Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

E-mail

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 40

Full-Text Articles in Law

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


Designing Surveillance Law, Patricia L. Bellia Aug 2016

Designing Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.

For most scholars, the question of who should regulate communications surveillance …


Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker Dec 2015

Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker

Journal of Intellectual Property Law

No abstract provided.


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama Jun 2014

How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama

Touro Law Review

No abstract provided.


Your Digital Footprint Left Behind At Death: An Illustration Of Technology Leaving The Law Behind, Sandi S. Varnado May 2014

Your Digital Footprint Left Behind At Death: An Illustration Of Technology Leaving The Law Behind, Sandi S. Varnado

Louisiana Law Review

The article discusses legal issues regarding digital accounts, files, and information after death, focusing on U.S. law. Topics include estate administration, common digital items such as photographs, e-mail, social media accounts, and financial digital items, and online service providers (OSPs). Other topics include terms of service (TOS), the emotional value of digital assets for the decedent's survivors, and creating an inventory of political assets.


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


The Memory Gap In Surveillance Law, Patricia L. Bellia Oct 2013

The Memory Gap In Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Oct 2013

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Patricia L. Bellia

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Oct 2013

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Patricia L. Bellia

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr. Apr 2013

Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.

Richard Sanvenero Jr.

This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …


What Happens To Our Facebook Accounts When We Die?: Probate Versus Policy And The Fate Of Social-Media Assets Postmortem, Kristina Sherry Jan 2013

What Happens To Our Facebook Accounts When We Die?: Probate Versus Policy And The Fate Of Social-Media Assets Postmortem, Kristina Sherry

Pepperdine Law Review

More than 580,000 Facebook users in the U.S. will die this year, raising numerous legal questions as to the disposition of their Facebook pages and similar “digital assets” left in a state of legal limbo. While access to and ownership of decedents’ email accounts has been philosophized for nearly a decade, this Comment focuses on the additional legal uncertainties posed by “digital death” in the more amorphous realm of “social media.” Part II explores the implications of digital death by conceptualizing digital assets and surveying the underlying legal principles of contractual policies, probate, property, and privacy concerns. Part III surveys …


E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood Nov 2012

E-Mails To Clients: Avoiding Missteps, Kristin J. Hazelwood

Law Faculty Popular Media

In this column for Kentucky Bar Association's magazine (B&B - Bench & Bar), Professor Hazelwood addresses the ethical implications of emailing with a client. Practitioners are provided a series of questions to ask before emailing a client.


Managing The Impact Of New Media On The Employment Relationship, Susan A. O'Sullivan-Gavin, John H. Shannon Sep 2012

Managing The Impact Of New Media On The Employment Relationship, Susan A. O'Sullivan-Gavin, John H. Shannon

The Journal of Business, Entrepreneurship & the Law

Attention to privacy issues in the workplace has increased over the past two decades as use of electronic mail and text messages has made these means of communication commonplace. Beyond text messages and emails, employees can access the internet at their place of employment at many different entry points. This access can be through company issued desktops or laptops, mobile phones, mobile internet devices (MIDs), Smartphone technology (photography; video and voice recording capabilities; file transfer and storage), off-site internet connections, Wi-Fi access or hot spots. Employees can access and/or post information on various sites including blogs, wikis, RSS feeds, instant …


The Discoverability Of E-Mails: The Smoking Gun Of The Modern Era, Michael J. Martin Jun 2012

The Discoverability Of E-Mails: The Smoking Gun Of The Modern Era, Michael J. Martin

Michael J Martin

The discoverability of e-mails is an area of law that every modern day lawyer must be familiar with in order to avoid the risk of being sanctioned. Over the past years, courts have awarded sanctions to moving parties at a steadily increasing pace. These sanctions have included adverse jury instructions, default judgments, attorney’s fees, large monetary fines, and in one instance, a jail sentence. Courts have sent the message that improper conduct will not be tolerated in this developing area of law by not hesitating to order sanctions. Thus, it is essential that modern day lawyers become acquainted with the …


The Return Of “Voodoo Information”: A Call To Resist A Heightened Authentication Standard For Evidence Derived From Social Networking Websites, Richard Fox Jan 2012

The Return Of “Voodoo Information”: A Call To Resist A Heightened Authentication Standard For Evidence Derived From Social Networking Websites, Richard Fox

Catholic University Law Review

No abstract provided.


Designing Surveillance Law, Patricia L. Bellia Jan 2011

Designing Surveillance Law, Patricia L. Bellia

Journal Articles

As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.

For most scholars, the question of who should regulate communications surveillance …


Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Scholarly Works

This paper discusses the growth and increasing significance of e-mail in the business and personal environment, and how unsolicited bulk commercial e-mail, also known as spam, has become a significant drain on technical and economic resources. It analyzes the statutory and self-help efforts to combat spam, with a specific focus on block lists and automated spam filters, and describes how alleged spammers have brought lawsuits in U.S. courts claiming they had been wrongfully included within block lists and filters. Finally, it describes some possible claims under U.S. law, then argues for a revision to current statutes to mandate a higher …


Contributory Negligence, Technology, And Trade Secrets, Elizabeth A. Rowe Mar 2009

Contributory Negligence, Technology, And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

In tort law, the doctrine of contributory negligence captures conduct by the plaintiff which falls below the standard to which he should conform for his own protection. Whether one has been contributorily negligent is determined by an objective standard of reasonableness under the circumstances. This Article, for the first time, applies these contributory negligence principles to trade secret law. It draws upon this doctrine to frame and analyze a problem posed by modern technology. The very technological tools in use today that increase the efficiency with which companies do business create challenges for trade secret protection. They make trade secrets …


Privacy And Confidentiality In The Age Of E-Medicine, Keith A. Bauer Jan 2009

Privacy And Confidentiality In The Age Of E-Medicine, Keith A. Bauer

Journal of Health Care Law and Policy

No abstract provided.


State Government—The Arkansas Freedom Of Information Act—Houston We Have A Problem: A Coach And A Comptroller Illustrate The Repercussions Of Releasing Electronic Information Through The Arkansas Freedom Of Information Act, Alexander Justiss Oct 2008

State Government—The Arkansas Freedom Of Information Act—Houston We Have A Problem: A Coach And A Comptroller Illustrate The Repercussions Of Releasing Electronic Information Through The Arkansas Freedom Of Information Act, Alexander Justiss

University of Arkansas at Little Rock Law Review

FOIA provides a necessary oversight by which Arkansans can monitor the actions of those within the government. FOIA ensures that its purpose may not be thwarted by prohibiting the transfer, withdrawal, or destruction of documents in an attempt to prevent their release to the public. The executive, legislative, and judicial branches of the government are subject to the FOIA. FOIA statutorily exempts certain public records that would otherwise be accessible to Arkansans. Additionally, the Arkansas Constitution provides numerous safeguards to protect the privacy rights of individuals.

Issues arise with electronic communication under FOIA so various judicial and Attorney General opinions …


Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe Sep 2008

Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe

Elizabeth A Rowe

The very technological tools in use today that increase the efficiency with which companies do business create challenges for trade secret protection. They make trade secrets easier to store, easier to access, easier to disseminate, and more portable, thus increasing the risks that trade secrets will be destroyed. While secrecy is the sine qua non of trade secret protection, it can be difficult to accomplish. There is a tension between the need to keep information secret and modern technological methods that allow the information to be easily accessed, reproduced, and disseminated. In trade secret misappropriation cases, courts evaluate the sufficiency …


S08rs Sgb No. 4 (Bylaws), Palermo Apr 2008

S08rs Sgb No. 4 (Bylaws), Palermo

Student Senate Enrolled Legislation

No abstract provided.


From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione Jan 2008

From Snail Mail To E-Mail: The Traditional Legal Memorandum In The Twenty-First Century, Kristen Konrad Robbins-Tiscione

Georgetown Law Faculty Publications and Other Works

Traditional legal memoranda have been used to teach objective analysis since the inception of legal writing programs in the 1970's. The continued use of these memoranda in the legal writing classroom leads law students to believe that traditional memoranda are still the primary form of communication between attorney and client. A 2006 survey of Georgetown University Law Center graduates, however, suggests that the traditional legal memorandum is all but dead in law practice. Seventy-five percent of the graduates surveyed said they write no more than three traditional memoranda per year. Instead, these graduates are more likely to communicate with clients …


The Memory Gap In Surveillance Law, Patricia L. Bellia Jan 2008

The Memory Gap In Surveillance Law, Patricia L. Bellia

Journal Articles

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia Dec 2007

Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Jan 2007

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Journal Articles

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …