Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Selected Works

Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 135

Full-Text Articles in Computer Law

Workplace Privacy And Monitoring: The Quest For Balanced Interests , Ariana R. Levinson Jun 2019

Workplace Privacy And Monitoring: The Quest For Balanced Interests , Ariana R. Levinson

Ariana R. Levinson

We can see in 2001 that 77 percent of employers were engaged in monitoring. This may have increased slightly or decreased slightly, but whatever has happened, we know that this is a significant amount of employers--much greater than a majority--that are engaging in monitoring of their employees. We can also see the great rise in monitoring of computers and electronic files in a ten-year period between 1997 and 2007. Finally, we can see some of the newer technologies. In 2007, twelve percent of the reporting employers were monitoring the blogosphere, eight percent were monitoring GPS vehicle tracking, and ten percent …


Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross Apr 2019

Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross

John Cross

This article discusses the process of innovation and releasing so-called negative information to help others in the process to innovate. The article focuses on patent law and asks the questions: Why do people innovate? Does the legal system really reflect how the process of innovation actually occurs?


Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross Apr 2019

Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross

John Cross

Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is …


Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin Sep 2018

Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin

David E. Sorkin

No abstract provided.


Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Mary Margaret Meg Penrose Jul 2018

Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Mary Margaret Meg Penrose

Meg Penrose

No abstract provided.


By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson Feb 2018

By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson

Brian Larson

By June of 2017, Facebook had two billion (that’s billion, with a ‘b’) users accessing it per month (Balakrishnan 2017). Facebook believes that each of those consumer end-users is bound by its end-user license agreement (EULA), which Facebook calls a “Statement of Rights and Responsibilities,” available to end-users from a small link in light gray text called “Terms” on every Facebook page. EULAs like this, associated with websites, mobile apps, and consumer goods with embedded software, and styled “terms of service,” “terms of use,” etc., may purport to impose a wide variety of contractual obligations on consumers, for example depriving …


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano Oct 2016

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions …


Chapter Four: Information Security, Tracy Mitrano Oct 2016

Chapter Four: Information Security, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter One: Free Speech, Tracy Mitrano Oct 2016

Chapter One: Free Speech, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Two: Privacy, Tracy Mitrano Oct 2016

Chapter Two: Privacy, Tracy Mitrano

Tracy Mitrano

"Free speech" and "privacy" operate as integral, essential supporting values that underpin the missions of colleges and universities in the United States. Chapter One focused attention on free speech. Many of the same arguments could be made by and for privacy. It would be interesting to subject the same content about free speech to a global "find and replace" function for the applicable legal and policy points between them! Nonetheless, US law separates these two areas. Therefore, this chapter will focus on privacy law in particular: government surveillance and consumer privacy. Both subsets of privacy law, I will argue, have …


Chapter Three: Intellectual Property, Tracy Mitrano Oct 2016

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Conclusion, Tracy Mitrano Oct 2016

Conclusion, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Shareholder Wealth Maximization As Means To An End, Robert P. Bartlett, Iii Aug 2016

Shareholder Wealth Maximization As Means To An End, Robert P. Bartlett, Iii

Robert Bartlett

In several recent cases, the Delaware Chancery Court has emphasized that where a conflict of interest exists between holders of a company’s common stock and holders of its preferred stock, the standard of conduct for directors requires that they strive to maximize the value of the corporation for the benefit of its common stockholders rather than for its preferred stockholders. This article interrogates this view of directors’ fiduciary duties from the perspective of incomplete contracting theory. Building on the seminal work of Sanford Grossman and Oliver Hart, incomplete contracting theory examines the critical role of corporate control rights for addressing …


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe May 2016

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …


Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges Dec 2015

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …


Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett Oct 2015

Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett

John Ehrett

I evaluate the dimensions of courts’ current interpretive dilemma, and subsequently sketch a possible framework for extending traditional statutory interpretation principles into this new domain: throughout the following analysis, I describe the process of attaching cognizable linguistic referents to emoticons and emojis throughout as symbolical reification, and propose a normative way forward for those tasked with deriving meaning from emoji-laden communications.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Oct 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Alberto Bernabe

No abstract provided.


"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo Aug 2015

"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo

Críspulo Marmolejo

This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …


On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock Aug 2015

On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock

William B.T. Mock

The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii Jul 2015

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii

David E. Sorkin

Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jul 2015

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

David E. Sorkin

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jul 2015

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

David E. Sorkin

No abstract provided.


Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin Jul 2015

Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin

David E. Sorkin

This article examines the effect of spam legislation in the United States. It discusses state legislation and the common provisions of state spam legislation, such as disclosure and labeling requirements and opt-out provisions. It also analyzes the consequences of state anti-spam legislation. Federal legislation is analyzed, with a brief look at the CAN-SPAM Act of 2003. The article concludes that legislation has not had a big impact on spam, and the CAN-SPAM Act is not likely to change or curb spam.


1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin Jul 2015

1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin

David E. Sorkin

No abstract provided.


Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin Jul 2015

Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin

David E. Sorkin

No abstract provided.


Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin Jul 2015

Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin

David E. Sorkin

No abstract provided.


Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin Jul 2015

Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin

David E. Sorkin

No abstract provided.