Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Brooklyn Law School

Journal

Keyword
Publication Year
Publication

Articles 1 - 19 of 19

Full-Text Articles in Internet Law

Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs Dec 2023

Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs

Brooklyn Journal of International Law

The immutability of non-fungible tokens has made it an invaluable tool for asset ownership and authentication across a variety of industries. With the proliferation of NFTs comes the need to protect trademarks and prevent consumer confusion in the digital age. This Note explores the existing legal framework for trademark law in the United States and European Union. This Note argues for a new trademark standard that reflects the interconnected nature of a global digital society.


Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli Aug 2023

Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli

Brooklyn Journal of International Law

States have resorted to meddling in the elections of their counterparts throughout history. Recently, though, there has been an exponential increased in the use of the possibilities provided by technology. Attention to this phenomenon has deservedly grown quickly and exponentially. This has led to debates focusing on the adequacy of international legal rules and general principles to respond to foreign cyber election interference. In many of these debates some have expressed doubts and skepticism about the adequacy of current international law to confront foreign election interference through cyber means. There have also been disagreements about the applicable standards to fight …


Breaking Down Digital Walls: The Interface Of International Trade Law And Online Content Regulation Through The Lens Of The Chinese Vpn Measure, Neha Mishra Dec 2022

Breaking Down Digital Walls: The Interface Of International Trade Law And Online Content Regulation Through The Lens Of The Chinese Vpn Measure, Neha Mishra

Brooklyn Journal of International Law

The interface of international trade law and online content regulation is problematic and complex. This Article examines the consistency of the regulation pertaining to Virtual Private Network (VPN) services in China with WTO law. It argues that although WTO law may be effective in disciplining protectionist aspects of online content regulations, they can neither scrutinize domestic values underlying such regulations nor guarantee the free flow of online content. Thus, existing rules contained in international trade agreements play a limited role in balancing domestic socio-cultural and political values vis-à-vis online censorship with an open, globally interconnected internet enabling seamless digital flows. …


Hacking Copyright: Holding Cops Accountable For Abusing Youtube’S Copyright Filter System, Tyler Bloom Dec 2022

Hacking Copyright: Holding Cops Accountable For Abusing Youtube’S Copyright Filter System, Tyler Bloom

Journal of Law and Policy

This Note both explores the mechanisms and incentive structures that make “copyright hacking” possible and explains the legal system’s failure to provide recourse for victims of successful “copyright hacks” by police officers. Because the DMCA has failed to keep pace with the internet’s exponential growth, OSPs, such as YouTube, have developed filtering systems that can be exploited to “copyright hack” users and ultimately suppress their speech. A victim of “copyright hacking” by a police officer currently has no recourse; the doctrine of qualified immunity functionally precludes them from suing for violating their First Amendment rights. This Note proposes two possible …


The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner Sep 2021

The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner

Brooklyn Law Review

The Americans with Disabilities Act (ADA) was enacted in 1990 to afford equal opportunities for individuals with disabilities. Title III of the ADA, specifically, was enacted to afford disabled individuals equal access to places of public accommodation. When the ADA was enacted, the internet was still in its infancy and Congress did not contemplate the need for governing accessibility to websites of public accommodations. Today, the internet has become embedded in virtually every aspect of our lives, yet there are still millions of disabled individuals who are unable to equally access the websites of American businesses. With the ADA being …


The Commodification Of Personal Data And The Road To Consumer Autonomy Through The Ccpa, Blaire Rose May 2021

The Commodification Of Personal Data And The Road To Consumer Autonomy Through The Ccpa, Blaire Rose

Brooklyn Journal of Corporate, Financial & Commercial Law

The internet has transformed into a museum of personal information collected through the digital footprint we leave behind after each act performed on the web. Businesses have monetized this collection of personal data in various ways. For instance, many companies analyze this information through predicting analytics and data profiling to identify consumer interests that they can exploit as a means to generate revenue. Though user data promotes many benefits for businesses and consumers alike, the recent data breaches of massive companies, coupled with hazy privacy disclosures that beget consent disputes, have left both users and businesses perturbed and exposed to …


Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast Dec 2020

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast

Brooklyn Journal of International Law

Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …


The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski Jun 2020

The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski

Brooklyn Journal of Corporate, Financial & Commercial Law

Since the adoption of Section 402A of the Second Restatement of Torts, every party in a product’s distribution chain has been potentially liable for injuries caused by product defects. Consumers who buy from reputable sellers are almost always guaranteed to have a solvent defendant if injured by a product defect. Amazon, though responsible for a vast number of retail sales, has sought to avoid liability by claiming that it is not a seller but a neutral platform that merely facilitates third-party sales to consumers. With two significant exceptions, most courts have sided with Amazon and concluded that Amazon is not …


“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy Jun 2020

“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy

Brooklyn Journal of Corporate, Financial & Commercial Law

The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …


Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng Jun 2020

Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng

Brooklyn Journal of Corporate, Financial & Commercial Law

Since 1991, Congress has attempted to limit unwanted phone calls through legislative efforts. However, past and current laws remain ineffective as scam call complaints continue to increase while the harm of these calls remains severe. Currently, the laws affecting telecommunication regulation focus on reactive measures rather than preventative solutions. Most recently, Congress has passed the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, which will require telecommunication companies to implement SHAKEN/STIR technology to end scam calls before they reach consumers. While this is the most progressive legislation addressing scam calls, this Note will suggest that phone numbers be registered to …


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


Artificial Intelligence & Artificial Prices: Safeguarding Securities Markets From Manipulation By Non-Human Actors, Daniel W. Slemmer Dec 2019

Artificial Intelligence & Artificial Prices: Safeguarding Securities Markets From Manipulation By Non-Human Actors, Daniel W. Slemmer

Brooklyn Journal of Corporate, Financial & Commercial Law

Securities traders are currently competing to use Artificial Intelligence (A.I.) in order to make more profitable decisions in the marketplace. While A.I. provides superior abilities in recognizing market patterns, its complexity can obscure its decision-making process beyond human comprehension. Problematically, the current securities laws prohibiting manipulation of securities prices rest liability for violations on a trader’s intent. In order to prepare for A.I. market participants, both courts and regulators need to accept that human concepts of decision-making will be inadequate in regulating A.I. behavior. However, the wealth of case law in the market manipulation doctrine need not be cast aside. …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson Jul 2019

Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson

Brooklyn Journal of International Law

In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li Jan 2016

The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li

Journal of Law and Policy

Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein Jan 2016

Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein

Journal of Law and Policy

Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …