Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Internet Law

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo Nov 2017

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

All Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon Apr 2017

Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon

Penn State Journal of Law & International Affairs

No abstract provided.


The Unresolved Legality Of Online Gambling In Singapore, Siyuan Chen Apr 2017

The Unresolved Legality Of Online Gambling In Singapore, Siyuan Chen

Siyuan CHEN

This article addresses what appears to be a hitherto (legislatively and judicially) unresolved issue in a country where gambling is an established sub-culture – the legality of online gambling. The existing legislation does not provide direct answers, and as a result, the courts have not been given the opportunity to answer the question directly either. The police have previously made a few statements to the press and the media, but what should we make of them? While placing bets with unauthorised bookies (including those who operate their own website or use others’ websites) is clearly outlawed, leaving the offender with …


Professor Breaks Ground With Journal On Sexual Violence And Exploitation, Joseph Essig, Donna M. Hughes Dr. Apr 2017

Professor Breaks Ground With Journal On Sexual Violence And Exploitation, Joseph Essig, Donna M. Hughes Dr.

Donna M. Hughes

In December 2016, Professor of Gender and Women’s Studies Donna M. Hughes published the inaugural issue of the journal Dignity: A Journal on Sexual Exploitation and Violence as editor-in-chief. Just a few months ago, in January, Dignity released its second issue. Professor Hughes has been working on issues related to sexual violence and exploitation, such as human trafficking since the 1980s. She saw an opening in the field for a journal about the particular work that she has been doing for so long. “There is no other scholarly journal that addresses sexual exploitation and violence and has an editorial position …


Defining Biometrics: Toward A Transnational Ethic Of Personal Information, Nicola Morrow Apr 2017

Defining Biometrics: Toward A Transnational Ethic Of Personal Information, Nicola Morrow

International Studies Honors Projects

Innovations in biotechnology, computer science, and engineering throughout the late 20th and early 21st centuries dramatically expanded possible modes of data-based surveillance and personal identification. More specifically, new technologies facilitated enormous growth in the biometrics sector. The response to the explosion of biometric technologies was two-fold. While intelligence agencies, militaries, and multinational corporations embraced new opportunities to fortify and expand security measures, many individuals objected to what they perceived as serious threats to privacy and bodily autonomy. These reactions spurred both further technological innovation, and a simultaneous proliferation of hastily drafted policies, laws, and regulations governing the collection, …


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael Mar 2017

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs Jan 2017

How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs

Catholic University Journal of Law and Technology

This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland Jan 2017

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag Jan 2017

Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag

Faculty Articles

This Article explores the potential displacement of substantive copyright law in the increasingly important online environment. In 1998, Congress enacted a system of intermediary safe harbors as part of the Digital Millennium Copyright Act (DMCA). The internet safe harbors and the associated system of notice-and-takedown fundamentally changed the incentives of platforms, users, and rightsholders in relation to claims of copyright infringement. These different incentives interact to yield a functional balance of copyright online that diverges markedly from the experience of copyright law in traditional media environments. More recently, private agreements between rightsholders and large commercial internet platforms have been made …


Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison Jan 2017

Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison

Articles

My goal is to explore the meanings and functions of the objects of intellectual property: the work of authorship (or copyright work) in copyright, the invention in patent, and the mark and the sign in trademark. This paper takes up the example of the copyright work.

It is usually argued that the central challenge in understanding the work is to develop a sensible method for appreciating its boundaries. Those boundaries, conventionally understood as the metaphorical "metes and bounds" of the work, might be established by deferring to the intention of the author, or by searching for authorship (creativity or originality) …


Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison Jan 2017

Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison

Book Chapters

Governing Medical Knowledge Commons makes three claims: first, evidence matters to innovation policymaking; second, evidence shows that self-governing knowledge commons support effective innovation without prioritizing traditional intellectual property rights; and third, knowledge commons can succeed in the critical fields of medicine and health. The editors' knowledge commons framework adapts Elinor Ostrom's groundbreaking research on natural resource commons to the distinctive attributes of knowledge and information, providing a systematic means for accumulating evidence about how knowledge commons succeed. The editors' previous volume, Governing Knowledge Commons, demonstrated the framework's power through case studies in a diverse range of areas. Governing Medical Knowledge …


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …