Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 18 of 18
Full-Text Articles in Internet Law
Online Disinhibited Contracts, Wayne R. Barnes
Online Disinhibited Contracts, Wayne R. Barnes
Faculty Scholarship
There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
Catholic University Journal of Law and Technology
More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …
Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny
Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny
NYLS Law Review
No abstract provided.
Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler
University of Michigan Journal of Law Reform
While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert
Pepperdine Law Review
No abstract provided.
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn
Federal Communications Law Journal
In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
University of Michigan Journal of Law Reform
This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Cleveland State Law Review
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Indecent Exposures In An Electronic Regime, Natalie L. Regoli
Federal Communications Law Journal
As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.
"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat
"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat
Seattle University Law Review
Although there are a wide array of unresolved trademark issues with regard to the Internet, this Comment will not address disputes involving anything beyond the visible content of an individual's website. Domain name and meta-tag issues, though often referenced in order to demonstrate trends in analysis, are not the subjects of this inquiry. Rather, this Comment will focus on the triumvirate of claims most frequently asserted against individual web masters in the battle over the propriety of consumer commentary: trademark infringement, unfair competition, and trademark dilution. A recent court decision, Bally Total Fitness v. Faber, provides an example of the …
The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver
The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver
Federal Communications Law Journal
Prior to the passage of the 1996 Telecommunications Act, policymakers sought funding and regulatory mechanisms capable of fulfilling the vision of an Information Superhighway. Vice President Gore, the Clinton Administration's point person on the issue, initially proposed assessing fees on other sectors of the telecommunications industry to fund construction. Meanwhile, conservatives asserted that deregulation of the industry would achieve the desired result. A compromise ultimately was reached: the 1996 Act requires local exchange carriers to unbundle their networks and provide access at a reasonable cost to competitors. The use of regulatory formulas in lieu of taxes to subsidize a national …
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
No abstract provided.