Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Georgia School of Law

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 40

Full-Text Articles in Internet Law

Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp Mar 2023

Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp

Georgia Law Review

When the European Union’s (EU) General Data Protection Regulation (GDPR) passed in 2016, it represented the world’s first major comprehensive data privacy law and kicked off a conversation about how we think about the right to privacy in the modern age. The law granted a broad range of rights to EU citizens, including a right to have companies delete data they collect about you, a right not to have your personal information sold, and a range of other rights all geared towards individual autonomy over personal data. All the while, platform companies like Facebook (Meta), Apple, and Amazon have taken …


All Bets Are On! . . . Line: The Varied Regulatory Framework Of An Interconnected Online Sports Betting System, Meg Graham Jun 2022

All Bets Are On! . . . Line: The Varied Regulatory Framework Of An Interconnected Online Sports Betting System, Meg Graham

Georgia Journal of International & Comparative Law

No abstract provided.


The United States And Its Obligations Under The Optional Protocol To The Convention On The Rights Of The Child On The Sale Of Children, Child Prostitution And Child Pornography To Combat Child Exploitation In The Digital World, Audrey Cunningham Jun 2022

The United States And Its Obligations Under The Optional Protocol To The Convention On The Rights Of The Child On The Sale Of Children, Child Prostitution And Child Pornography To Combat Child Exploitation In The Digital World, Audrey Cunningham

Georgia Journal of International & Comparative Law

No abstract provided.


The (Second) Race To Space: A Human Rights Analysis Of Rapid Space Innovation, Alyssa Nelson Jan 2022

The (Second) Race To Space: A Human Rights Analysis Of Rapid Space Innovation, Alyssa Nelson

Georgia Journal of International & Comparative Law

No abstract provided.


Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple Jan 2022

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple

Georgia Journal of International & Comparative Law

No abstract provided.


Big Tech In A Small Pond: How The Internet Economy Became So Concentrated And What Sector-Specific Regulation Can Do To Reel It In, Andy Wilson Oct 2021

Big Tech In A Small Pond: How The Internet Economy Became So Concentrated And What Sector-Specific Regulation Can Do To Reel It In, Andy Wilson

Journal of Intellectual Property Law

While the early days of the internet were marked by a proliferation of new internet platforms offering different services, over time much of the sector became dominated by the handful of internet giants we know today. Discomfort with the outsized role that these enormous companies play in the daily lives of billions has driven a growing consensus that they need to be reined in, culminating in federal and state agencies launching a slew of antitrust suits against Google and Facebook in late 2020. These renewed antitrust efforts will likely be insufficient to address competitive harms in the internet economy, given …


Corporate Violations Of Human Rights: Addressing The Coordinated Surveillance And Persecution Of The Uyghur People By The Chinese State And Chinese Corporations, Ross Smith Sep 2021

Corporate Violations Of Human Rights: Addressing The Coordinated Surveillance And Persecution Of The Uyghur People By The Chinese State And Chinese Corporations, Ross Smith

Georgia Journal of International & Comparative Law

No abstract provided.


Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity Jul 2021

Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity

Journal of Intellectual Property Law

Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …


Boss Battle: Twitch Vs Proposed Amendments To The Knowledge Standard Under The Digital Millennium Copyright Act, Zachary Messick Jul 2021

Boss Battle: Twitch Vs Proposed Amendments To The Knowledge Standard Under The Digital Millennium Copyright Act, Zachary Messick

Journal of Intellectual Property Law

Under the Digital Millennium Copyright Act (DMCA), indirect theories of liability such as vicarious liability and contributory infringement have been inconsistently applied, leading the Copyright Office to recommend lowering the knowledge standard and increasing potential liability for Online Service Providers (OSPs). In this note, I will discuss the histories of vicarious liability and contributory infringement, which demonstrate that courts have correctly applied the standards under the DMCA. Further, through a case-study of Twitch, an up-and-coming streaming website, I will discuss how the proposed amendments drive against the policies underlying the indirect theories of liability and would destroy OSPs like Twitch. …


A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini Jul 2021

A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini

Journal of Intellectual Property Law

Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …


Blockchain Neutrality, Samuel N. Weinstein Jan 2021

Blockchain Neutrality, Samuel N. Weinstein

Georgia Law Review

Blockchain technology is transforming how markets work.
Blockchains eliminate the need for trusted gatekeepers like
banks to execute, verify, and record transactions. In the
financial markets, their disruptive potential threatens both
Wall Street banks and Silicon Valley venture capitalists. How
blockchain technology is regulated will determine whether it
encourages or inhibits competition. Some blockchain
applications present serious fraud and systemic risks,
complicating regulation. This Article explores the antitrust and
competition policy challenges blockchain presents and proposes
a regulatory strategy, modeled on Internet regulation and net
neutrality principles, to unlock blockchain’s competitive
potential. It contends that financial regulators should promote
blockchain …


Eu Crypto Currency Regulation: Creating A Haven For Businesses Or For Criminals?, Blake Hamil May 2020

Eu Crypto Currency Regulation: Creating A Haven For Businesses Or For Criminals?, Blake Hamil

Georgia Journal of International & Comparative Law

No abstract provided.


Morrison And Cryptocurrencies: Is It Time To Revisit The Extraterritorial Application Of Rule 10b-5?, Eleanor B. Eastham Apr 2020

Morrison And Cryptocurrencies: Is It Time To Revisit The Extraterritorial Application Of Rule 10b-5?, Eleanor B. Eastham

Georgia Journal of International & Comparative Law

No abstract provided.


Internet Extraterritoriality: Has Canada Reached Too Far Beyond Its Borders?, Sydney Wilson Jan 2020

Internet Extraterritoriality: Has Canada Reached Too Far Beyond Its Borders?, Sydney Wilson

Georgia Journal of International & Comparative Law

No abstract provided.


Why The Vppa And Coppa Are Outdated: How Netflix, Youtube, And Disney+ Can Monitor Your Family At No Real Cost, Anna O’Donnell Jan 2020

Why The Vppa And Coppa Are Outdated: How Netflix, Youtube, And Disney+ Can Monitor Your Family At No Real Cost, Anna O’Donnell

Georgia Law Review

Video-streaming services like Netflix, YouTube, and Disney+
dominate the current media landscape. This Note explains why
current laws likely cannot effectively prevent these streaming
services from collecting and sharing users’ private information.
The Video Privacy Protection Act (the VPPA) contains language
that has baffled courts when applying its text to streaming
services, resulting in multiple circuit splits. The Children’s
Online Privacy Protection Act (COPPA) has a clearer
application to streaming services, yet its enforcement has
resulted in small settlements with companies that have been
charged with collecting children’s private information. Both the
VPPA and COPPA need to be updated to …


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum Jun 2017

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley Oct 2016

Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley

Journal of Intellectual Property Law

No abstract provided.


The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise Oct 2016

The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise

Journal of Intellectual Property Law

No abstract provided.


A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith Sep 2016

A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith

Journal of Intellectual Property Law

No abstract provided.


The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard Jun 2016

The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard

Journal of Intellectual Property Law

No abstract provided.


Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq. Jun 2016

Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.

Journal of Intellectual Property Law

No abstract provided.


All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick Jan 2016

All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick

Georgia Law Review

In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …


Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael Jan 2016

Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael

Georgia Law Review

In a world where vast amounts of personal information
are obtained and stored by countless organizations and
businesses in the public and private sector, data breaches,

due to negligence or nefarious hacking, are a far too
common occurrence. The results of a data breach can be
serious and widespread, from public humiliation to
identity theft and national security crises. In an effort to
protect consumers from the potentially devastating effects
of data breaches, the Federal Trade Commission has
begun to take enforcement action against businesses whose
data security practices are alleged to be unfair and
deceptive. Theoretically, states can take …


Managing Cyber Risks, Kristin N. Johnson Jan 2016

Managing Cyber Risks, Kristin N. Johnson

Georgia Law Review

Cyber risks are as pervasive as the technology that facilitates their execution. The threat of cyber attacks or plots to deploy cyber weapons against critical government entities, private businesses and domestic and international infrastructure resources creates a most significant risk management concern. Pernicious,perilous and ubiquitous, cyber risks have merged as the newest risk management frontier. While the consequences of cyber attacks against individual financial institutions may be alarming, the interconnectedness of the largest financial institutions in the global economy and their shared dependence on technology render these businesses and the systems that execute their transactions shockingly vulnerable. Because of the …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


Pirates Or Privateers: Examining The Risks Of Conflicting International Regimes Through The Lens Of U.S.-Gambling, Eric A. Heath Jul 2015

Pirates Or Privateers: Examining The Risks Of Conflicting International Regimes Through The Lens Of U.S.-Gambling, Eric A. Heath

Georgia Journal of International & Comparative Law

No abstract provided.


Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson Jan 2015

Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson

Georgia Law Review

Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange.

Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even …


Finding An Appropriate Global Legal Paradigm For The Internet: United States And International Responses, Benjamin A. Perlman Oct 2014

Finding An Appropriate Global Legal Paradigm For The Internet: United States And International Responses, Benjamin A. Perlman

Georgia Journal of International & Comparative Law

No abstract provided.


For Sale--One Level 5 Barbarian For 94,800 Won: The International Effects Of Virtual Property And The Legality Of Its Ownership, Alisa B. Steinberg Oct 2014

For Sale--One Level 5 Barbarian For 94,800 Won: The International Effects Of Virtual Property And The Legality Of Its Ownership, Alisa B. Steinberg

Georgia Journal of International & Comparative Law

No abstract provided.


International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek Sep 2014

International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek

Georgia Journal of International & Comparative Law

No abstract provided.