Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (30)
- Privacy Law (13)
- Computer Law (10)
- International Law (9)
- Science and Technology Law (8)
-
- Civil Procedure (6)
- Constitutional Law (6)
- Legal Education (6)
- Legislation (6)
- Administrative Law (5)
- Commercial Law (5)
- Comparative and Foreign Law (5)
- Consumer Protection Law (5)
- Law and Society (5)
- Litigation (5)
- Social and Behavioral Sciences (5)
- Communications Law (4)
- First Amendment (4)
- Library and Information Science (4)
- Antitrust and Trade Regulation (3)
- Courts (3)
- Jurisdiction (3)
- Jurisprudence (3)
- Other Law (3)
- Property Law and Real Estate (3)
- Banking and Finance Law (2)
- Business (2)
- Common Law (2)
- Institution
-
- Chicago-Kent College of Law (13)
- Selected Works (12)
- University of Massachusetts Amherst (10)
- SelectedWorks (9)
- Schulich School of Law, Dalhousie University (8)
-
- Seattle University School of Law (5)
- Maurer School of Law: Indiana University (2)
- Singapore Management University (2)
- American University Washington College of Law (1)
- Columbia Law School (1)
- DePaul University (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- New York Law School (1)
- Pepperdine University (1)
- Texas A&M University School of Law (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (13)
- Laura Quilter (10)
- Articles, Book Chapters, & Popular Press (8)
- Ira Steven Nathenson (8)
- Seattle University Law Review (5)
-
- Edward Lee (3)
- Faculty Scholarship (2)
- Jennifer M. Urban (2)
- Research Collection Yong Pung How School Of Law (2)
- American University Law Review (1)
- Anthony J. King (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Claudio M. Grossman (1)
- David S. Olson (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Fordham Journal of Corporate & Financial Law (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Indiana Law Journal (1)
- James Grimmelmann (1)
- Maine Law Review (1)
- Pepperdine Law Review (1)
- Peter Jaszi (1)
- Rodolfo C. Rivas (1)
- Scholarly Works (1)
- Warren Bartholomew CHIK (1)
- Warren Bartholomew Chik (1)
- Publication Type
- File Type
Articles 1 - 30 of 71
Full-Text Articles in Internet Law
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Lemmon Leads The Way To Algorithm Liability: Navigating The Internet Immunity Labyrinth, Tyler Lisea
Lemmon Leads The Way To Algorithm Liability: Navigating The Internet Immunity Labyrinth, Tyler Lisea
Pepperdine Law Review
Congress passed Section 230 at the dawn of the internet era to protect innovators from traditional publisher tort liability. At the time, the internet consisted primarily of basic message boards and informational pages. Courts have interpreted Section 230 to provide internet platforms with sweeping immunity from liability for third-party content. The statute has aged poorly and is now ill-suited for today’s internet tools. Modern social media platforms are more than message board intermediaries because they actively shape and select the information pushed to users via engineered, engagement-enhancing algorithms. Engagement algorithms are not merely neutral tools; web developers intentionally design them …
Narrowing Data Protection's Enforcement Gap, Filippo Lancieri
Narrowing Data Protection's Enforcement Gap, Filippo Lancieri
Maine Law Review
The rise of data protection laws is one of the most profound legal changes of this century. Yet, despite their nominal force and widespread adoption, available data indicates that these laws recurrently suffer from an enforcement gap—that is, a wide disparity between the stated protections on the books and the reality of how companies respond to them on the ground. Indeed, Appendix I to this Article introduces a novel literature review of twenty-six studies that analyzed the impact on the ground of the GDPR and the CCPA: none found a meaningful improvement in citizen’s data privacy. This raises the question: …
Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow
Do We Own What We Post?: The Fundamental Property Right To Destroy Your Presence On The Internet, Olivia Shangrow
Seattle University Law Review
This Note will explore the well-established right to destroy your own property and how such a fundamental right can and should be applied to our online property to develop more protective data privacy legislation. Part I highlights the longstanding pillar of property law establishing a right to destroy one’s property, and how that can and should be applied to your digital identity. Part II will discuss the ambiguity of personal data ownership online and the ill effects resulting from the lack of control of our personal information on the Internet. Part III examines the current state of data privacy legislation …
Juridical Discourse For Platforms, Thomas E. Kadri
Juridical Discourse For Platforms, Thomas E. Kadri
Scholarly Works
Facebook founder Mark Zuckerberg has created a private “Supreme Court,” or so he says. Since 2021, his company’s Oversight Board has issued verdicts on a smattering of Facebook’s decisions about online speech. Cynics frame the Board as a Potemkin village, but defenders invoke analogies to separation of powers to claim that this new body empowers the public and restrains the company. Some are even calling for a single “platform supreme court” to rule over the entire industry.
Juridical discourse for platforms is powerful, but it can also be deceptive. This Response explores how juridical discourse has legitimized and empowered Facebook’s …
“The Virus Of Liberty”: John Perry Barlow, Internet Law, And Grateful Dead Studies, Joseph A. Tomain
“The Virus Of Liberty”: John Perry Barlow, Internet Law, And Grateful Dead Studies, Joseph A. Tomain
Articles by Maurer Faculty
In 2019, the Duke Law and Technology Review published a special issue titled, "The Past and Future of the Internet: A Symposium for John Perry Barlow." This essay examines the legal scholarship in the Barlow symposium and frames it in the interdisciplinary terms of Grateful Dead studies. Part I focuses on the two Barlow essays that formed the basis of the symposium. Part II connects issues raised by the Barlow symposium to Grateful Dead studies. The essay concludes that Barlow's legacy should inspire others to engage both the cultural and political paths with “groundless hope,” because protecting the “inexplicable pleasures …
A Third-Party Doctrine For Digital Metadata, H. Brian Holland
A Third-Party Doctrine For Digital Metadata, H. Brian Holland
Faculty Scholarship
For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …
The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz
The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz
Georgetown Law Faculty Publications and Other Works
The International Intellectual Property Commercialization Council (“IIPCC”) presented its third annual policy conference at the United States Capitol on May 6, 2019. The conference’s theme explored the question of “what is the state of innovation in the United States?” Panelists included The Honorable Andrei Iancu – Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office; Dr. Carl J. Schramm – University Professor, Syracuse University and Former President of the Ewing Marion Kauffman Foundation; Mr. Patrick Kilbride – Senior Vice President of the Global Innovation Policy Center (“GIPC”) at the U.S. Chamber of …
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg
A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg
Faculty Scholarship
To a US appraiser, article 17 of the Digital Single Market Directive suggests the EU has learned from American mistakes (and from its own) in the allocation of internet intermediaries’ liability for hosting and communicating user-posted content. Before the DSM Directive, art. 14 of the 2000 eCommerce Directive set out a notice-and-takedown system very similar to the regime provided in 17 U.S.C. section 512(c). Both regimes replaced the normal copyright default, which requires authorization to exploit works, with a limitation on the liability of service providers who complied with statutory prerequisites. Because the limitation ensured that service providers would not …
Hybrid Transactions And The Internet Of Things: Goods, Services, Or Software?, Stacy-Ann Elvy
Hybrid Transactions And The Internet Of Things: Goods, Services, Or Software?, Stacy-Ann Elvy
Articles & Chapters
The Internet of Things (IOT) has been described by the American Bar Association as "one of the fastest emerging," potentially most "transformative and disruptive technological developments" in recent years. Thesecurity risks posed by the IOT are immense and Article 2 of the UCC should play a central role in determinations regarding liability for vulnerable IOT products. However, the lack of explicit clarity in the UCC on how to evaluate Article 2's applicability to hybrid transactions that involve the provision of goods, services, and software has led to conflicting case law on this issue, which contradicts the UCC's stated goals of …
The Right To Be Forgotten V. Free Speech (Symposium) (Forthcoming), Edward Lee
The Right To Be Forgotten V. Free Speech (Symposium) (Forthcoming), Edward Lee
Edward Lee
No abstract provided.
Recognizing Rights In Real Time: The Role Of Google In The Eu Right To Be Forgotten, Edward Lee
Recognizing Rights In Real Time: The Role Of Google In The Eu Right To Be Forgotten, Edward Lee
Edward Lee
No abstract provided.
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini
Seattle University Law Review
Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …
Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta
Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta
David S. Olson
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Fcc Commenting Workshop, Laura Quilter
Reviving Implied Confidentiality, Woodrow Hartzog
Reviving Implied Confidentiality, Woodrow Hartzog
Indiana Law Journal
The law of online relationships has a significant flaw—it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.
Courts’ abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …
Aereo's Errors, Ira Steven Nathenson
Aereo's Errors, Ira Steven Nathenson
Ira Steven Nathenson
This article scrutinizes the many troubling errors made by the United States Supreme Court in its decision in American Broadcasting Companies, Inc. v. Aereo, Inc. Aereo’s streaming television service allowed subscribers to watch broadcast television on a computer, tablet, or smartphone without requiring them to be directly connected to cable, satellite, or a local antenna. Aereo’s system was designed to comply with existing copyright law by using thousands of antennas, each of which was designated for only one subscriber at a time. Aereo was sued for copyright infringement by a number of leading television broadcasters. The United States Supreme Court, …
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Seattle University Law Review
Penny auctions, an online phenomenon imported from Europe, operate by the hundreds in the United States without meaningful oversight from consumer protection agencies. In a penny auction, consumers compete for items one penny at a time. To date, no significant inquiry, either academic or practical, into the legitimacy of the penny auction has occurred. Although marketed as auctions, online penny auctions may actually qualify as lotteries. Unlike the multifarious and confusing definitions of gambling, the long-accepted definition of a lottery consists of three elements: prize, consideration, and chance. If a penny auction satisfies this definition then, under well-established case law …
Copyright Futures In The Digital Humanities, Laura Quilter
Copyright Futures In The Digital Humanities, Laura Quilter
Laura Quilter
Digital humanities work raises questions around digitization, search, and non-consumptive uses of texts, as well as distribution and access. But traditional humanities work is also confronting copyright questions, simply in terms of publishing, using, and accessing humanities research. This discussion, facilitated by Laura Quilter, UMass Copyright and Information Policy Librarian, will address the issues raised in copyright litigation, particularly the Authors Guild v. HathiTrust case and the "digital humanities" amicus brief, and consider the possible Open Access future presented by the Open Library of Humanities and other initiatives.
Super-Intermediaries, Code, Human Rights, Ira Nathenson
Super-Intermediaries, Code, Human Rights, Ira Nathenson
Ira Steven Nathenson
We live in an age of intermediated network communications. Although the internet includes many intermediaries, some stand heads and shoulders above the rest. This article examines some of the responsibilities of “Super-Intermediaries” such as YouTube, Twitter, and Facebook, intermediaries that have tremendous power over their users’ human rights. After considering the controversy arising from the incendiary YouTube video Innocence of Muslims, the article suggests that Super-Intermediaries face a difficult and likely impossible mission of fully servicing the broad tapestry of human rights contained in the International Bill of Human Rights. The article further considers how intermediary content-control procedures focus too …
The Fight For The Future: How People Defeated Hollywood And Saved The Internet—For Now, Edward Lee
The Fight For The Future: How People Defeated Hollywood And Saved The Internet—For Now, Edward Lee
Edward Lee
No abstract provided.
Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.
Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author analyzes and describes the necessary elements of a successful social media and Internet corporate policy; through citing common pitfalls and learning lessons from different jurisdictions across the world. The author then offers general guidelines on policies for Mexican enterprises under Mexican legislation.///////////////////////////////////////////////////////////////////////////////////////El autor analiza y describe los elementos necesarios de una política corporativa sobre internet y redes sociales exitosa, citando los errores más comunes y aprendiendo lecciones de las legislaciones de distintos países.
The Development And Practice Of Law In The Age Of The Internet, Nabil R. Adam, Mark H. Hellmann, Peter Martin, James B. Altman, Ethan Katsh, Cantwell F. Muckenfuss, Clifford L. Brody, Eleanor Kerlow, Daniel Nyhart, Thomas R. Bruce, Jon E. Klemens, Ira H. Parker, Mary J. Culnan, John M. Kuttler, Ronald Plesser, Robert Gellman, Ronald D. Lee, Randy V. Sabett, Claudio Grossman, Rosemary Shiels
The Development And Practice Of Law In The Age Of The Internet, Nabil R. Adam, Mark H. Hellmann, Peter Martin, James B. Altman, Ethan Katsh, Cantwell F. Muckenfuss, Clifford L. Brody, Eleanor Kerlow, Daniel Nyhart, Thomas R. Bruce, Jon E. Klemens, Ira H. Parker, Mary J. Culnan, John M. Kuttler, Ronald Plesser, Robert Gellman, Ronald D. Lee, Randy V. Sabett, Claudio Grossman, Rosemary Shiels
Claudio M. Grossman
No abstract provided.
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Warren Bartholomew Chik
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
Warren Bartholomew CHIK
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
Digital Originality, Edward Lee
Digital Originality, Edward Lee
All Faculty Scholarship
This Article examines the doctrine of originality in U.S. copyright law and proposes a reconfigured, three-part test that can better analyze issues of first impression involving works created with new digital technologies. The proposed test, encapsulated by the concept of digital originality, provides much needed guidance to courts to address the increasing complexities of digital creations in the twenty-first century.