Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (21)
- Communications Law (6)
- Fourth Amendment (5)
- Science and Technology Law (5)
- Computer Law (4)
-
- Criminal Law (4)
- Labor and Employment Law (4)
- Constitutional Law (3)
- Intellectual Property Law (3)
- International Law (3)
- Legal Ethics and Professional Responsibility (3)
- Privacy Law (3)
- Civil Rights and Discrimination (2)
- Commercial Law (2)
- Legal Writing and Research (2)
- National Security Law (2)
- Business (1)
- Business Law, Public Responsibility, and Ethics (1)
- Business Organizations Law (1)
- Communication (1)
- Communication Technology and New Media (1)
- Contracts (1)
- Estates and Trusts (1)
- Evidence (1)
- First Amendment (1)
- Health Law and Policy (1)
- Human Resources Management (1)
- Labor Relations (1)
- Law and Society (1)
- Institution
-
- Selected Works (9)
- Notre Dame Law School (5)
- Fordham Law School (2)
- Pepperdine University (2)
- SelectedWorks (2)
-
- Touro University Jacob D. Fuchsberg Law Center (2)
- Georgetown University Law Center (1)
- Louisiana State University (1)
- Louisiana State University Law Center (1)
- Maurer School of Law: Indiana University (1)
- Northern Illinois University (1)
- Northwestern Pritzker School of Law (1)
- Salve Regina University (1)
- St. Mary's University (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Florida Levin College of Law (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- University of Oklahoma College of Law (1)
- University of Richmond (1)
- University of South Carolina (1)
- Publication Year
- Publication
-
- Journal Articles (5)
- Patricia L. Bellia (5)
- Elizabeth A Rowe (2)
- Susan Freiwald (2)
- Catholic University Law Review (1)
-
- Faculty Publications (1)
- Faculty and Staff - Articles & Papers (1)
- Federal Communications Law Journal (1)
- Fordham Law Review (1)
- Fordham Urban Law Journal (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Jonathan Zittrain (1)
- Journal of Health Care Law and Policy (1)
- Journal of Intellectual Property Law (1)
- Law Faculty Popular Media (1)
- Law Faculty Scholarship (1)
- Louisiana Law Review (1)
- Michael J Martin (1)
- Northern Illinois University Law Review (1)
- Northwestern Journal of Technology and Intellectual Property (1)
- Oklahoma Journal of Law and Technology (1)
- Pepperdine Law Review (1)
- Richard Sanvenero Jr. (1)
- Richmond Journal of Law & Technology (1)
- Scholarly Works (1)
- St. Mary's Journal on Legal Malpractice & Ethics (1)
- Student Senate Enrolled Legislation (1)
- The Journal of Business, Entrepreneurship & the Law (1)
- Touro Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 40
Full-Text Articles in Law
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Oklahoma Journal of Law and Technology
No abstract provided.
The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera
The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera
St. Mary's Journal on Legal Malpractice & Ethics
This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …
Designing Surveillance Law, Patricia L. Bellia
Designing Surveillance Law, Patricia L. Bellia
Patricia L. Bellia
As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.
For most scholars, the question of who should regulate communications surveillance …
Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker
Journal of Intellectual Property Law
No abstract provided.
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama
Touro Law Review
No abstract provided.
Your Digital Footprint Left Behind At Death: An Illustration Of Technology Leaving The Law Behind, Sandi S. Varnado
Your Digital Footprint Left Behind At Death: An Illustration Of Technology Leaving The Law Behind, Sandi S. Varnado
Louisiana Law Review
The article discusses legal issues regarding digital accounts, files, and information after death, focusing on U.S. law. Topics include estate administration, common digital items such as photographs, e-mail, social media accounts, and financial digital items, and online service providers (OSPs). Other topics include terms of service (TOS), the emotional value of digital assets for the decedent's survivors, and creating an inventory of political assets.
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Patricia L. Bellia
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
The Memory Gap In Surveillance Law, Patricia L. Bellia
The Memory Gap In Surveillance Law, Patricia L. Bellia
Patricia L. Bellia
U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Patricia L. Bellia
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Patricia L. Bellia
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.
Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.
Richard Sanvenero Jr.
This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …
What Happens To Our Facebook Accounts When We Die?: Probate Versus Policy And The Fate Of Social-Media Assets Postmortem, Kristina Sherry
What Happens To Our Facebook Accounts When We Die?: Probate Versus Policy And The Fate Of Social-Media Assets Postmortem, Kristina Sherry
Pepperdine Law Review
More than 580,000 Facebook users in the U.S. will die this year, raising numerous legal questions as to the disposition of their Facebook pages and similar “digital assets” left in a state of legal limbo. While access to and ownership of decedents’ email accounts has been philosophized for nearly a decade, this Comment focuses on the additional legal uncertainties posed by “digital death” in the more amorphous realm of “social media.” Part II explores the implications of digital death by conceptualizing digital assets and surveying the underlying legal principles of contractual policies, probate, property, and privacy concerns. Part III surveys …
E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood
E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood
Law Faculty Popular Media
In this column for Kentucky Bar Association's magazine (B&B - Bench & Bar), Professor Hazelwood addresses the ethical implications of emailing with a client. Practitioners are provided a series of questions to ask before emailing a client.
Managing The Impact Of New Media On The Employment Relationship, Susan A. O'Sullivan-Gavin, John H. Shannon
Managing The Impact Of New Media On The Employment Relationship, Susan A. O'Sullivan-Gavin, John H. Shannon
The Journal of Business, Entrepreneurship & the Law
Attention to privacy issues in the workplace has increased over the past two decades as use of electronic mail and text messages has made these means of communication commonplace. Beyond text messages and emails, employees can access the internet at their place of employment at many different entry points. This access can be through company issued desktops or laptops, mobile phones, mobile internet devices (MIDs), Smartphone technology (photography; video and voice recording capabilities; file transfer and storage), off-site internet connections, Wi-Fi access or hot spots. Employees can access and/or post information on various sites including blogs, wikis, RSS feeds, instant …
The Discoverability Of E-Mails: The Smoking Gun Of The Modern Era, Michael J. Martin
The Discoverability Of E-Mails: The Smoking Gun Of The Modern Era, Michael J. Martin
Michael J Martin
The discoverability of e-mails is an area of law that every modern day lawyer must be familiar with in order to avoid the risk of being sanctioned. Over the past years, courts have awarded sanctions to moving parties at a steadily increasing pace. These sanctions have included adverse jury instructions, default judgments, attorney’s fees, large monetary fines, and in one instance, a jail sentence. Courts have sent the message that improper conduct will not be tolerated in this developing area of law by not hesitating to order sanctions. Thus, it is essential that modern day lawyers become acquainted with the …
The Return Of “Voodoo Information”: A Call To Resist A Heightened Authentication Standard For Evidence Derived From Social Networking Websites, Richard Fox
Catholic University Law Review
No abstract provided.
Designing Surveillance Law, Patricia L. Bellia
Designing Surveillance Law, Patricia L. Bellia
Journal Articles
As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.
For most scholars, the question of who should regulate communications surveillance …
Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Scholarly Works
This paper discusses the growth and increasing significance of e-mail in the business and personal environment, and how unsolicited bulk commercial e-mail, also known as spam, has become a significant drain on technical and economic resources. It analyzes the statutory and self-help efforts to combat spam, with a specific focus on block lists and automated spam filters, and describes how alleged spammers have brought lawsuits in U.S. courts claiming they had been wrongfully included within block lists and filters. Finally, it describes some possible claims under U.S. law, then argues for a revision to current statutes to mandate a higher …
Contributory Negligence, Technology, And Trade Secrets, Elizabeth A. Rowe
Contributory Negligence, Technology, And Trade Secrets, Elizabeth A. Rowe
Elizabeth A Rowe
In tort law, the doctrine of contributory negligence captures conduct by the plaintiff which falls below the standard to which he should conform for his own protection. Whether one has been contributorily negligent is determined by an objective standard of reasonableness under the circumstances. This Article, for the first time, applies these contributory negligence principles to trade secret law. It draws upon this doctrine to frame and analyze a problem posed by modern technology. The very technological tools in use today that increase the efficiency with which companies do business create challenges for trade secret protection. They make trade secrets …
Privacy And Confidentiality In The Age Of E-Medicine, Keith A. Bauer
Privacy And Confidentiality In The Age Of E-Medicine, Keith A. Bauer
Journal of Health Care Law and Policy
No abstract provided.
State Government—The Arkansas Freedom Of Information Act—Houston We Have A Problem: A Coach And A Comptroller Illustrate The Repercussions Of Releasing Electronic Information Through The Arkansas Freedom Of Information Act, Alexander Justiss
University of Arkansas at Little Rock Law Review
FOIA provides a necessary oversight by which Arkansans can monitor the actions of those within the government. FOIA ensures that its purpose may not be thwarted by prohibiting the transfer, withdrawal, or destruction of documents in an attempt to prevent their release to the public. The executive, legislative, and judicial branches of the government are subject to the FOIA. FOIA statutorily exempts certain public records that would otherwise be accessible to Arkansans. Additionally, the Arkansas Constitution provides numerous safeguards to protect the privacy rights of individuals.
Issues arise with electronic communication under FOIA so various judicial and Attorney General opinions …
Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe
Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe
Elizabeth A Rowe
The very technological tools in use today that increase the efficiency with which companies do business create challenges for trade secret protection. They make trade secrets easier to store, easier to access, easier to disseminate, and more portable, thus increasing the risks that trade secrets will be destroyed. While secrecy is the sine qua non of trade secret protection, it can be difficult to accomplish. There is a tension between the need to keep information secret and modern technological methods that allow the information to be easily accessed, reproduced, and disseminated. In trade secret misappropriation cases, courts evaluate the sufficiency …
S08rs Sgb No. 4 (Bylaws), Palermo
S08rs Sgb No. 4 (Bylaws), Palermo
Student Senate Enrolled Legislation
No abstract provided.
From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione
From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione
Georgetown Law Faculty Publications and Other Works
Traditional legal memoranda have been used to teach objective analysis since the inception of legal writing programs in the 1970's. The continued use of these memoranda in the legal writing classroom leads law students to believe that traditional memoranda are still the primary form of communication between attorney and client. A 2006 survey of Georgetown University Law Center graduates, however, suggests that the traditional legal memorandum is all but dead in law practice. Seventy-five percent of the graduates surveyed said they write no more than three traditional memoranda per year. Instead, these graduates are more likely to communicate with clients …
The Memory Gap In Surveillance Law, Patricia L. Bellia
The Memory Gap In Surveillance Law, Patricia L. Bellia
Journal Articles
U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Journal Articles
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
Faculty Publications
The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Journal Articles
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …