Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Internet Law

Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray Jan 2024

Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray

Oklahoma Law Review

No abstract provided.


The Server Test Quandary And Embedding Permission Culture, Michael P. Goodyear Jan 2023

The Server Test Quandary And Embedding Permission Culture, Michael P. Goodyear

Oklahoma Law Review

No abstract provided.


Software V. Software: How Section 230 Of The Communications Decency Act Threatens To Undermine Antitrust Law, Bailey S. Barnes Jan 2022

Software V. Software: How Section 230 Of The Communications Decency Act Threatens To Undermine Antitrust Law, Bailey S. Barnes

Oklahoma Law Review

No abstract provided.


The First Amendment Has Entered The Chat: Oklahoma’S Cyberharassment Law, Trae Havens Jan 2021

The First Amendment Has Entered The Chat: Oklahoma’S Cyberharassment Law, Trae Havens

Oklahoma Law Review

No abstract provided.


“The Internet Of Buildings”: Insurance Of Cyber Risks For Commercial Real Estate, Thomas D. Hunt Jan 2019

“The Internet Of Buildings”: Insurance Of Cyber Risks For Commercial Real Estate, Thomas D. Hunt

Oklahoma Law Review

No abstract provided.


The Struggle Over Webcasting--Where Is The Stream Carrying Us?, Susan A. Russell Sep 2017

The Struggle Over Webcasting--Where Is The Stream Carrying Us?, Susan A. Russell

Oklahoma Journal of Law and Technology

No abstract provided.


Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon Sep 2017

Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon

Oklahoma Journal of Law and Technology

No abstract provided.


The Safe Harbor Solution: Is It An Effective Mechanism For International Data Transfers Between The United States And The European Union, Alexander Zinser Sep 2017

The Safe Harbor Solution: Is It An Effective Mechanism For International Data Transfers Between The United States And The European Union, Alexander Zinser

Oklahoma Journal of Law and Technology

No abstract provided.


Balancing The Crucible: The Revolving Conflict Between Fair Use And Corporate Use In The Battle To Control Domain Names, Stacey Knapp Sep 2017

Balancing The Crucible: The Revolving Conflict Between Fair Use And Corporate Use In The Battle To Control Domain Names, Stacey Knapp

Oklahoma Journal of Law and Technology

No abstract provided.


Shifting The Burden To Internet Service Providers: The Validity Of Subpoena Power Under The Digital Millennium Copyright Act, Matt Sellers Sep 2017

Shifting The Burden To Internet Service Providers: The Validity Of Subpoena Power Under The Digital Millennium Copyright Act, Matt Sellers

Oklahoma Journal of Law and Technology

No abstract provided.


E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short Sep 2017

E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short

Oklahoma Journal of Law and Technology

No abstract provided.


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky Sep 2017

Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington Sep 2017

Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington

Oklahoma Journal of Law and Technology

No abstract provided.


Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell Sep 2017

Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell

Oklahoma Journal of Law and Technology

No abstract provided.


Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson Sep 2017

Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster Jan 2015

Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster

Oklahoma Law Review

No abstract provided.


Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin Jan 2014

Cause To Believe What? The Importance Of Defining A Search's Object—Or, How The Aba Would Analyze The Nsa Metadata Surveillance Program, Christopher Slobogin

Oklahoma Law Review

Courts and scholars have devoted considerable attention to the definition of probable cause and reasonable suspicion. Since the demise of the “mere evidence rule” in the 1960s, however, they have rarely examined how these central Fourth Amendment concepts interact with the “object” of the search. That is unfortunate, because this interaction can have significant consequences. For instance, probable cause to believe that a search “might lead to evidence of wrongdoing” triggers a very different inquiry than probable cause to believe that a search “will produce evidence of criminal activity.” The failure to address the constraints that should be imposed on …


Ubiquitous Privacy, Thomas P. Crocker Jan 2014

Ubiquitous Privacy, Thomas P. Crocker

Oklahoma Law Review

No abstract provided.


Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew G. Ferguson Jan 2014

Big Data Distortions: Exploring The Limits Of The Aba Leatpr Standards, Andrew G. Ferguson

Oklahoma Law Review

Before moving on to my contribution about how the growing reliance on big data analytics may necessitate a slight modification to the ABA Standards on Law Enforcement Access to Third Party Records (LEATPR Standards), I would like first to pay a few compliments to the drafters of the LEATPR Standards for producing such a systematic, thoughtful, and elegant framework for considering Fourth Amendment freedoms. As anyone who writes about or teaches the Fourth Amendment knows, the doctrine remains a theoretical muddle. Yet, despite a minefield of conflicting precedent, the drafters of the LEATPR Standards have managed to construct a defensible …


The Aba Standards For Criminal Justice: Law Enforcement Access To Third Party Records: Critical Perspectives From A Technology-Centered Approach To Quantitative Privacy, David C. Gray Jan 2014

The Aba Standards For Criminal Justice: Law Enforcement Access To Third Party Records: Critical Perspectives From A Technology-Centered Approach To Quantitative Privacy, David C. Gray

Oklahoma Law Review

No abstract provided.


Third Party Records Protection On The Model Of Heightened Scrutiny, Marc J. Blitz Jan 2014

Third Party Records Protection On The Model Of Heightened Scrutiny, Marc J. Blitz

Oklahoma Law Review

No abstract provided.


Admissions Online: Statements Of A Party Opponent In The Internet Age, Dylan Charles Edwards Jan 2013

Admissions Online: Statements Of A Party Opponent In The Internet Age, Dylan Charles Edwards

Oklahoma Law Review

No abstract provided.


Internet Gambling: A Road To Strengthening Tribal Self-Government And Increasing Tribal Self-Sufficiency While Protecting American Consumers, Chris J. Thompson Jan 2012

Internet Gambling: A Road To Strengthening Tribal Self-Government And Increasing Tribal Self-Sufficiency While Protecting American Consumers, Chris J. Thompson

American Indian Law Review

No abstract provided.


Rolling The Dice On The Cyber-Reservation: The Confluence Of Internet Gaming And Federal Indian Law, David B. Jordan Jan 2001

Rolling The Dice On The Cyber-Reservation: The Confluence Of Internet Gaming And Federal Indian Law, David B. Jordan

American Indian Law Review

No abstract provided.