Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (2)
- Administrative procedure (1)
- Anonymous communication (1)
- COVID-19 (1)
- Celebrity (1)
-
- Computer-aided communication (1)
- Computers and privacy (1)
- Cryptography (1)
- Data breaches (1)
- Data privacy (1)
- Data protection laws (1)
- Digital cash (1)
- Digital signatures (1)
- Digitized data (1)
- Distributed databases (1)
- Electronic contracting rules (1)
- Electronic information (1)
- Electronic transactions regulation (1)
- Encryption policies (1)
- Ethics (1)
- Export control rules (1)
- Government data (1)
- ICANN (1)
- Internet Corporation for Assigned Names & Numbers (1)
- Internet domain names (1)
- Nondelegation doctrine (1)
- Personal privacy (1)
- Privatization (1)
- Professional Responsibility (1)
- Property (1)
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Computer Law
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
The Increased Use And Permanency Of Technology: How Those Changes Impact Attorneys’ Professional Responsibility And Ethical Obligations To Clients And Recommendations For Improvement, Scott B. Piekarsky
University of Miami Business Law Review
No abstract provided.
Government Data Breaches, A. Michael Froomkin
Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas
Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas
Articles
No abstract provided.
Form And Substance In Cyberspace, A. Michael Froomkin
Form And Substance In Cyberspace, A. Michael Froomkin
Articles
In this Response to the preceding article by Joe Sims and Cynthia Bauerly, A. Michael Froomkin defends his earlier critique of ICANN. This Response first summarizes the arguments in Wrong Turn In Cyberspace, which explained why ICANN lacks procedural and substantive legitimacy. This Response focuses on how the U.S. government continues to assert control over the domain name system, and how this control violates the APA, the nondelegation doctrine as articulated by the Supreme Court in Carter Coal, and public policy. Professor Froomkin then proposes that ICANN's role be more narrowly focused away from policy making towards true …
The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin
The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin
Articles
No abstract provided.
Article 2b As Legal Software For Electronic Contracting-Operating System Or Trojan Horse?, A. Michael Froomkin
Article 2b As Legal Software For Electronic Contracting-Operating System Or Trojan Horse?, A. Michael Froomkin
Articles
The proposed draft of Article 2B of the Uniform Commercial Code can be thought of as akin to a complex computer software suite which seeks to dominate a market by offering all things to all people. The author suggests, however, that Article 2B's electronic contracting rules interoperate poorly with existing digital signature laws, and with some forms of electronic commerce. The author also questions whether Article 2B is the proper means to enact controversial rules that ordinarily would make consumers liable for fraudulent uses of their digital signatures by third parties. After considering Article 2B's potential interaction with existing digital …
Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, And Distributed Databases, A. Michael Froomkin
Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, And Distributed Databases, A. Michael Froomkin
Articles
No abstract provided.
It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin
It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin
Articles
No abstract provided.