Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Internet Law

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …