Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2013

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 92

Full-Text Articles in Computer Law

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin Dec 2013

Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin

Seattle Journal for Social Justice

No abstract provided.


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Oct 2013

Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia Oct 2013

A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia

Indiana Law Journal

No abstract provided.


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


International Cryptography Regulation And The Global Information Economy, Nathan Saper Sep 2013

International Cryptography Regulation And The Global Information Economy, Nathan Saper

Northwestern Journal of Technology and Intellectual Property

With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.

This Note seeks to introduce the reader to the issue of international cryptography regulation …


The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang Sep 2013

The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang

Northwestern Journal of Technology and Intellectual Property

With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


Rankings, Reductionism, And Responsibility , Frank Pasquale Aug 2013

Rankings, Reductionism, And Responsibility , Frank Pasquale

Frank A. Pasquale

After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …


The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq Aug 2013

The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq

Vincent J Roth Esq

Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …


The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq Aug 2013

The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq

Vincent J Roth Esq

Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …


Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart Aug 2013

Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart

Allyson Haynes Stuart

This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …


Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel Jul 2013

Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel

Seattle University Law Review

Penny auctions, an online phenomenon imported from Europe, operate by the hundreds in the United States without meaningful oversight from consumer protection agencies. In a penny auction, consumers compete for items one penny at a time. To date, no significant inquiry, either academic or practical, into the legitimacy of the penny auction has occurred. Although marketed as auctions, online penny auctions may actually qualify as lotteries. Unlike the multifarious and confusing definitions of gambling, the long-accepted definition of a lottery consists of three elements: prize, consideration, and chance. If a penny auction satisfies this definition then, under well-established case law …


Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Jun 2013

Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.


Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou Jun 2013

Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou

Chang Zhou

No abstract provided.


Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney Jun 2013

Patent-Backed Securization For Innovation And Economic Growth In The Life Sciences: A Proposal For Incremental Securities Law Reform, Grace Sweeney

Canadian Journal of Law and Technology

In this section, the historical balance struck by securities law between conservatism and innovation was considered in the context of a shifting economic landscape.

In Section II, the life sciences sector will be chosen to illustrate the current barriers impeding capital flow to high-value enterprise, resulting in decreased innovation and economic growth. These include the existence of “ever greening”, non-practicing entities, patent thickets, and onerous transaction costs on upstream patent holders with limited competency.

In Section III, the tool of intangible asset finance will be introduced as a means of harnessing the value of intellectual property assets, and leveraging them …


Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco Jun 2013

Proof And Progress: Coping With The Law Of Evidence In A Technological Age, David M. Paciocco

Canadian Journal of Law and Technology

This article outlines those rules of evidence that are most likely to be called upon to fit new technologies. It identifies some of the challenges that are presented, and identifies modest techniques or suggestions for coping. Those suggestions include taking the kind of relaxed view as to when expert evidence is being offered illustrated by the Ontario Court of Appeal in R. v. Hamilton; taking a functional approach to judicial notice; ensuring that authentication and the “best evidence” rule for electronic records are not applied in a highly technical fashion; understanding the law of hearsay and remaining familiar with …


Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie Jun 2013

Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie

Canadian Journal of Law and Technology

It is a challenge to simply state the law about social media, because there is no such thing as “social media law.” Rather, the law bumps up against social media in many ways. In some cases, existing law can be seamlessly applied to new technologies and means of interaction. In other cases, entirely new paradigms will likely need to be adopted to handle new challenges. Many other cases will fall somewhere in between.

Our goal in this Law Simply Stated is to provide some background on the nature of social media themselves, and then to state the basic law in …


Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell Jun 2013

Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell

Canadian Journal of Law and Technology

Despite the many technological advances that could benefit the court system, the use of computers and network technology to facilitate court procedures is still in its infancy, and court procedures largely remain attached to paper documents and to the physical presence of the parties at all stages. More and more research is focusing on the use of technology to make the legal system more efficient and to reduce excessive legal costs and delays. The goal of this exploratory research project is to examine the experience of justice sector technology implementation from the perspective of individuals involved first-hand in the implementation …


Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock Jun 2013

Regulatory Issues Concerning New Media Alternatives To Television, Michael Rimock

Canadian Journal of Law and Technology

This article will begin by discussing the significance of over-the-top (OTT) video services in Canada and briefly outline the CRTC’s recent efforts and findings in relation to new media trends. It will then describe the problems with the current regulatory framework and some of the proposed solutions. While some have argued that regulating OTT services like Netflix would level the playing field, I will argue that encouraging competition and decreasing some of the onerous regulations that are currently imposed on Canadian broadcasters would be the best solution since it would benefit both consumers and Canadian corporations.


In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang Apr 2013

In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang

Journal of the National Association of Administrative Law Judiciary

The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.


Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr. Apr 2013

Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.

Richard Sanvenero Jr.

This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …


Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik Apr 2013

Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik

Eliza Mik

The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. The technological characteristics of the Internet have a tendency to turn traditional legal doctrines on their head, or, at least expose flaws in existing legal arguments. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity. The latter must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence …


Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon Apr 2013

Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon

Leysser L. León

Se comentan críticamente algunas de las más controvertidas disposiciones contenidas en el reciente Reglamento de la Ley peruana de Protección de Datos Personales. Se echa de menos, en especial, y atendiendo a la labor reglamentaria del Ministerio de Justicia reflejada en este dispositivo, una actitud consciente de los funcionarios acerca la importancia de la tutela de la autodeterminación informativa en los países que, como el Perú, siguen sin resolver graves males sociales, como la discriminación.


Copyright, Neuroscience, And Creativity, Erez Reuveni Apr 2013

Copyright, Neuroscience, And Creativity, Erez Reuveni

Erez Reuveni

It is said that copyright law’s primary purpose is to encourage creativity by providing economic incentives to create. Accepting this premise, the primary disagreement among copyright stakeholders today concerns to what extent strong copyrights in fact provide efficient economic incentives. This focus on economic incentives obscures what is perhaps copyright doctrine’s greatest weakness—although the primary purpose of copyright law is to encourage creativity, copyright doctrine lacks even a rudimentary understanding of how creativity functions on a neurobiological level. The absence of a cohesive understanding of the science of creativity means that much of copyright theory is premised on antiquated assumptions …


The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva Apr 2013

The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva

IP Theory

No abstract provided.


Pirates Of The Australian Election, Matthew Rimmer Mar 2013

Pirates Of The Australian Election, Matthew Rimmer

Matthew Rimmer

“Pirate parties” have proliferated across Europe and North America in the past decade, championing issues such as intellectual property (IP), freedom of speech, and the protection of privacy and anonymity.This year, the movement hit Australian shores: The Pirate Party Australia was officially registered by the Australian Electoral Commission in January 2013. (You can read its principles and platform here.)“More than ever before, there is a necessity in Australia for a party that holds empowerment, participation, free culture and openness as its central tenets”, Pirate Party founder Rodney Serkowski said in a press release announcing the group’s successful registration. Their first …