Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Brooklyn Law School

Journal

Discipline
Keyword
Publication Year
Publication

Articles 31 - 60 of 74

Full-Text Articles in Internet Law

The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff Dec 2020

The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff

Brooklyn Journal of Corporate, Financial & Commercial Law

Space, the final frontier. Resting at the rim of the Earth, an endless void full of opportunity awaits those who are willing to take a leap of faith. Historically, only national space programs have been capable of orchestrating expeditions to outer space. However, American aerospace companies now rival governmental entities in their abilities to operate beyond the Earth’s atmosphere. State-of-the-art developments in aerospace technology have positioned the American commercial space sector to become more productive than national space programs in the years to come. Unfortunately, the potential of the American commercial space sector is severely hindered under the Treaty on …


Alternative Data And Insider Trading: Are Investment Managers Assleep At The Wheel On Big Data Use?, William Montemarano Dec 2020

Alternative Data And Insider Trading: Are Investment Managers Assleep At The Wheel On Big Data Use?, William Montemarano

Brooklyn Journal of Corporate, Financial & Commercial Law

The rapid rise of “big data” has transformed the way that professional investors make investment decisions. In addition, the intersection of the United States federal securities laws and the use of “big data” to inform securities trading lies in uncharted waters. The nuanced and factually-dependent securities laws are far behind industry practices, and the Securities and Exchange Commission (SEC) and the Department of Justice (DOJ) have remained largely silent on the issue to date. This Note argues that this combination of murky laws and rapidly evolving business practices gives rise to legal and regulatory risk, and that investment managers leveraging …


“To Infinity And Beyond”: A Limitless Approach To Telemedicine Beyond State Borders, Kate Nelson Jun 2020

“To Infinity And Beyond”: A Limitless Approach To Telemedicine Beyond State Borders, Kate Nelson

Brooklyn Law Review

Although the growth and acceptance of technological advances in the medical field have been rapid, the legal system has neglected to adjust its laws accordingly. Perhaps the most significant innovation is telemedicine, which allows a patient and a doctor, miles away from each other, to form a medical relationship across state lines. Yet, the traditional state-by-state physician licensing scheme, which promotes a medical relationship within just one state, remains the governing law. Consequently, many citizens––especially those residing in rural areas––continue to suffer from lack of health care access due to physician shortages within their state borders. Accordingly, this note critically …


Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier Jun 2020

Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier

Brooklyn Law Review

In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking. …


Virtual Pretrial Jurisdiction For Virtual Contacts, Max D. Lovrin Jun 2020

Virtual Pretrial Jurisdiction For Virtual Contacts, Max D. Lovrin

Brooklyn Law Review

Personal jurisdiction is a threshold requirement for any civil court’s constitutional exercise of adjudicative authority over a defendant, and one of civil procedure’s most fundamental concepts. The Supreme Court is acutely aware of difficulties facing personal jurisdiction doctrine in an evolving world and the need for jurisprudential solutions to those problems. But recent inconsistent trends in Supreme Court personal jurisdiction jurisprudence have served to further complicate the doctrine. Such overcomplication often leads to unpredictability, which both increases expenses for litigants and creates additional work for the already overburdened federal civil docket. This problem is exacerbated when litigation arises out of …


The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski Jun 2020

The Heavy Hand Of Amazon: A Seller Not A Neutral Platform, Edward J. Janger, Aaron D. Twerski

Brooklyn Journal of Corporate, Financial & Commercial Law

Since the adoption of Section 402A of the Second Restatement of Torts, every party in a product’s distribution chain has been potentially liable for injuries caused by product defects. Consumers who buy from reputable sellers are almost always guaranteed to have a solvent defendant if injured by a product defect. Amazon, though responsible for a vast number of retail sales, has sought to avoid liability by claiming that it is not a seller but a neutral platform that merely facilitates third-party sales to consumers. With two significant exceptions, most courts have sided with Amazon and concluded that Amazon is not …


“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy Jun 2020

“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy

Brooklyn Journal of Corporate, Financial & Commercial Law

The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …


South Dakota V. Wayfair: An Ill-Conceived Blow To The Free Flow Of Interstate Commerce, Revel Shinn Atkinson Jun 2020

South Dakota V. Wayfair: An Ill-Conceived Blow To The Free Flow Of Interstate Commerce, Revel Shinn Atkinson

Brooklyn Journal of Corporate, Financial & Commercial Law

For more than a century, brick-and-mortar retailers have been losing local customers—first with the rise of mail-order houses and then more acutely with the rapid growth of online retail. As a result, states have noticed a significant loss in sales tax revenue. While an equivalent amount of tax is typically still owed to the state in the form of a use tax, which is to be remitted to the state by the customer, because these taxes are not automatically collected at the time of the sale, customers have overwhelmingly elected not to pay them. In an effort to recover this …


Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng Jun 2020

Unmasking The Villain: Exposing Scammers’ Identities To Defeat Harmful Calls, Katherine Teng

Brooklyn Journal of Corporate, Financial & Commercial Law

Since 1991, Congress has attempted to limit unwanted phone calls through legislative efforts. However, past and current laws remain ineffective as scam call complaints continue to increase while the harm of these calls remains severe. Currently, the laws affecting telecommunication regulation focus on reactive measures rather than preventative solutions. Most recently, Congress has passed the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act, which will require telecommunication companies to implement SHAKEN/STIR technology to end scam calls before they reach consumers. While this is the most progressive legislation addressing scam calls, this Note will suggest that phone numbers be registered to …


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova Jun 2020

A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova

Brooklyn Journal of International Law

Cyber warfare today finds itself on the front page of the news daily. It is increasingly apparent that the cyber domain demands more guidance, with leaders opting for the deployment of cyber capabilities to bypass kinetic warfare norms. Proposed solutions abound, but none adequately address the specific features of cyber warfare that set it apart from traditional kinetic warfare. This Article argues that a new legal framework is necessary to properly address this problem, and such a doctrine should incorporate principles of chaos theory. Chaos theory is a branch of mathematics dealing with complex systems, with the most well-known example …


Who Sells? Testing Amazon.Com For Product Defect Liability In Pennsylvania And Beyond, Aaron Doyer May 2020

Who Sells? Testing Amazon.Com For Product Defect Liability In Pennsylvania And Beyond, Aaron Doyer

Journal of Law and Policy

Pennsylvania, like other states, has struggled over the past few decades to apply the policy principles of product defect law—a tort characterized by strict liability. Because strict liability bypasses the traditional requirement in tort that a plaintiff prove the defendant’s negligence, and instead requires only a showing that the plaintiff was injured by a product sold in a defective condition, these inquiries raise a deceptively simple question: who sells? Recently, in a landmark case in Pennsylvania, the Third Circuit made waves by declaring Amazon.com, an enormous online marketplace, the legal “seller” of a product shipped and sold by a vendor …


The Common Law Of Cyber Trespass, Michael J. O'Connor Apr 2020

The Common Law Of Cyber Trespass, Michael J. O'Connor

Brooklyn Law Review

Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …


Artificial Intelligence & Artificial Prices: Safeguarding Securities Markets From Manipulation By Non-Human Actors, Daniel W. Slemmer Dec 2019

Artificial Intelligence & Artificial Prices: Safeguarding Securities Markets From Manipulation By Non-Human Actors, Daniel W. Slemmer

Brooklyn Journal of Corporate, Financial & Commercial Law

Securities traders are currently competing to use Artificial Intelligence (A.I.) in order to make more profitable decisions in the marketplace. While A.I. provides superior abilities in recognizing market patterns, its complexity can obscure its decision-making process beyond human comprehension. Problematically, the current securities laws prohibiting manipulation of securities prices rest liability for violations on a trader’s intent. In order to prepare for A.I. market participants, both courts and regulators need to accept that human concepts of decision-making will be inadequate in regulating A.I. behavior. However, the wealth of case law in the market manipulation doctrine need not be cast aside. …


“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox Dec 2019

“Hey Alexa, Do Consumers Really Want More Data Privacy?”: An Analysis Of The Negative Effects Of The General Data Protection Regulation, Katherine M. Wilcox

Brooklyn Law Review

Recent news articles discuss the flooding of email inboxes with lengthy terms and condition updates, viral videos of Mark Zuckerberg’s public Cambridge Analytica hearing before Congress, and the phenomenon of internet advertisements appearing for items that consumers merely searched for on Google a day prior. Effective as of May 25, 2018, the European Union’s General Data Protection Regulation (GDPR) established a framework that sets legal standards targeted at businesses and other data collectors to dramatically increase data privacy protections for citizens of the EU. Consumers, however, do not seem to appreciate these increased protections, as they rarely read the updated …


Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman Dec 2019

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman

Journal of Law and Policy

As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson Jul 2019

Comparative Analysis Of The Eu’S Gdpr And Brazil’S Lgpd: Enforcement Challenges With The Lgpd, Abigayle Erickson

Brooklyn Journal of International Law

In the wake of the adoption of the European Union’s General Data Protection Regulation (GDPR) in May 2018, other countries and jurisdictions have contemplated personal data privacy legislation. In August 2018, the former president of Brazil, Michel Temer, signed the country’s comprehensive data privacy regulation, Lei Geral de Proteção de Dados Pessoais (LGPD), into law. Temer, however, vetoed many of the enforcement provisions. Shortly before leaving office, Temer signed an executive order creating a regulatory agency as the bill initially called for, but situated the agency under executive control instead of creating a wholly independent agency. This Note provides a …


The King Of The Casl: Canada’S Anti-Spam Law Invades The United States, Arthur Shaykevich Jun 2019

The King Of The Casl: Canada’S Anti-Spam Law Invades The United States, Arthur Shaykevich

Brooklyn Law Review

U.S. businesses periodically adjust their marketing practices to foreign law innovations. Several years ago, U.S. businesses emailing into Canada had to incorporate Canada’s Anti-Spam Law, otherwise known as CASL. Businesses that believed they email only U.S.-based customers likely dismissed CASL as not applicable. Others may never have heard of the law altogether. As this note discusses, CASL created a compliance conundrum for U.S. businesses. Since CASL methodically differs from the U.S. anti-spam law, CAN-SPAM, it may be in a business’s best interest to apply this law to its Canadian subset and not to the entire email population. Neither the law …


Chilling Social Media: Warrantless Border Searches Of Social Media Accounts Infringe Upon The Freedom Of Association And The Freedom To Be Anonymous Under The First Amendment, Atanu Das Jun 2019

Chilling Social Media: Warrantless Border Searches Of Social Media Accounts Infringe Upon The Freedom Of Association And The Freedom To Be Anonymous Under The First Amendment, Atanu Das

Brooklyn Law Review

The Department of Homeland Security has instituted rules to allow Customs and Border Patrol officials to conduct a warrantless search the mobile device data, including social media accounts, of U.S. citizens entering the United States under the border search exception doctrine of the Fourth Amendment. However, U.S. Supreme Court jurisprudence has found that there are limits to government interference in the freedom of association and freedom to be anonymous. This essay analyzes such jurisprudence as it applies to the warrantless border search of social media accounts accessible from a mobile device and concludes that this warrantless search infringes the freedom …


Playing Fair: Youtube, Nintendo, And The Lost Balance Of Online Fair Use, Natalie Marfo May 2019

Playing Fair: Youtube, Nintendo, And The Lost Balance Of Online Fair Use, Natalie Marfo

Brooklyn Journal of Corporate, Financial & Commercial Law

Over the past decade, YouTube saw an upsurge in the popularity of “Let’s Play” videos. While positive for YouTube, this uptick was not without controversy. Let’s Play videos use unlicensed copyrighted materials, frustrating copyright holders. YouTube attempted to curb such usages by demonetizing and removing thousands of Let’s Play videos. Let’s Play creators struck back, arguing that the fair use doctrine protects their works. An increasing number of powerful companies, like Nintendo, began exploiting the ambiguity of the fair use doctrine against the genre; forcing potentially legal works to request permission and payment for Let’s Play videos, without a determination …


On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams May 2019

On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams

Brooklyn Journal of Corporate, Financial & Commercial Law

On May 14, 2018, Justice Alito delivered the majority opinion for the United States Supreme Court in Murphy v. National Collegiate Athletic Association (NCAA). The Professional and Amateur Protection Act (PASPA), a twenty-six-year-old federal statute, was deemed unconstitutional; thus, this decision allows state legislatures to legalize sports betting within their borders. With many states independently legalizing sports gambling, the regulatory landscape throughout the country is becoming a patchwork of state statutes. Additionally, top tier sporting organizations heavily depend on data analytics to formulate game plan strategy, train efficiently, rehab player injuries, gauge team and player performance, etc. The popularity of …


Better Left Forgotten: An Argument Against Treating Some Social Media And Digital Assets As Inheritance In An Era Of Platform Power, Shelly Kreiczer-Levy, Ronit Donyets-Kedar May 2019

Better Left Forgotten: An Argument Against Treating Some Social Media And Digital Assets As Inheritance In An Era Of Platform Power, Shelly Kreiczer-Levy, Ronit Donyets-Kedar

Brooklyn Law Review

Restraining technological platforms’ power has become one of the main concerns of our era. The control over cyberspace and data ownership are among the key issues addressed in the literature. Yet, the ongoing vigorous debate surrounding the inheritance of digital assets remains surprisingly oblivious of the platform’s involvement in shaping memory and continuity. Current legal scholarship and legislation ask whether social network profiles are inheritable property; they balance the user’s privacy and wishes against family members’ interests, without addressing or even considering the corporate power at play. This article argues that we are constantly asking the wrong questions. Instead of …


The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny Oct 2018

The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny

Brooklyn Journal of Corporate, Financial & Commercial Law

What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …


A Fixed Game: The Frustrations Of Ticket Scalping And The Realities Of Its Solutions, Dylan C. Porcello Oct 2018

A Fixed Game: The Frustrations Of Ticket Scalping And The Realities Of Its Solutions, Dylan C. Porcello

Brooklyn Law Review

Due to the rapid growth of the secondary resale market, purchasing tickets at their face-value price is becoming a fleeting expectation. While ticket scalping has existed quite possibly as long as tickets themselves have, innovations in invasive purchasing practices are leading to unprecedented profit margins for ticket scalpers and a greater distance between consumers and the original ticket sale. With ticket scalpers employing advanced ticket purchasing software, referred to as bots, consumers are left with no option but to surrender to steep resale prices, which often have no ceiling. Though ticket scalping regulation has developed, these legislative efforts have been …


Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman Jun 2018

Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman

Brooklyn Journal of Corporate, Financial & Commercial Law

The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …


Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle Jun 2018

Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle

Brooklyn Law Review

Search engines have profoundly changed the relationship between privacy and free speech by making personal information widely and cheaply available to a global audience. This has raised many concerns both over how online companies handle the information they collect and how regular citizens use online services to invade other people’s privacy. One way Europe has addressed this change is by providing European Union citizens with a right to petition search engines to deindex links from search results—a so-called “right to be forgotten.” If the information contained in a search result is “inadequate, irrelevant or no longer relevant,” the search engine …


Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich Jan 2018

Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich

Brooklyn Law Review

In recent years, “home grown” terrorists—individuals inspired to violence after watching terrorist videos online—have been responsible for devastating attacks in the United States and across Europe. Such terrorist propaganda falls outside the realm of the First Amendment’s protection because it has been proven to indoctrinate attackers, thus inciting imminent lawless action. Seizing on this, victims’ families have brought suits alleging that social media platforms, including Twitter, Facebook, and Google, provided material support to terrorists in violation of the Anti-Terrorism Act (ATA). The Communications Decency Act (CDA), however, has served as an impenetrable shield against these claims, protecting social media companies …


Slipping Through The Cracks: How Digital Music Streaming Cuts Corners On Artists’ Royalty Revenues Globally, Frances Lewis Dec 2017

Slipping Through The Cracks: How Digital Music Streaming Cuts Corners On Artists’ Royalty Revenues Globally, Frances Lewis

Brooklyn Journal of International Law

At a time when the digital distribution of music is dominating the music industry, there are more music consumers than ever. This makes it vitally important for performing artists to receive the credit they are due. An inherent problem in music’s digital distribution market is that music streaming companies often fail to acquire proper licenses to expand their music libraries faster than their competitors. Performing artists who may not have the same income stream as their A-list counterparts often cannot bear the cost of litigation to pursue uncredited royalties. The U.S. class action model provides performing artists with a legal …


Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge Dec 2017

Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge

Brooklyn Journal of Corporate, Financial & Commercial Law

The Video Privacy Protection Act of 1988 (VPPA) creates a private cause of action for any consumer whose personally identifiable information has been disclosed by a video tape service provider to a third party. The rapid growth of media companies that provide free internet-based video-streaming services, and the technologically-advanced advertising methods employed to fund this business model, have created uncertainty regarding the specific consumer segments the VPPA is designed to protect. The extensive role that third-party providers play in the collection, analysis, and segmentation of user data in the personalized advertising process raises justifiable privacy concerns for consumers. Recent VPPA …