Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Law (2)
- Constitutional Law (2)
- First Amendment (2)
- 3D Printing (1)
- All Other Telecommunications (1)
-
- Anonymity (1)
- Anonymous (1)
- Communications Law (1)
- Computer (1)
- Constitution (1)
- Data Insourcing (1)
- Data encryption (Computer science) (1)
- Defamation (1)
- Digital Currencies (1)
- Fake reviews (1)
- First amendment (1)
- Free speech (1)
- Identity (1)
- Internet (1)
- National Security (1)
- National security -- United States (1)
- Online anonymity (1)
- Online defamation (1)
- Online reviews (1)
- Outsourcing (1)
- Reviews (1)
- Right of privacy (1)
- Science and Technology (1)
- Searches & seizures (Law) (1)
- Synthetic Biology (1)
- Publication Type
- File Type
Articles 1 - 4 of 4
Full-Text Articles in Computer Law
The Doctrinal Toll Of "Information As Speech", Kyle Langvardt
The Doctrinal Toll Of "Information As Speech", Kyle Langvardt
Kyle Langvardt
The courts over the past two decades have reached a near-consensus that computer code, along with virtually every flow of data on the Internet, is “speech” for First Amendment purposes. Today, newer information technologies such as 3D printing, synthetic biology, and digital currencies promise to remake whole other spheres of non-expressive economic activity in the Internet's image. The rush to claim First Amendment protections for these non-expressive but code-dependent technologies has already begun with a lawsuit claiming First Amendment privileges for the Internet distribution of 3D-printable guns. Many similar suits will surely follow, all pursuing the common dream of a …
Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown
Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown
Georgia Law Review
Long before revelations of the National Security Agency's data collection programs grabbed headlines, scholars and the press decried the burgeoning harms to privacy that metadata mining and new surveillance technologies present. Through publicly accessible social media sites, web-tracking technologies, private data mining consolidators, and its own databases, the government is just a mouse click away from a wealth of intimate personal information that was virtually inaccessible only a decade ago. At the heart of the conundrum is the government's ability to source an unprecedented amount of personal data from private third parties. This trail of digital information is being insourced …
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Jesse D Lively
This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …