Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

External Link

Discipline
Keyword
Publication Year
Publication

Articles 31 - 53 of 53

Full-Text Articles in Internet Law

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Citron, Leslie Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Citron, Leslie Henry

Leslie Meltzer Henry

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment. In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Oklahoma’S New E-Discovery Rules, Steven Gensler Dec 2009

Oklahoma’S New E-Discovery Rules, Steven Gensler

Steven S. Gensler

No abstract provided.


Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill Nov 2009

Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill

Michael Katz

The Federal Communications Commission, taking note of AT&T's complaint, has written to Google with questions about its call blocking. But the implications for our privacy of software-managed call services like Google Voice are a much greater threat to consumers, and that's where the FCC should direct its energy - immediately.


Civil Rights In The Cyber World, Danielle Citron Oct 2009

Civil Rights In The Cyber World, Danielle Citron

Danielle Keats Citron

No abstract provided.


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron Oct 2009

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron

Danielle Keats Citron

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron May 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron

Danielle Keats Citron

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …


Technological Due Process, Danielle Citron Apr 2009

Technological Due Process, Danielle Citron

Danielle Keats Citron

Today, computer systems terminate Medicaid benefits, remove voters from the rolls, exclude travelers from flying on commercial airlines, label (and often mislabel) individuals as dead-beat parents, and flag people as possible terrorists from their email and telephone records. But when an automated system rules against an individual, that person often has no way of knowing if a defective algorithm, erroneous facts, or some combination of the two produced the decision. Research showing strong psychological tendencies to defer to automated systems suggests that a hearing officer’s check on computer decisions will have limited value. At the same time, automation impairs participatory …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds Apr 2009

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds

William L. Reynolds

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Public Use, Public Choice And The Urban Growth Machine: Competing Political Economies Of Takings Law, Daniel Lyons Dec 2008

Public Use, Public Choice And The Urban Growth Machine: Competing Political Economies Of Takings Law, Daniel Lyons

Daniel Lyons

The Kelo decision has unleashed a tidal wave of legislative reforms ostensibly seeking to control eminent domain abuse. But as a policy matter, it is impossible to determine what limits should be placed upon local government without understanding how cities grow and develop, and how local governments make decisions to shape the communities over which they preside. This article examines takings through two very different models of urban political economy: public choice theory and the quasi-Marxist Urban Growth Machine model. These models approach takings from diametrically opposite perspectives, and offer differing perspectives at the margin regarding proper and improper condemnations. …


Domain Names As Jurisdiction-Creating Property In Sweden, Ulf Maunsbach, Michael Bogdan Dec 2008

Domain Names As Jurisdiction-Creating Property In Sweden, Ulf Maunsbach, Michael Bogdan

Ulf Maunsbach

No abstract provided.


A Comment On James Grimmelmann’S Saving Facebook, Susan Freiwald Dec 2008

A Comment On James Grimmelmann’S Saving Facebook, Susan Freiwald

Susan Freiwald

This paper comments on Professor James Grimmelmann’s article Saving Facebook (94 Iowa L. Rev. 1137 (2009) http://http://works.bepress.com/james_grimmelmann/20). provides a useful analysis of the privacy debates surrounding this social networking web site. Grimmelmann provides valuable sociological and psychological material for future legislators to draw on in considering legislative control of Facebook and similar sites. Grimmelmann uses Facebook to provide concrete examples of privacy concerns to build on the more general framework provided by the works of Daniel Solove. The comment does take exception to Grimmelmann’s analysis in several points. Chief among these is Grinnlemann’s lack of evidence in support of his …


Access Denied: The Practice And Policy Of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain Dec 2007

Access Denied: The Practice And Policy Of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain

Jonathan Zittrain

Many countries around the world block or filter Internet content, denying access to information—often about politics, but also relating to sexuality, culture, or religion—that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorously conducted study of this accelerating trend. Internet filtering takes place in at least forty states worldwide including many countries in Asia and the Middle East and North Africa. Related Internet content control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe. Drawing on a …


The Future Of The Internet -- And How To Stop It, Jonathan Zittrain Dec 2007

The Future Of The Internet -- And How To Stop It, Jonathan Zittrain

Jonathan Zittrain

No abstract provided.


Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia Dec 2007

Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Electronic Surveillance At The Virtual Border, Susan Freiwald Dec 2007

Electronic Surveillance At The Virtual Border, Susan Freiwald

Susan Freiwald

A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Dec 2006

The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


A First Principles Approach To Communications' Privacy, Susan Freiwald Dec 2006

A First Principles Approach To Communications' Privacy, Susan Freiwald

Susan Freiwald

Under current doctrines, parties to a communication enjoy robust constitutional protection against government surveillance only when they have a reasonable expectation of privacy in those communications. This paper suggests that the surprising dearth of case law applying the reasonable expectations of privacy test to modern electronic communications reflects courts' discomfort with the test's necessarily normative analysis. That discomfort also likely explains courts' use of shortcuts based on Miller v. United States and Smith v. Maryland in those few cases that have considered online surveillance practices. In particular, the government has argued that a broad third party rule deprives electronic mail …


The Generative Internet, Jonathan Zittrain Dec 2005

The Generative Internet, Jonathan Zittrain

Jonathan Zittrain

The generative capacity for unrelated and unaccredited audiences to build and distribute code and content through the Internet to its tens of millions of attached personal computers has ignited growth and innovation in information technology and has facilitated new creative endeavors. It has also given rise to regulatory and entrepreneurial backlashes. A further backlash among consumers is developing in response to security threats that exploit the openness of the Internet and of PCs to third-party contribution. A shift in consumer priorities from generativity to stability will compel undesirable responses from regulators and markets and, if unaddressed, could prove decisive in …


Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain Dec 2005

Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain

Jonathan Zittrain

We assess the impact of spam that touts stocks upon the trading activity of those stocks and sketch how profitable such spamming might be for spammers and how harmful it is to those who heed advice in stock-touting e-mails. We find convincing evidence that stock prices are being manipulated through spam. We suggest that the effectiveness of spammed stock touting calls into question prevailing models of securities regulation that rely principally on the proper labeling of information and disclosure of conflicts of interest as means of protecting consumers, and we propose several regulatory and industry interventions. Based on a large …


Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald Dec 2003

Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald

Susan Freiwald

This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …


Western Frontier Or Feudal Society? Metaphors And Perceptions Of Cyberspace, Alfred C. Yen Nov 2002

Western Frontier Or Feudal Society? Metaphors And Perceptions Of Cyberspace, Alfred C. Yen

Alfred C. Yen

The Article examines how metaphors influence perceptions of cyberspace. Among other things, the Article studies the comparison of cyberspace to the American western frontier and the metaphor's construction cyberspace as a "place" whose natural characteristics guarantee freedom and opportunity. This supports an often-made claim that cyberspace is different from real space, and that government should generally refrain from regulating the Internet.

The Article surveys the basis of the western frontier metaphor in academic history and popular culture and concludes that the metaphor misleads people to overestimate cyberspace's "natural" ability to guarantee freedom and opportunity. The Article accomplishes this in part …


Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald Dec 2000

Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald

Susan Freiwald

Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.

Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …


Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald Dec 1995

Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald

Susan Freiwald

This article argues that the coming tide of electronic Federal law protects the privacy of transmitted communications under a two-tiered system. The actual contents of communications occupy the first tier, where they enjoy fairly effective protection against disclosure. Communication attributes encompass all of the other information that can be learned about a communication, such as when and where it occurred, to whom and from whom it was sent and how long it lasted. They occupy a lowly second tier, where the protections against disclosure are weak, ambiguous and in some cases non-existent. This bifurcated system becomes increasingly untenable as advances …