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


The Changing Patterns Of Internet Usage, Christopher S. Yoo Dec 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding Dec 2010

Revisiting The Regulatory Status Of Broadband Internet Access: A Policy Framework For Net Neutrality And An Open Competitive Internet, Lee L. Selwyn, Helen E. Golding

Federal Communications Law Journal

A decade of broadband access deregulation has landed the FCC at a legal deadend. After the D.C. Circuit's Comcast decision, the FCC finds itself unable to enforce its "net neutrality" goals. To reassert its jurisdiction over "net neutrality," the FCC proposes to reclassify broadband Internet access as a Title II "telecommunications service" while continuing to forbear from most other facets of common carrier regulation. The FCC's current dilemma results from an unfortunate combination of unverified predictive judgments associating deregulation with investment; overly optimistic assessments of competition in the consumer broadband market; the abandonment of the "bright line" between transmission and …


The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee Dec 2010

The Challenge Of Increasing Civic Engagement In The Digital Age, Nicol Turner-Lee

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield Dec 2010

The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell Dec 2010

Pacifica Reconsidered: Implications For The Current Controversy Over Broadcast Indecency, Angela J. Campbell

Federal Communications Law Journal

In 2009, the Supreme Court upheld the FCC's finding in Fox TV Stations v. Federal Communications Commission that the broadcast of "fleeting expletives" violated a federal law prohibiting the broadcast of indecency, but remanded the case for consideration of the broadcast networks' claims that the FCC action violated the First Amendment. On remand, the Second Circuit found that the FCC's prohibition against "fleeting expletives" was unconstitutionally vague. It is widely expected that the Supreme Court will review this decision and that the networks will ask the Court to reconsider its 1978 decision in Pacifica Foundation v. Federal Communications Commission. This …


Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons Dec 2010

Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons

University of Michigan Journal of Law Reform

This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …


Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung Dec 2010

Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung

Chicago-Kent Law Review

Within the past couple of years, social networking websites have become an immensely popular destination for people from all walks of life. Websites like Facebook and Twitter now count tens of millions of worldwide users, including world leaders and a number of celebrities. Eventually, users realized that social networking websites lent themselves to the quick and easy impersonation of celebrities through the creation of fake social networking accounts, often as a form of parody. One subject of such impersonation was professional baseball manager Tony La Russa, who took the then-unprecedented step of suing his impersonators and Twitter over the incident. …


The Rise Of Computerized High Frequency Trading: Use And Controversy, Michael J. Mcgowan Nov 2010

The Rise Of Computerized High Frequency Trading: Use And Controversy, Michael J. Mcgowan

Duke Law & Technology Review

Over the last decade, there has been a dramatic shift in how securities are traded in the capital markets. Utilizing supercomputers and complex algorithms that pick up on breaking news, company/stock/economic information and price and volume movements, many institutions now make trades in a matter of microseconds, through a practice known as high frequency trading. Today, high frequency traders have virtually phased out the "dinosaur" floor-traders and average investors of the past. With the recent attempted robbery of one of these high frequency trading platforms from Goldman Sachs this past summer, this "rise of the machines" has become front page …


Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque Oct 2010

Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque

Canadian Journal of Law and Technology

In the first part of our analysis, we will examine the impact which pharmacogenomics is expected to have on drug research and development, on the drug approval process and on post-marketing surveillance and clinical practice. This will allow us to show how pharmacogenomic testing could be beneficial to drug companies, regulatory bodies, and patients. The second part of our analysis will focus on the regulatory framework applicable to the approval of pharmacoge- nomic tests in Canada, although we are aware of the fact that most manufacturers decide to approve their tests outside of Canada. As mentioned, the applicable regu- lations …


Death Of The Spam Wrangler: Can-Spam Private Plaintiffs Required To Show Actual Harm, Susuk Lim Oct 2010

Death Of The Spam Wrangler: Can-Spam Private Plaintiffs Required To Show Actual Harm, Susuk Lim

Washington Journal of Law, Technology & Arts

In Gordon v. Virtumundo, the United States Court of Appeals for the Ninth Circuit published its first opinion on private plaintiff standing requirements for actions under the federal CAN-SPAM Act. The court strictly interpreted CAN-SPAM’s enforcement language, rejecting attempts by professional litigants to insert themselves into CAN-SPAM’s limited private right of action. This Article analyzes Gordon’s treatment of CAN-SPAM’s private right of action and federal preemption provisions. It concludes by assessing the decision’s expected effect on future spam-related litigation.


The Admissibility Of Electronic Business Records, Ken Chasse Oct 2010

The Admissibility Of Electronic Business Records, Ken Chasse

Canadian Journal of Law and Technology

The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …


Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton Oct 2010

Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton

Canadian Journal of Law and Technology

No abstract provided.


Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist Oct 2010

Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist

Canadian Journal of Law and Technology

This essay is an expanded version of my submission to the digital economy consultation. It opens with general issues such as digital policy leadership, cost issues, and emphasizes the need for a principle-based strategy that embraces the benefits associated with “open,” whether open access, open spectrum or open data. It then provides specific recommendations on a wide range of issues including tele- communications policy, privacy, and copyright.


Interpreting Copyright Law And Internet Facts, Cameron Hutchison Oct 2010

Interpreting Copyright Law And Internet Facts, Cameron Hutchison

Canadian Journal of Law and Technology

This paper probes interpretation issues elicited by the impact of digital technologies and the Internet on copyright law. The purpose of the paper is to instill a coherent framework for analyzing copyright law when it encounters Internet or digital facts. In part one, I propose a methodology of statutory interpretation that helps suitably adapt statutory language to technological developments. In essence it is this: courts should examine the language of the operative provision in its statutory context and in light of its purpose. A contextual interpretation of a broadly conceived rule can reveal a legislative intention that certain kinds of …


The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke Oct 2010

The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke

Canadian Journal of Law and Technology

This paper analyzes the regulatory regime for PHR systems in Canada. The first part of the paper consists of an introduction to some of the major issues associ- ated with these applications, with a focus on privacy, security, data quality, and interoperability. Following this preliminary discussion, the bulk of the analysis deals with the legal instruments that apply to PHR products developed by private sector organizations. Due to space constraints, the paper concentrates on legislative and regulatory instruments, deferring a discussion of the possible impacts of tort, product liability, and contract law on PHR systems. Despite this omission, it is …


Space Age Love Song: The Mix Tape In A Digital Universe, Megan M. Carpenter Oct 2010

Space Age Love Song: The Mix Tape In A Digital Universe, Megan M. Carpenter

Nevada Law Journal

No abstract provided.


Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer Sep 2010

Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer

Duke Law & Technology Review

Public school teachers have little opportunity for redress if they are dismissed for their activities on social networking websites. With the exception of inappropriate communication with students, a school district should not be able to consider a public educator’s use of a social networking website for disciplinary or employment decisions. Insisting that the law conform to twenty-first century social norms, this iBrief argues that the law should protect teachers’ speech on popular social networking websites like Facebook and MySpace.


Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman Sep 2010

Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman

Legislation and Policy Brief

In the modern digitized and networked world, personal identifying information has quickly become a commodity that can be traded, sold, or given away like any other. The uses and potential abuses of personal identifying information, however, distinguish this commodity from any other. Personal identifying information can be copied infinitely, is often not protected nearly as well as physical commodities, and, most importantly, can have particular importance to the person identified by that information. The producer of a bushel of apples presumably cares very little about where his apples end up, as long as he is paid for them to begin …


Who Owns The Virtual Items?, Leah Shen Aug 2010

Who Owns The Virtual Items?, Leah Shen

Duke Law & Technology Review

Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …


The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness Aug 2010

The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness

Duke Law & Technology Review

The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …


Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig Jul 2010

Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig

Indiana Journal of Global Legal Studies

The Internet, 24-hour news sources, and a host of other telecommunications advances have allowed global citizens to become instantaneously informed. With the privilege of real-time updates and acute awareness of the world's events comes the responsibility of being more than a passive observer. Specifically, this Note focuses on the technological improvements in communication during natural disasters-improvements that can be used to assist and aid the victims of catastrophes. In the aftermath of a natural disaster, the country affected is rarely able to provide for its citizens; tsunamis, hurricanes, tornadoes, and earthquakes can (and often do) cripple an entire nation. This …


Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh Jul 2010

Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh

Washington Journal of Law, Technology & Arts

Information technology is evolving at an unprecedented rate; new forms of communication appear so often that it is difficult to keep track of them all. This presents a difficult problem for attorneys, who must carefully consider whether using new technology to communicate with clients is consistent with the duty of confidentiality. Google’s Gmail scans the content of e-mails to generate targeted advertising, a controversial practice that raises questions about whether its users have a reasonable expectation of privacy. The New York Bar responded to this issue in Opinion 820, which states that using an e-mail provider that scans the e-mail …


Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie Jun 2010

Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie

Brigham Young University International Law & Management Review

No abstract provided.


Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo Jun 2010

Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo

Federal Communications Law Journal

Comic-book heroes show us how to be valiant, how to fight for those less fortunate, and, in some circumstances, how to combat those who break the law. Such is the situation in the case of Marvel Enterprises, Inc. v. NCSofl Corp., a battle between user-generated content and the copyright violations that resulted.

While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed, could endanger the protection afforded to authors. Federal and state suits have …


The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian Jun 2010

The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian

Federal Communications Law Journal

Academics and popular critics alike want to distill, reform, or altogether destroy U.S. copyright law as we know it. Much of this stems from animosity toward the old-guard record industry's alleged practices of overcharging consumers, underpaying royalties to artists, and suing teenagers and grandmas. But what those calling for reform all seem to neglect is a tiny but inevitable fact: for the first time in history, composers and recording artists can keep their copyrights.

Tangible media sales are being replaced by P2P file sharing, retail downloads, and streaming Webcasts. Digital technologies and wireless networks have opened prime channels for music …


Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V Jun 2010

Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V

Federal Communications Law Journal

As the Internet continues to play a more central role in the daily lives of Americans, concerns about how Internet service providers manage their networks have arisen. Responding to these concerns and recognizing the importance of maintaining the open and competitive nature of the Internet, the FCC has taken incremental steps to regulate network management practices. Perhaps the most significant of these steps was its August 2008 Memorandum Decision and Order in which the FCC condemned Comcast Corporation's network management practices as "discriminatory and arbitrary." In that Order, the FCC required that Comcast (1) adopt new practices that complied with …


Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves Jun 2010

Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves

Canadian Journal of Law and Technology

The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …