Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

2017

Institution
Keyword
Publication

Articles 1 - 30 of 44

Full-Text Articles in Computer Law

An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short Dec 2017

An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short

Maine Law Review

The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article …


Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky Dec 2017

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …


Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen Dec 2017

Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen

Maine Law Review

The subject matter we are going to talk about is variously named and the words have some resonances of importance. I am going to use the phrase “Free Software” to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.


Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb Nov 2017

Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb

Fordham Law Review

Under the current interpretations of authorization, instances where an individual harmlessly accesses the cloud data of another user could be classified as hacking and a violation of this federal statute. As such, this Note demonstrates that all of the current interpretations of the CFAA are too broad because they could result in this nonsensical outcome. This Note accordingly proposes an amendment to the CFAA specifically addressing user access to data on the cloud. Such an amendment would eliminate the unusual result of innocuous cloud-computing users being deemed hackers under federal law.


Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble Nov 2017

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble

Fordham Law Review

This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under the revised …


“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao Nov 2017

“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao

Fordham Law Review

The popularity of “esports,” also known as “electronic sports” or competitive video gaming, has exploded in recent years and captured the attention of cord-cutting millennials—often to the detriment of sports such as basketball, football, baseball, and hockey. In the United States, the commercial dominance of such traditional sports stems from decades of regulatory support. Consequently, while esports regulation is likely to emulate many aspects of traditional sports governance, the esports industry is fraught with challenges that inhibit sophisticated ownership and capital investment. Domestic regulation is complicated by underlying intellectual property ownership and ancillary considerations such as fluctuations in a video …


Guardians Of The Galaxy Of Personal Data: Assessing The Threat Of Big Data And Examining Potential Corporate And Governmental Solutions, Timothy A. Asta Oct 2017

Guardians Of The Galaxy Of Personal Data: Assessing The Threat Of Big Data And Examining Potential Corporate And Governmental Solutions, Timothy A. Asta

Florida State University Law Review

No abstract provided.


Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita Oct 2017

Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita

St. Mary's Journal on Legal Malpractice & Ethics

The use of electronic social communication has grown at a phenomenal rate. Facebook, the most popular social networking website, has over 1,968,000,000 users—a number that has exponentially grown since its inception in 2004. The number of judges accessing and using electronic social media (ESM) has also increased. However, unlike the general population, judges must consider constitutional, ethical, technical, and evidentiary implications when they use and access ESM. The First Amendment forbids “abridging the freedom of speech” and protects the expression of personal ideas, positions, and views. However, the American Bar Association’s Model Code of Judicial Conduct and the Texas Code …


Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James Sep 2017

Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James

Journal of Digital Forensics, Security and Law

When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer Jun 2017

Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer

Seattle University Law Review

Part I of this Article describes how the healthcare industry has arrived in this place of vulnerability, including (1) the history of the movement toward EHRs through HIPAA, (2) HIPAA’s meaningful use regulations and the background of current ransomware attacks, and (3) the distinctions between these attacks and other security breaches that have plagued large insurers and health systems within the last five years. Next, Part II will examine current industry culture when it comes to cybersecurity and review current legal and business approaches to address this growing threat. Then, Part III will argue that, while the current laws—including HIPAA …


Internet Tv: (Hopefully) Coming To A Computer Screen Near You, Nicholas Pellegrino Apr 2017

Internet Tv: (Hopefully) Coming To A Computer Screen Near You, Nicholas Pellegrino

Seton Hall Circuit Review

No abstract provided.


Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones Mar 2017

Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones

Georgia State University Law Review

Ashley Madison is an online dating service originally designed for people in committed relationships who want to cheat on their partners. In 2015, the website claimed to be “100% discreet.” Ashley Madison’s FAQs promised that its users would never compromise their “safety, privacy or security” and would never have to reveal their identities unless they chose to.

Ashley Madison’s concept attracted over forty million ostensibly anonymous members to its site. In July 2015, a group calling itself The Impact Team (Impact) hacked into Ashley Madison’s parent company, Avid Life Media, Inc. (Avid Life), breaching its security walls and reaching directly …


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay Jan 2017

Reviving The Fourth Amendment: Reasonable Expectation Of Privacy In A Cell Phone Age, 50 J. Marshall L. Rev. 555 (2017), Marisa Kay

UIC Law Review

No abstract provided.


The Chaos Of The Cfaa: Facebook's Successful Cfaa Claim Affects Website Owners, Competitors, And You, Breana Love Jan 2017

The Chaos Of The Cfaa: Facebook's Successful Cfaa Claim Affects Website Owners, Competitors, And You, Breana Love

Loyola of Los Angeles Law Review

No abstract provided.


Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz Jan 2017

Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explains how the cache works, discusses computer forensic examinations, and provides a history of child pornography laws. It next explores how the courts have interpreted the changing pornography laws with advances in technology. It then specifically assesses the different approaches the courts take when reconciling the mens rea (the mental element) of knowledge in accordance with possession. Finally, this comment analyzes the strengths and flaws in the courts’ arguments and suggests a proposal for how the courts should deal with the cache in relation to the criminalization of possession within the federal child pornography laws.


Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden Jan 2017

Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden

UIC John Marshall Journal of Information Technology & Privacy Law

Thanks to the advancements in technology and valor of citizens, the public is finally able to understand the true severity of police brutality within the United States. The following considerations aim to address the lack of accountability and transparency of police brutality in the United States today. Part III will show how advancements in technology brings police brutality to the forefront of our nation’s issues by creating an informed society. Part IV will describe how individual states control the use of private cameras and cell phones of citizens to capture occurrences of police brutality. States do this by employing anti-wiretapping …


Protecting Colleges & Universities Against Real Losses In A Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017), Gregory Demers, Seth Harrington, Mark Cianci, Nicholas Green Jan 2017

Protecting Colleges & Universities Against Real Losses In A Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017), Gregory Demers, Seth Harrington, Mark Cianci, Nicholas Green

UIC John Marshall Journal of Information Technology & Privacy Law

Colleges and universities are prime targets for cyberattacks. Authors Gregory L. Demers, Seth C. Harrington, Mark A. Cianci, and Nicholas R. Green explore emerging data security risks and litigation trends on college campuses, and offer ways to manage these risks through a comprehensive insurance plan. Given the increasing variety and complexity of plans available, it is incumbent upon universities to regularly reassess the coverage afforded by their existing policies.


War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste Jan 2017

War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste

Canadian Journal of Law and Technology

No abstract provided.


The Law Of Cyber Warfare: Restrictions, Opportunities And Loopholes, Nicholas Tsagourias Jan 2017

The Law Of Cyber Warfare: Restrictions, Opportunities And Loopholes, Nicholas Tsagourias

Canadian Journal of Law and Technology

The article considers the applicability of existing international rules on the use of force to cyber attacks and assesses their effectiveness. The author’s conclusion is that the current regime on the use of force fails to capture the particularities of cyber attacks and for this reason he makes some tentative proposals for enhancing security in this area.


Cyber Operations And The Humanization Of International Humanitarian Law: Problems And Prospects, Giacomo Biggio Jan 2017

Cyber Operations And The Humanization Of International Humanitarian Law: Problems And Prospects, Giacomo Biggio

Canadian Journal of Law and Technology

The aim of International Humanitarian Law (‘‘IHL”) is to regulate the conduct of hostilities while, at the same time, balancing the two overarching concepts of military necessity and humanity. While the principle of military necessity allows a party to a conflict to exercise any amount of armed violence which is necessary for the accomplishment of a military purpose, the principle of humanity aims at minimizing the amount of physical violence caused to combatants and the civilian population. From the late 19th century onwards the principle of humanity has progressively eroded the domain of military necessity, influencing the creation and interpretation …


Do They Want To Regulate Online Profiling?, Laura Garcia Vargas Jan 2017

Do They Want To Regulate Online Profiling?, Laura Garcia Vargas

Canadian Journal of Law and Technology

Online profiling or behavioural tracking is the process by which private companies track and gather data about users’ activities in online platforms. The data collected by all the companies is aggregated with the purpose of creating a comprehensive profile about users. Since at least 15 years ago, there have been several attempts to regulate online profiling in order to reduce its privacy implications. In general, these regulations have tried to limit the way the information is used, the type of data that is collected, and impose or suggest the security standards that the companies should take to protect it.

This …


The Dark Web: Some Thoughts For An Educated Debate, Vanessa Henri Jan 2017

The Dark Web: Some Thoughts For An Educated Debate, Vanessa Henri

Canadian Journal of Law and Technology

The ‘‘dark web” is a part of cyberspace that is only accessible through an anonymity software, such as The Onion Router. This encrypted network has prompted important legal challenges. As jurisprudence develops, many factors are at risk of inhibiting users’ right to privacy. Misunderstandings of the dark web’s functioning or myths regarding its veil of anonymity has justified invasive criminal investigations that has threatened users’ right to remain anonymous online. This article discusses these challenges while analyzing current legal developments in the United States and Canada.


Third-Party Services As Potential Sources For Law Enforcement Procurement Of Genomic Data, Katherine Kwong Jan 2017

Third-Party Services As Potential Sources For Law Enforcement Procurement Of Genomic Data, Katherine Kwong

Canadian Journal of Law and Technology

This paper examines two cases studies: Ancestry.com’s experience with law enforcement use of its genetic databases, and 23andMe’s responses to requests for users’ genomic data. Analyzing the responses to law enforcement requests by the two of the largest providers of third-party genomic services provides insight into the struggles third-party genomic services are likely to face and possible future directions for companies facing this type of law enforcement request.


Do Androids Dream Of Bad News?, Heidi Liu Jan 2017

Do Androids Dream Of Bad News?, Heidi Liu

Canadian Journal of Law and Technology

Breaking bad news is one of the toughest things to do in any field dealing with client care. As automation and technology increasingly interweave with human experience, there is growing concern about whether automated agents (‘‘AAs”) would be adequate to perform such a complex emotional act. In this paper, I draw from the literature in psychology and computer science to understand how individuals might react to automated agents (AAs) and address some of the strengths and limitations of AAs. I raise several legal and empirical issues that future designers and users of AAs must consider, including disclosure of and liability …


Can You Hear Me Now? Conceptions Of Privacy In Section 8, Chris Sewrattan Jan 2017

Can You Hear Me Now? Conceptions Of Privacy In Section 8, Chris Sewrattan

Canadian Journal of Law and Technology

This article will examine the different conceptions of privacy that are present in the jurisprudence of s. 8 of the Canadian Charter of Rights and Freedoms. Section 8 guarantees that everyone has the right against unreasonable search and seizure. As a constitutional right, the protection covers the privacy relationship between the state and the individual. It confers privacy over information for which there exists a reasonable expectation of privacy. The article will analyze a taxonomy of four privacy conceptions present in the literature and discuss their presence in s. 8 case law. It will then examine two criticisms that arise …


A Critical Assessment On The Extraterritorial Application Of Human Rights Treaties To Transnational Cyber Surveillance, Wanshu Cong Jan 2017

A Critical Assessment On The Extraterritorial Application Of Human Rights Treaties To Transnational Cyber Surveillance, Wanshu Cong

Canadian Journal of Law and Technology

In this essay, I question the appropriateness of applying the substantive requirements of lawful domestic surveillance developed from international human rights treaties and relevant case law to transnational cyber surveillance. And I argue in the negative. Therefore, for the purpose of this essay, I would not delve into the highly debatable issue of what counts as ‘‘control” in cyber surveillance and which standard of control triggers a state’s jurisdiction. Instead, this essay assumes that a control test was established. In the following section, I shall examine the substantive requirements for states restricting fundamental freedoms drawn on from current human rights …


A Whole New Meaning To Having Our Head In The Clouds: Voice Recognition Technology, The Transmission Of Our Oral Communications To The Cloud And The Ability Of Canadian Law To Protect Us From The Dangers It Presents, Sarit K. Mizrahi Jan 2017

A Whole New Meaning To Having Our Head In The Clouds: Voice Recognition Technology, The Transmission Of Our Oral Communications To The Cloud And The Ability Of Canadian Law To Protect Us From The Dangers It Presents, Sarit K. Mizrahi

Canadian Journal of Law and Technology

Voice recognition technology is now included in modern devices as a matter of course, being used in anything from our cellular telephones, to our televisions, and even the toys of our children. While we may voluntarily interact with some of our devices using this technology, such as conversing with Siri on our iPhones, many of us remain unaware as to the dangerous implications of using voice recognition technology.

Its ability to record some of our most personal conversations allows private companies to eavesdrop on us in an unprecedented manner and amass highly sensitive information about our lives that would have …