Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Internet Law

Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman Nov 2017

Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman

Michigan Telecommunications & Technology Law Review

Consumer reviews are vitally important to our modern economy. Markets become stronger and more efficient when consumers share their marketplace experiences and guide other consumers toward the best vendors and away from poor ones. Businesses recognize the importance of consumer reviews, and many businesses take numerous steps to manage how consumer reviews affect their public image. Unfortunately, in a misguided effort to control consumer reviews, some businesses have deployed contract provisions that ban or inhibit their consumers from reviewing them. I call those provisions “antireview clauses.”

Anti-review clauses distort the marketplace benefits society gets from consumer reviews by suppressing peer …


Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas Nov 2017

Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas

Michigan Telecommunications & Technology Law Review

The Digital Millennium Copyright Act (DMCA) has shaped the Internet as we know it. This legislation shields online service providers from secondary copyright infringement liability in exchange for takedown of infringing content of their users. Yet online payment processors, the backbone of $300 billion in U.S. e-commerce, are completely outside of the DMCA’s protection. This Article uses PayPal, the most popular online payment company in the U.S., to illustrate the growing risk of secondary liability for payment processors. First it looks at jurisprudence that expands secondary copyright liability online, and explains how it might be applied to PayPal. Then it …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Argh, Matey! The Faux-Pas Of The Sopa (Stop Online Piracy Act), Anna S. Han Jan 2012

Argh, Matey! The Faux-Pas Of The Sopa (Stop Online Piracy Act), Anna S. Han

University of Michigan Journal of Law Reform Caveat

Earlier, I posted about a network neutrality case, Verizon v. FCC, which could have far-reaching consequences for the Internet industry. Another concerted attempt to regulate the Internet, disguised in the form of a piracy protection bill, recently came before the House Judiciary Committee and garnered widespread disapproval. Representative Lamar Smith (R-TX) and a bipartisan group of twelve co-sponsors introduced the “Stop Online Piracy Act” (“SOPA”) on October 26, 2011, which punishes websites that are accused of facilitating copyright infringement. Although touted by its supporters as a weapon against foreign sites that steal and sell American inventions, SOPA is problematic because …


Interactive Computer Service Liability For User-Generated Content After Roommates.Com, Bradley M. Smyer May 2010

Interactive Computer Service Liability For User-Generated Content After Roommates.Com, Bradley M. Smyer

University of Michigan Journal of Law Reform

This Note explores the future of interactive computer service provider (ICSP) liability for user-generated content under the Communications Decency Act (CDA) after Roommates.com II. Roommates.com II held that a housing website was not entitled to immunity under § 230 of the CDA from federal Fair Housing Act claims, in part because providing preselected answers to a mandatory questionnaire rendered the site an "information content provider" at least partially responsible for creation or development of answers. After examining the historical and legislative origins of ICSP immunity for user-generated content under 47 U.S. C. § 230, this Note argues that courts …


Digital Copyright, Jessica D. Litman Jan 2006

Digital Copyright, Jessica D. Litman

Books

In 1998, copyright lobbyists succeeded in persuading Congress to enact laws greatly expanding copyright owners' control over individuals' private uses of their works. The efforts to enforce these new rights have resulted in highly publicized legal battles between established media and new upstarts.

In this book, law professor Jessica Litman questions whether copyright laws crafted by lawyers and their lobbyists really make sense for the vast majority of us. Should every interaction between ordinary consumers and copyright-protected works be restricted by law? Is it practical to enforce such laws, or expect consumers to obey them? What are the effects of …


From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans Apr 2004

From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans

Michigan Telecommunications & Technology Law Review

If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …


The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky Oct 2003

The Need For Revisions To The Law Of Wiretapping And Interception Of Email, Robert A. Pikowsky

Michigan Telecommunications & Technology Law Review

I argue that a person's privacy interest in his email is the same as his privacy interest in a telephone conversation. Moreover, the privacy interest in email remains unchanged regardless of whether it is intercepted in transmission or covertly accessed from the recipient's mailbox. If one accepts this assumption, it follows that the level of protection against surveillance by law enforcement officers should be the same[...] As technology continues to blur the distinction between wire and electronic communication, it becomes apparent that a new methodology must be developed in order to provide logical and consistent protection to private communications. The …


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Toward A "New Deal" For Copyright In The Information Age, Pamela Samuelson Jan 2002

Toward A "New Deal" For Copyright In The Information Age, Pamela Samuelson

Michigan Law Review

Jessica Litman believes the public needs a very good copyright lawyer, and if I have not mistaken her intentions, she is volunteering for the job (pp. 70-73). A century of Congressional deference to industry-negotiated compromises has produced, she argues, a copyright law that is both incomprehensible and unfair. This incomprehensibility might be tolerable if copyright law governed only commercial relations among industry participants, all of whom have copyright counsel. To the extent that copyright law applies to the conduct of ordinary persons, its incomprehensibility presents serious difficulties. Moreover, to the extent that copyright law makes illegal many ordinary activities of …


Proactive Legislation And The First Amendment, Stuart Minor Benjamin Nov 2000

Proactive Legislation And The First Amendment, Stuart Minor Benjamin

Michigan Law Review

It is a commonplace that the world is changing rapidly, with whole sectors of the economy being transformed. New forms of communication, like the World Wide Web, e-mail, and satellite television, have risen from obscurity to ubiquity in less than a decade. The speed of these changes has led some to express concern about the ability of governments to respond. The fear is that governments cannot keep up with developments as they occur and thus get hopelessly behind. The solution, according to some, is for the government to act proactively - before a harm has arisen, so that the government …


Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler Jun 2000

Plotting The Return Of An Ancient Tort To Cyberspace: Towards A New Federal Standard Of Responsibility For Defamation For Internet Service Providers, Christopher Butler

Michigan Telecommunications & Technology Law Review

Though the rapid development of the Internet has created a fertile ground for legal innovation, more often than not legislators and courts have sought to address this relatively new medium by attempting to squeeze it into precedents and paradigms better suited to older forms of communication, technology, and media. Part I of this article looks back at the courts' initial efforts at addressing defamation via the Internet. From the start the courts attempted to fit the role of the ISP into the common law's categorizing of print media as either "publishers" or "distributors" of information. One court's misstep in overextending …


"Chilling" The Internet? Lessons From Fcc Regulation Of Radio Broadcasting , Thomas W. Hazlett, David W. Sosa Jun 1998

"Chilling" The Internet? Lessons From Fcc Regulation Of Radio Broadcasting , Thomas W. Hazlett, David W. Sosa

Michigan Telecommunications & Technology Law Review

Congress included the Communications Decency Act (CDA) in the Telecommunications Act signed into law on February 8, 1996. The bill seeks to outlaw the use of computers and phone lines to transmit "indecent" material with provisions of jail terms and heavy fines for violators. Proponents of the bill argue it is necessary to protect minors from undesirable speech on the Internet. The CDA was immediately challenged in court by the American Civil Liberties Union, and the special 3-judge federal panel established to hear the case recently declared the Act unconstitutional. Yet, its ultimate adjudication remains in doubt. Ominously, the federal …


Electronic Mail And Michigan's Public Disclosure Laws: The Argument For Public Access To Governmental Electronic Mail, Daniel F. Hunter Jun 1995

Electronic Mail And Michigan's Public Disclosure Laws: The Argument For Public Access To Governmental Electronic Mail, Daniel F. Hunter

University of Michigan Journal of Law Reform

This Note explores the potential for citizens to request electronic mail (e-mail) records from government agencies using public disclosure laws, with emphasis on the Michigan Freedom of Information Act (FOIA). E-mail is a medium that has come to replace both telephone calls and paper documents for many purposes. The applicability of public disclosure laws to e-mail, however, is less than clear. Telephone conversations by public employees for most purposes are confidential, while paper records created by those same employees can be requested under the FOIA. Thus, should public e-mail remain private and confidential or should it be subject to FOIA …


White House Electronic Mail And Federal Recordkeeping Law: Press "D" To Delect History, James D. Lewis Feb 1995

White House Electronic Mail And Federal Recordkeeping Law: Press "D" To Delect History, James D. Lewis

Michigan Law Review

This Note argues that federal recordkeeping law should promote the preservation of history above all other concerns. First, courts should construe and apply the recordkeeping statutes with this goal in mind. Second, Congress should amend the recordkeeping statutes to correct enforcement deficiencies that leave irresponsible recordkeeping practices unchecked and risk the loss of a historical record of White House decisionmaking. Finally, executive officials should adopt guidelines that identify and preserve historically significant materials regardless of the medium in which they are captured.

Part I of this Note examines the statutes that currently regulate the management and public disclosure of White …