Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Indiana Law Journal

Discipline
Keyword
Publication Year

Articles 1 - 30 of 47

Full-Text Articles in Internet Law

Tinder Love And Care: Proposing An Industry Self-Regulation Policy Implementing Safety Procedures For Dating App Companies, Marissa Meredith Apr 2023

Tinder Love And Care: Proposing An Industry Self-Regulation Policy Implementing Safety Procedures For Dating App Companies, Marissa Meredith

Indiana Law Journal

Online dating companies have monetized and capitalized on the idea of finding love, creating a billion-dollar industry matching individuals with their “soul mates.” With its perks and benefits, the online love industry is not without risk. Despite some dating companies limiting user eligibility in their terms and conditions to those without felony and sexual offense convictions, there is no actual screening process established by these companies. Furthermore, there are no uniform safety protocols among dating app companies. This lack of uniformity coupled with access to all, including violent offenders, allows repeat offenders to engage in “delightful” conversations with unsuspecting strangers …


The Policy Origins Of Wi-Fi, John Blevins Jan 2023

The Policy Origins Of Wi-Fi, John Blevins

Indiana Law Journal

Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …


Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy Jul 2021

Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy

Indiana Law Journal

Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.

This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …


What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells Apr 2021

What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells

Indiana Law Journal

This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …


Measuring Trademark Dilution By Tarnishment, Suneal Bedi, David Reibstein Jul 2020

Measuring Trademark Dilution By Tarnishment, Suneal Bedi, David Reibstein

Indiana Law Journal

The law of trademark tarnishment—a type of trademark dilution—is in disarray. The

basic definition is deceptively simple. Trademark tarnishment occurs when a junior

mark harms the reputation of a substantially similar existing senior trademark by

associating itself with something perverse or deviant. However, it turns out that

Congress and the courts disagree over the prima facie evidence necessary to prove

its existence. The problem is that federal law and related legal principles are simply

ill-equipped to adequately analyze this unique market-driven doctrine. To make

matters worse, legal scholars cannot even agree on whether trademark tarnishment

can empirically exist in the …


Internet Architecture And Disability, Blake Reid Apr 2020

Internet Architecture And Disability, Blake Reid

Indiana Law Journal

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


Upskirting, Bitcoin, And Crime, Oh My: Judicial Resistance To Applying Old Laws To New Crimes – What Is A Legislature To Do?, Michael Whiteman Jan 2020

Upskirting, Bitcoin, And Crime, Oh My: Judicial Resistance To Applying Old Laws To New Crimes – What Is A Legislature To Do?, Michael Whiteman

Indiana Law Journal

As technology continues to advance at a break-neck speed, legislatures often find themselves scrambling to write laws to keep up with these advances. Prosecutors are frequently faced with the prospect of charging a defendant with a crime based on an existing law that does not quite fit the circumstances of the defendant’s actions. Judges, cognizant of the fact that legislatures, and not the judiciary, have the primary responsibility for creating crimes, have pushed back. Judges routinely refuse to convict a defendant if the statute does not fairly criminalize the defendant’s actions. To determine if a defendant’s actions fit within a …


A Coffee Break For Bitcoin, Margaret Ryznar Jan 2020

A Coffee Break For Bitcoin, Margaret Ryznar

Indiana Law Journal

For many, the appeal of bitcoin is in its detachment from government regulation. However, the Coffee bonding theory, which initially arose in the context of foreign stocks, suggests certain benefits of regulation for bitcoin, including increased legitimacy. By invoking the Coffee bonding theory, this Article offers another perspective on the regulation of bitcoin.


#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel Jan 2019

#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel

Indiana Law Journal

This Article explores the complicated relationship between minimum contacts and the modern internet. Part I traces the development of modern personal jurisdiction analyses in the areas of both specific and general jurisdiction. Interesting in this historical overview is the increased reliance on predictability, even as courts have recognized that advanced technologies and infrastructure have made the maintenance of lawsuits infinitely easier than in the days before International Shoe.7 Part II then explores the intersection between personal jurisdiction and the internet as well as the rise of the so-called Zippo “interactivity” test for jurisdiction in cases involving websites. Although Zippo has …


Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii Jan 2019

Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii

Indiana Law Journal

With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


Cybersecurity And Tax Reform, Michael Hatfield Jan 2018

Cybersecurity And Tax Reform, Michael Hatfield

Indiana Law Journal

INTRODUCTION

I. THE PAST AND FUTURE OF THE IRS AS A CYBERATTACK TARGET

A. IRS AS A CYBERATTACK TARGET

B. THE FUTURE OF THE IRS AS A CYBERATTACK TARGET1. INFORMATION TECHNOLOGY

2. TAX INFORMATION

3. TYPES OF FUTURE ATTACKS

II. THE IRSWILL FAIL TO IMPLEMENT ADEQUATE CYBERSECURITY

A. VERY POOR HISTORY OF IMPROVING TECHNOLOGY

B. INADEQUATE FUNDING

C. INABILITY TO RECRUIT AND RETAIN EXPERTS

D. TOOMANY USERS

E. CYBERSECURITY IS DIFFICULT

III. BETTER DIGITAL TECHNOLOGY IS NOT THE GOAL

A. SLOWING THE USE OF DIGITAL TECHNOLOGY

B. CYBERSECURITY AND TAX REFORM

1. PAY-AS-YOU-EARN (PAYE)

2. SIMPLIFIED INCOME TAX

3. PURIFIED …


Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin Jan 2018

Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin

Indiana Law Journal

The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about Too-Big-To-Fail …


Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia Jan 2018

Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia

Indiana Law Journal

Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. …


User-Friendly Taxpaying, Kathleen Delaney Thomas Oct 2017

User-Friendly Taxpaying, Kathleen Delaney Thomas

Indiana Law Journal

Technology is revolutionizing our lives. With the touch of a button or a simple voice command, we can instantly order groceries, get directions, or find the nearest sushi restaurant. Sensibly, the private sector has capitalized on these recent innovations to drive up profits. To sell more laundry detergent, Amazon now enables consumers to order refills by simply pressing the “dash button” mounted above their laundry machines. Starbucks lures more customers by allowing them to pre-order online and have their drink waiting when they arrive at the store. The theory behind this approach is simple: if you want someone to use …


"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin Oct 2017

"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin

Indiana Law Journal

This Note argues that courts should narrow the scope of examined speech and place little weight on the amount of media attention that the speech received. Although courts sometimes reject First Amendment protection on the Pickering balancing test instead of the public concern issue, the public concern requirement is a threshold issue that plays a critical role in successful First Amendment claims. Accordingly, courts need to revisit the public concern doctrine to ensure that its analysis is sound and yields the correct outcome.

Part I provides background concerning retaliation claims, criticism of the public concern requirement, and special issues that …


Regulating Fantasy Sports: A Practical Guide To State Gambling Laws, And A Proposed Framework For Future State Legislation, Marc Edelman Apr 2017

Regulating Fantasy Sports: A Practical Guide To State Gambling Laws, And A Proposed Framework For Future State Legislation, Marc Edelman

Indiana Law Journal

In recent months, the legal status of fantasy sports has undergone intense scrutiny, with the attorneys general of many states contending that certain formats of daily fantasy sports violate state gambling laws. In an effort to save the burgeoning daily fantasy sports industry, legislators in these states have proposed bills to affirmatively legalize and regulate daily fantasy sports. However, these bills often fail to adequately address the underlying consumer protection concerns pertaining to the industry.

This Article analyzes how U.S. states currently regulate the fantasy sports marketplace and proposes a framework for future state laws to effectively regulate both traditional …


The Right To Attention, Jasper L. Tran Apr 2016

The Right To Attention, Jasper L. Tran

Indiana Law Journal

What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective.

This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet advertisement companies and scam artists freely …


Beyond Transparency: The Semantics Of Rulemaking For An Open Internet, Reza Rajabiun Jan 2016

Beyond Transparency: The Semantics Of Rulemaking For An Open Internet, Reza Rajabiun

Indiana Law Journal

In trying to promote the development of an open Internet, the U.S. Federal Communications Commission (FCC) has primarily tried to encourage network providers to be transparent about their traffic management practices and quality of service prioritization policies. Dominant network operators have successfully challenged this minimalist approach to addressing end-user concerns about the rise of a two-tiered Internet, motivating the FCC to engage in yet another public consultation process to assess its future approach to the problem. This article maps the debate using Natural Language Processing (NLP) tools that allow us to build a systematic picture of the positions of the …


A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir Jan 2016

A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir

Indiana Law Journal

Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.

Our survey is the first comprehensive examination of the intersection of …


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …


Removing Disfavored Faces From Facebook: The Freedom Of Speech Implications Of Banning Sex Offenders From Social Media, John Hitz Jul 2014

Removing Disfavored Faces From Facebook: The Freedom Of Speech Implications Of Banning Sex Offenders From Social Media, John Hitz

Indiana Law Journal

This Note scrutinizes the constitutionality of statutes that ban sex offenders who are no longer under any form of probation, parole, or supervised release from using social media. This Note argues that the incarnations of three of the social media ban statutes that have been examined by the federal judiciary were properly found unconstitutional because they violate the free speech rights of the sex offenders that they ban from social media. This Note goes on to argue that states can secure the interests they were seeking to protect in adopting these statutes through other means.

ng what groups of individuals …


Learning From Copyright's Failure To Build Its Future, Ken Burleson Jul 2014

Learning From Copyright's Failure To Build Its Future, Ken Burleson

Indiana Law Journal

Since file sharing emerged in the late 1990s, copyright infringement has been widespread and virtually impervious to legal sanctions. Despite the best efforts of industry representatives and the lawmakers acting at their behest, attempts to scare and shame copyright infringers into compliance with the law have fallen flat. Part I of this Note discusses the ongoing conflict between modern copyright law and socially acceptable behavior, specifically copyright infringement through digital means. Part II explores the various attempts, and subsequent failures, to curb infringement through deterrence measures. Part III explains why deterrence has been ineffective by exploring psychological models of law-abiding …


Reviving Implied Confidentiality, Woodrow Hartzog Apr 2014

Reviving Implied Confidentiality, Woodrow Hartzog

Indiana Law Journal

The law of online relationships has a significant flaw—it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.

Courts’ abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …


Bitcoin And Money Laundering: Mining For An Effective Solution, Danton Bryans Jan 2014

Bitcoin And Money Laundering: Mining For An Effective Solution, Danton Bryans

Indiana Law Journal

No abstract provided.


Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins Oct 2013

Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins

Indiana Law Journal

Scholarship on assisted reproductive technologies (ART) has emphasized the commercial nature of the interaction between fertility patients and their physicians, but little attention has been paid to precisely how clinics persuade patients to choose their clinics over their competitors’. This Article offers evidence about how clinics sell ART based on clinics’ advertising on their websites. To assess clinics’ marketing efforts, I coded advertising information on 372 fertility clinics’ websites. The results from the study confirm some suspicions of prior ART scholarship while contradicting others. For instance, in line with scholars who are concerned that racial minorities face barriers to accessing …


Biometric Id Cybersurveillance, Margaret Hum Oct 2013

Biometric Id Cybersurveillance, Margaret Hum

Indiana Law Journal

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira Oct 2013

Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira

Indiana Law Journal

Roundtable on Regulating Assisted Reproductive Technology 2012


A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia Oct 2013

A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia

Indiana Law Journal

No abstract provided.


Gmonopoly: Does Search Bias Warrant Antitrust Or Regulatory Intervention?, Andrew Langford Jan 2013

Gmonopoly: Does Search Bias Warrant Antitrust Or Regulatory Intervention?, Andrew Langford

Indiana Law Journal

No abstract provided.