Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Internet

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 112

Full-Text Articles in Computer Law

From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan Jan 2024

From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan

University of Miami Business Law Review

But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …


Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky Jan 2024

Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky

University of Miami Business Law Review

For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …


The Five Internet Rights, Nicholas J. Nugent Jun 2023

The Five Internet Rights, Nicholas J. Nugent

Washington Law Review

Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …


Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi Jan 2023

Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson Oct 2021

Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson

Seattle University Law Review SUpra

No abstract provided.


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Barlow's Legacy, Cory Doctorow Aug 2019

Barlow's Legacy, Cory Doctorow

Duke Law & Technology Review

No abstract provided.


Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder Aug 2019

Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle

Duke Law & Technology Review

No abstract provided.


Is The Internet Over?! (Again?), James Boyle Aug 2019

Is The Internet Over?! (Again?), James Boyle

Duke Law & Technology Review

No abstract provided.


Inventing The Future: Barlow And Beyond, Cindy Cohn Aug 2019

Inventing The Future: Barlow And Beyond, Cindy Cohn

Duke Law & Technology Review

No abstract provided.


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson Aug 2019

A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson

Duke Law & Technology Review

No abstract provided.


Revisiting Barlow's Misplaced Optimism, Benjamin Edelman Aug 2019

Revisiting Barlow's Misplaced Optimism, Benjamin Edelman

Duke Law & Technology Review

No abstract provided.


Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen Aug 2019

Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen

Duke Law & Technology Review

No abstract provided.


John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain Aug 2019

John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain

Duke Law & Technology Review

No abstract provided.


What Didn’T Happen: An Essay In Speculation, Peter Jaszi Aug 2019

What Didn’T Happen: An Essay In Speculation, Peter Jaszi

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano Apr 2019

The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano

Pace Law Review

The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo Sep 2018

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo

San Diego International Law Journal

This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.


United States V. Ammons, Rebecca Ruffer Jan 2018

United States V. Ammons, Rebecca Ruffer

NYLS Law Review

No abstract provided.


Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky Dec 2017

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …