Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Technology

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 115

Full-Text Articles in Internet Law

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real Jan 2024

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real

Washington Law Review Online

In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …


Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray Oct 2023

Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray

Akron Law Review

This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …


Security In The Digital Age, Michael Gentithes Oct 2023

Security In The Digital Age, Michael Gentithes

Akron Law Review

Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …


Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl Sep 2023

Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl

Marquette Law Review

It has been more than a quarter century since Congress enacted twin safe harbor provisions to help protect and encourage the growth of a nascent internet by removing some liability and regulatory uncertainty. Today, there are calls for a similar safe harbor provision for blockchain, the technology behind cryptocurrencies and smart contracts. What lessons have we learned from the implementation of the internet safe harbor provisions, Section 230 of the Communications Decency Act, and Section 512 of the Digital Millennium Copyright Act? This Article charts the history of those provisions and their judicial construction over the decades. It also examines …


Ethics At The Speed Of Business, James A. Doppke Jr. Aug 2023

Ethics At The Speed Of Business, James A. Doppke Jr.

DePaul Business & Commercial Law Journal

This paper discusses several ways in which the Illinois Rules of Professional Conduct, and the Illinois Supreme Court Rules, construct barriers that prevent lawyers and businesses from accomplishing reasonable commercial goals. Often, those barriers arise from outdated concepts, or terminology that does not reflect current business realities. The paper argues for the amendment of specific Rules to enhance lawyers’ and businesses’ respective abilities to conduct their affairs more efficiently, without sacrificing public protection in the process.


Disrupting The Narrative: Diving Deeper Into Section 230 Political Discourse, Koustubh “K.J.” Bagchi, Elizabeth Banker, Ife Ogunleye Jul 2023

Disrupting The Narrative: Diving Deeper Into Section 230 Political Discourse, Koustubh “K.J.” Bagchi, Elizabeth Banker, Ife Ogunleye

Pepperdine Law Review

Online spaces have undoubtedly played a significant role in facilitating discourse and the exchange of information. With this increased discourse, however, digital platforms have also seen a rise in harmful or problematic content shared online––including health misinformation, hate speech, and child sex abuse material, among others. Many commentators have put the blame for this trend on Section 230, arguing that Section 230 has enabled the spread of harmful content and suggesting that Section 230 ought to be amended or replaced. This Essay, by contrast, argues that the current narrative about Section 230 gets it wrong. In reality, Section 230 has …


Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina May 2023

Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


The Policy Origins Of Wi-Fi, John Blevins Jan 2023

The Policy Origins Of Wi-Fi, John Blevins

Indiana Law Journal

Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …


The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry Jan 2023

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry

Seattle University Law Review

If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …


The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor Nov 2022

The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor

Northwestern Journal of Technology and Intellectual Property

To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …


Can Social Media Corporations Be Held Liable Under International Law For Human Rights Atrocities?, Juliana Palmieri May 2022

Can Social Media Corporations Be Held Liable Under International Law For Human Rights Atrocities?, Juliana Palmieri

Pace International Law Review

This article examines the relevant international law associated with genocide and hate speech and examines whether there are any legal grounds to hold a corporation liable for how people chose to use its product or service in relation to human rights violations. The analysis begins with a brief overview of international criminal and human rights law, relevant treaties, jurisdictional issues, and the legal theories of corporate criminal liability and complicity. Because current international law provides no clear answer, this article proposes that international courts use a balancing test which evaluates a non-exclusive list of ten main factors.


The Fate Of Comment 8: Analyzing A Lawyer's Ethical Obligation Of Technological Competence, Lisa Z. Rosenof May 2022

The Fate Of Comment 8: Analyzing A Lawyer's Ethical Obligation Of Technological Competence, Lisa Z. Rosenof

University of Cincinnati Law Review

No abstract provided.


The Increased Use And Permanency Of Technology: How Those Changes Impact Attorneys’ Professional Responsibility And Ethical Obligations To Clients And Recommendations For Improvement, Scott B. Piekarsky Mar 2022

The Increased Use And Permanency Of Technology: How Those Changes Impact Attorneys’ Professional Responsibility And Ethical Obligations To Clients And Recommendations For Improvement, Scott B. Piekarsky

University of Miami Business Law Review

No abstract provided.


Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu May 2021

Handle With Care: Domestic Violence Safety Planning In The Age Of Data Privacy Laws, Jenny Wu

Seattle Journal of Technology, Environmental & Innovation Law

The United States has been patiently waiting for a comprehensive federal data privacy law to protect consumers. However, strong data privacy laws can also protect a less thought-about group: survivors of domestic violence and intimate partner violence. As new technology proliferates into our daily lives, technology-based abuse is quickly becoming a common form of intimate partner abuse. Domestic violence survivors and advocates have to stay extra vigilant about who has access to their internet data. Needing to understand technology-specific safety measures and learn technology-literacy skills adds more work to already overwhelmed domestic violence advocates and survivors. Could the law serve …


Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali Jan 2021

Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali

Catholic University Journal of Law and Technology

This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.


Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson Jan 2021

Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson

Catholic University Journal of Law and Technology

The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.


To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard Jan 2021

To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard

Catholic University Journal of Law and Technology

The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.


"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue Jan 2021

"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue

Catholic University Journal of Law and Technology

The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …


Technological Transformation Of The Public Square: Government Officials Use Of Social Media And The First Amendment, Patricia Beety, Joline Zepcevski Jan 2021

Technological Transformation Of The Public Square: Government Officials Use Of Social Media And The First Amendment, Patricia Beety, Joline Zepcevski

Mitchell Hamline Law Review

No abstract provided.


Ocularcentrism And Deepfakes: Should Seeing Be Believing?, Katrina G. Geddes Jan 2021

Ocularcentrism And Deepfakes: Should Seeing Be Believing?, Katrina G. Geddes

Fordham Intellectual Property, Media and Entertainment Law Journal

The pernicious effects of misinformation were starkly exposed on January 6, 2021, when a violent mob of protestors stormed the nation’s capital, fueled by false claims of election fraud. As policymakers wrestle with various proposals to curb misinformation online, this Article highlights one of the root causes of our vulnerability to misinformation, specifically, the epistemological prioritization of sight above all other senses (“ocularcentrism”). The increasing ubiquity of so-called “deepfakes”—hyperrealistic, digitally altered videos of events that never occurred—has further exposed the vulnerabilities of an ocularcentric society, in which technology-mediated sight is synonymous with knowledge. This Article traces the evolution of visual …


The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D. May 2020

The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.

Georgia State University Law Review

An examination of technology in the countertrafficking space reveals recurring tensions between law enforcement and rights-based approaches. It also illuminates assumptions, such as the one that posits more law enforcement-focused, nonstate-actor-supported data-driven efforts are necessary to securing justice for people in trafficking situations. However, a closer look at how technology is used and by whom also invites us to ask different questions and to leverage the power of our all-too-human creative potential in thinking about how to value and prioritize data ethics, transparency, and accountability in future countertrafficking work.


Internet Architecture And Disability, Blake Reid Apr 2020

Internet Architecture And Disability, Blake Reid

Indiana Law Journal

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming Jan 2020

A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming

Seattle University Law Review

This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …


Foreign Direct Investments Into Fintech And Blockchain Technology Startups In Latin America, Y. Tatiana Clavijo, Hernán Pantaleón Dec 2019

Foreign Direct Investments Into Fintech And Blockchain Technology Startups In Latin America, Y. Tatiana Clavijo, Hernán Pantaleón

University of Miami Inter-American Law Review

Technology is changing our everyday lives at a faster rate every minute from artificial intelligence and medical advances in robotics to the upcoming self-driving cars. Every sector of our lives is being impacted, disrupted, and constantly altered by innovations, including our finances. In the developed markets, fintech, or financial technology, is the new and exciting area of product innovation for financial services. The innovations rely on the internet, blockchain technology, and the new and highly controversial digital currencies. Consequently, new digital platforms and mobile applications create new possibilities while being accessible to more people at a lower cost across borders. …


Where To Prosecute Cybercrimes, Jacob T. Wall May 2019

Where To Prosecute Cybercrimes, Jacob T. Wall

Duke Law & Technology Review

Selecting the appropriate venue for a criminal trial has been a matter of constitutional concern since the founding of the country. The issue is thought to be essential to the fair administration of justice and thus public confidence in the criminal justice system. Constitutionally, crimes must be prosecuted in the states and districts in which they were committed. However, the rise of cybercrime has complicated the venue inquiry: cyberspace, the domain of cybercrime, and physical space have become increasingly decoupled. Consequently, under America’s primary but dated cybercrime law, the ideal location for a trial may not be a constitutionally proper …


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …