Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Internet Law

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill Aug 2019

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill

Indiana Journal of Global Legal Studies

A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


A Picture's Worth: The Future Of Copyright Protection Of User-Generated Images On Social Media, Elizabeth Tao Aug 2017

A Picture's Worth: The Future Of Copyright Protection Of User-Generated Images On Social Media, Elizabeth Tao

Indiana Journal of Global Legal Studies

In the current digital age, the internet is teeming with personal websites and social media posts. As more people around the world are becoming and staying connected to the internet, more stories and photos are sharing over social networking sites each second. Social media presents a ubiquitous platform to share one's life with others, but this accessibility comes at a price. This Note examines the history and present state of copyright law, within the framework of photography, to highlight the gaps within these laws as applied to personal works of art, like personal photographs, posted to social media sites. Social …


A Study On The Safe Harbor Rules For Online File Hosting Service Providers Under Copyright Law In China, Shi Xu Mar 2014

A Study On The Safe Harbor Rules For Online File Hosting Service Providers Under Copyright Law In China, Shi Xu

Maurer Theses and Dissertations

Today both the U.S. and China are plagued with copyright infringement, particularly infringement involving online file sharing via file hosting services. The safe harbor rules in the U.S. Digital Millennium Copyright Act (here after “DMCA”) §512(c) provide a certain amount of protection for contributory infringers, such as file hosting service providers, as long as certain conditions are met. Although China has borrowed extensively from DMCA §512(c) in setting up its own safe harbor rules, their content and standard of review remain unclear, leading to inconsistencies in judgments. In this circumstance, this thesis tries to analysis each element of the safe …


The Expansion Of Trademark Rights In Europe, Irina Pak Apr 2013

The Expansion Of Trademark Rights In Europe, Irina Pak

IP Theory

No abstract provided.


Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying Oct 2012

Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying

IP Theory

No abstract provided.


It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml May 2011

It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml

Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …


Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs Jan 2010

Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs

Federal Communications Law Journal

Network neutrality has become a contentious issue both in Europe and the United States. Regulators on both sides of the Atlantic face digital divides in their society, and are confronted with potentially conflicting policy goals-to incentivize private investment in next-generation broadband while maintaining "neutral" and competitive broadband networks.

This Article compares nascent American and European network neutrality policy in terms of regulatory error costs. Emerging markets, such as broadband, are more likely to be affected by regulatory errors, and these errors have graver consequences in emerging markets than in regular markets. U.S. telecommunications policy traditionally has advanced a trial-and-error approach …


To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan Mar 1999

To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan

Federal Communications Law Journal

Internet access has become almost commonplace, as has the unfettered exchange of ideas through cyberspace. Several nations, Singapore among them, have attempted to control their citizens’ Internet access in order to preserve and protect a desired national culture. A brief overview of the technological means of Internet censorship reveals a hidden truth: If Singapore truly wishes to become the technological giant of the East, the government will have to sacrifice its desire to control Internet content.


Freedom Of Information And The Eu Data Protection Directive, James R. Maxeiner Dec 1995

Freedom Of Information And The Eu Data Protection Directive, James R. Maxeiner

Federal Communications Law Journal

Because of advancements in information technology, the tension between protection of privacy and freedom of information has intensified. In the United States this tension is addressed with sector specific laws, like the Fair Credit Reporting Act. Conversely, in Europe, data protection laws of general applicability have existed for two decades. Recently, the Council of Ministers adopted a Common Position in a data protection directive.
The Author analyzes specific provisions of the Directive, primarily focusing on the provisions that address the tension between the right of privacy and the free flow of information within the European Union. Ultimately, the Directive strikes …