Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (11)
- International Law (11)
- Comparative and Foreign Law (10)
- Intellectual Property Law (9)
- Privacy Law (9)
-
- Entertainment, Arts, and Sports Law (6)
- European Law (4)
- Gaming Law (4)
- International Trade Law (4)
- Commercial Law (3)
- Consumer Protection Law (3)
- Criminal Law (3)
- First Amendment (3)
- Human Rights Law (3)
- Law and Society (3)
- Science and Technology Law (3)
- Advertising and Promotion Management (2)
- Antitrust and Trade Regulation (2)
- Banking and Finance Law (2)
- Business (2)
- Juvenile Law (2)
- Sports Management (2)
- Transnational Law (2)
- Administrative Law (1)
- Air and Space Law (1)
- Arts Management (1)
- Business Organizations Law (1)
- Communications Law (1)
- Keyword
-
- Privacy (4)
- Antigua (2)
- Berne Convention (2)
- Blockchain (2)
- Copyright (2)
-
- Cybercrime (2)
- Digital Millennium Copyright Act (2)
- EU (2)
- European Union (2)
- Germany (2)
- Inc. (2)
- Online gambling (2)
- TRIPS (2)
- United Kingdom (2)
- WTO (2)
- YouTube (2)
- Adverse possession (1)
- Agreement on Trade Related Aspects of Intellectual Property Rights (1)
- Appropriation (1)
- Archdiocese of St. Louis v. Internet Entertainment Group (1)
- Avatar (1)
- Balkanization (1)
- Bally Total Fitness Holding Corp v. Faber (1)
- Barbuda (1)
- Bihari v. Gross (1)
- Blurring (1)
- Bridgestone Firestone (1)
- C.B.C. Distribution and Marketing (1)
- CFAA (1)
- COPPA (1)
- Publication Year
Articles 1 - 30 of 40
Full-Text Articles in Internet Law
Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp
Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp
Georgia Law Review
When the European Union’s (EU) General Data Protection Regulation (GDPR) passed in 2016, it represented the world’s first major comprehensive data privacy law and kicked off a conversation about how we think about the right to privacy in the modern age. The law granted a broad range of rights to EU citizens, including a right to have companies delete data they collect about you, a right not to have your personal information sold, and a range of other rights all geared towards individual autonomy over personal data. All the while, platform companies like Facebook (Meta), Apple, and Amazon have taken …
All Bets Are On! . . . Line: The Varied Regulatory Framework Of An Interconnected Online Sports Betting System, Meg Graham
Georgia Journal of International & Comparative Law
No abstract provided.
The United States And Its Obligations Under The Optional Protocol To The Convention On The Rights Of The Child On The Sale Of Children, Child Prostitution And Child Pornography To Combat Child Exploitation In The Digital World, Audrey Cunningham
Georgia Journal of International & Comparative Law
No abstract provided.
The (Second) Race To Space: A Human Rights Analysis Of Rapid Space Innovation, Alyssa Nelson
The (Second) Race To Space: A Human Rights Analysis Of Rapid Space Innovation, Alyssa Nelson
Georgia Journal of International & Comparative Law
No abstract provided.
Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple
Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple
Georgia Journal of International & Comparative Law
No abstract provided.
Big Tech In A Small Pond: How The Internet Economy Became So Concentrated And What Sector-Specific Regulation Can Do To Reel It In, Andy Wilson
Journal of Intellectual Property Law
While the early days of the internet were marked by a proliferation of new internet platforms offering different services, over time much of the sector became dominated by the handful of internet giants we know today. Discomfort with the outsized role that these enormous companies play in the daily lives of billions has driven a growing consensus that they need to be reined in, culminating in federal and state agencies launching a slew of antitrust suits against Google and Facebook in late 2020. These renewed antitrust efforts will likely be insufficient to address competitive harms in the internet economy, given …
Corporate Violations Of Human Rights: Addressing The Coordinated Surveillance And Persecution Of The Uyghur People By The Chinese State And Chinese Corporations, Ross Smith
Georgia Journal of International & Comparative Law
No abstract provided.
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Private Lives At Home And Public Lives In Court: Protecting The Privacy Of Federal Judges' Home Addresses, Hannah Elias Sbaity
Journal of Intellectual Property Law
Targeted murders of federal judges and their families at their private homes date back to May 29, 1979. Most recently, in July 2020, Judge Esther Salas’s only son, Daniel, was murdered and her husband near-fatally shot at their home. Individuals wishing to inflict such harm or death at federal judges’ homes have been able to do so because of federal judges’ publicly available home addresses. Because personally identifying information (PII) is defined differently from statute to statute, home addresses largely remain public information in most states and can be found in real estate records, data broker websites, social media platforms, …
Boss Battle: Twitch Vs Proposed Amendments To The Knowledge Standard Under The Digital Millennium Copyright Act, Zachary Messick
Boss Battle: Twitch Vs Proposed Amendments To The Knowledge Standard Under The Digital Millennium Copyright Act, Zachary Messick
Journal of Intellectual Property Law
Under the Digital Millennium Copyright Act (DMCA), indirect theories of liability such as vicarious liability and contributory infringement have been inconsistently applied, leading the Copyright Office to recommend lowering the knowledge standard and increasing potential liability for Online Service Providers (OSPs). In this note, I will discuss the histories of vicarious liability and contributory infringement, which demonstrate that courts have correctly applied the standards under the DMCA. Further, through a case-study of Twitch, an up-and-coming streaming website, I will discuss how the proposed amendments drive against the policies underlying the indirect theories of liability and would destroy OSPs like Twitch. …
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
A Deep Dive Into Technical Encryption Concepts To Better Understand Cybersecurity & Data Privacy Legal & Policy Issues, Anthony Volini
Journal of Intellectual Property Law
Lawyers wishing to exercise a meaningful degree of leadership at the intersection of technology and the law could benefit greatly from a deep understanding of the use and application of encryption, considering it arises in so many legal scenarios. For example, in FTC v. Wyndham1 the defendant failed to implement nearly every conceivable cybersecurity control, including lack of encryption for stored data, resulting in multiple data breaches and a consequent FTC enforcement action for unfair and deceptive practices. Other examples of legal issues requiring use of encryption and other technology concepts include compliance with security requirements of GLBA & HIPAA, …
Blockchain Neutrality, Samuel N. Weinstein
Blockchain Neutrality, Samuel N. Weinstein
Georgia Law Review
Blockchain technology is transforming how markets work.
Blockchains eliminate the need for trusted gatekeepers like
banks to execute, verify, and record transactions. In the
financial markets, their disruptive potential threatens both
Wall Street banks and Silicon Valley venture capitalists. How
blockchain technology is regulated will determine whether it
encourages or inhibits competition. Some blockchain
applications present serious fraud and systemic risks,
complicating regulation. This Article explores the antitrust and
competition policy challenges blockchain presents and proposes
a regulatory strategy, modeled on Internet regulation and net
neutrality principles, to unlock blockchain’s competitive
potential. It contends that financial regulators should promote
blockchain …
Eu Crypto Currency Regulation: Creating A Haven For Businesses Or For Criminals?, Blake Hamil
Eu Crypto Currency Regulation: Creating A Haven For Businesses Or For Criminals?, Blake Hamil
Georgia Journal of International & Comparative Law
No abstract provided.
Morrison And Cryptocurrencies: Is It Time To Revisit The Extraterritorial Application Of Rule 10b-5?, Eleanor B. Eastham
Morrison And Cryptocurrencies: Is It Time To Revisit The Extraterritorial Application Of Rule 10b-5?, Eleanor B. Eastham
Georgia Journal of International & Comparative Law
No abstract provided.
Internet Extraterritoriality: Has Canada Reached Too Far Beyond Its Borders?, Sydney Wilson
Internet Extraterritoriality: Has Canada Reached Too Far Beyond Its Borders?, Sydney Wilson
Georgia Journal of International & Comparative Law
No abstract provided.
Why The Vppa And Coppa Are Outdated: How Netflix, Youtube, And Disney+ Can Monitor Your Family At No Real Cost, Anna O’Donnell
Why The Vppa And Coppa Are Outdated: How Netflix, Youtube, And Disney+ Can Monitor Your Family At No Real Cost, Anna O’Donnell
Georgia Law Review
Video-streaming services like Netflix, YouTube, and Disney+
dominate the current media landscape. This Note explains why
current laws likely cannot effectively prevent these streaming
services from collecting and sharing users’ private information.
The Video Privacy Protection Act (the VPPA) contains language
that has baffled courts when applying its text to streaming
services, resulting in multiple circuit splits. The Children’s
Online Privacy Protection Act (COPPA) has a clearer
application to streaming services, yet its enforcement has
resulted in small settlements with companies that have been
charged with collecting children’s private information. Both the
VPPA and COPPA need to be updated to …
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Georgia Journal of International & Comparative Law
No abstract provided.
Is Liability Just A Link Away? Trademark Dilution By Tarnishment Under The Federal Trademark Dilution Act Of 1995 And Hyperlinks On The World Wide Web, Martha Kelley
Journal of Intellectual Property Law
No abstract provided.
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
The Georgia Open Records Law Electronic Signature Exception: The Intersection Of Privacy, Technology, And Open Records, Michael L. Van Cise
Journal of Intellectual Property Law
No abstract provided.
A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith
A Panoptic Approach To Information Policy: Utilizing A More Balanced Theory Of Property In Order To Ensure The Existence Of A Prodigious Public Domain, Christine D. Galbraith
Journal of Intellectual Property Law
No abstract provided.
The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard
The Thrill Of Victory, And The Agony Of The Tweet: Online Social Media, The Non-Copyrightability Of Events, And How To Avoid A Looming Crisis By Changing Norms, Jason Richard Sheppard
Journal of Intellectual Property Law
No abstract provided.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Rights Of Publicity: A Practitioner's Enigma, Gil N. Peles Esq.
Journal of Intellectual Property Law
No abstract provided.
All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick
All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick
Georgia Law Review
In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …
Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael
Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael
Georgia Law Review
In a world where vast amounts of personal information
are obtained and stored by countless organizations and
businesses in the public and private sector, data breaches,
due to negligence or nefarious hacking, are a far too
common occurrence. The results of a data breach can be
serious and widespread, from public humiliation to
identity theft and national security crises. In an effort to
protect consumers from the potentially devastating effects
of data breaches, the Federal Trade Commission has
begun to take enforcement action against businesses whose
data security practices are alleged to be unfair and
deceptive. Theoretically, states can take …
Managing Cyber Risks, Kristin N. Johnson
Managing Cyber Risks, Kristin N. Johnson
Georgia Law Review
Cyber risks are as pervasive as the technology that facilitates their execution. The threat of cyber attacks or plots to deploy cyber weapons against critical government entities, private businesses and domestic and international infrastructure resources creates a most significant risk management concern. Pernicious,perilous and ubiquitous, cyber risks have merged as the newest risk management frontier. While the consequences of cyber attacks against individual financial institutions may be alarming, the interconnectedness of the largest financial institutions in the global economy and their shared dependence on technology render these businesses and the systems that execute their transactions shockingly vulnerable. Because of the …
Personal Property Servitudes On The Internet Of Things, Christina Mulligan
Personal Property Servitudes On The Internet Of Things, Christina Mulligan
Georgia Law Review
Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …
Pirates Or Privateers: Examining The Risks Of Conflicting International Regimes Through The Lens Of U.S.-Gambling, Eric A. Heath
Pirates Or Privateers: Examining The Risks Of Conflicting International Regimes Through The Lens Of U.S.-Gambling, Eric A. Heath
Georgia Journal of International & Comparative Law
No abstract provided.
Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson
Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson
Georgia Law Review
Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange.
Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even …
Finding An Appropriate Global Legal Paradigm For The Internet: United States And International Responses, Benjamin A. Perlman
Finding An Appropriate Global Legal Paradigm For The Internet: United States And International Responses, Benjamin A. Perlman
Georgia Journal of International & Comparative Law
No abstract provided.
For Sale--One Level 5 Barbarian For 94,800 Won: The International Effects Of Virtual Property And The Legality Of Its Ownership, Alisa B. Steinberg
For Sale--One Level 5 Barbarian For 94,800 Won: The International Effects Of Virtual Property And The Legality Of Its Ownership, Alisa B. Steinberg
Georgia Journal of International & Comparative Law
No abstract provided.
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
Georgia Journal of International & Comparative Law
No abstract provided.