Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Internet Law

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry Jan 2023

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry

Seattle University Law Review

If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …


A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming Jan 2020

A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming

Seattle University Law Review

This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …


Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn Jul 2019

Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn

Andrea Matwyshyn

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman Jan 2014

Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman

All Faculty Scholarship

Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …


Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid Dec 2013

Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid

Melanie M. Reid

One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …


Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn Mar 2011

Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …


The Future Of Digital Communications Research And Policy, Scott Wallsten Dec 2010

The Future Of Digital Communications Research And Policy, Scott Wallsten

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Stealing What's Free: Exploring Compensation To Body Parts Sources For Their Contribution To Profitable Biomedical Research, Jo-Anne Yau May 2006

Stealing What's Free: Exploring Compensation To Body Parts Sources For Their Contribution To Profitable Biomedical Research, Jo-Anne Yau

ExpressO

It is undisputed in the biotechnology industry that human body parts play a vital role in research. The body parts donors, referred to as "Sources" in this article, are subjected to physical and financial exploitation. Forbidding the explosion of profits from trickling down to the Source presents an irrational inequity. Despite established law, it is evident from case analysis, prevailing social practices, and constitutional interpretation that Source compensation is a plausible solution.

This article proposes a model of compensation for Sources, whereby Sources are compensated based on a proportionate share of the research profits set aside for the Source as …


Envisioning Copyright Law's Digital Future, Peter S. Menell Jan 2003

Envisioning Copyright Law's Digital Future, Peter S. Menell

NYLS Law Review

No abstract provided.


Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Electronic Communications And The Law: Help Or Hindrance To Telecommuting?, Jennifer C. Dombrow May 1998

Electronic Communications And The Law: Help Or Hindrance To Telecommuting?, Jennifer C. Dombrow

Federal Communications Law Journal

During 1997, an estimated 11.1 million workers preformed some portion of their work by telecommuting. This number is expected to grow as employers continue to discover the benefits that can result from instituting a telecommuting policy. This growth may be hindered, however, by controversy concerning employee privacy rights. Although the use of electronic communications in the workplace is common, the laws addressing employee privacy rights and employer monitoring rights concerning these communications are ambiguous. New legislation is necessary to specifically define the respective rights of employers and employees. Without this new legislation, the benefits of electronic communications in the workplace, …


Your Life As An Open Book: Has Technology Rendered Personal Privacy Virtually Obsolete?, Sandra Byrd Peterson Dec 1995

Your Life As An Open Book: Has Technology Rendered Personal Privacy Virtually Obsolete?, Sandra Byrd Peterson

Federal Communications Law Journal

As society becomes increasingly automated, the ability of individuals to protect their "information privacy" is practically nonexistent. Information that was once kept on paper in filing cabinets is now on-line in computer databases. At the touch of a computer key, a complete stranger can conveniently access and compile from a variety of different sources a dossier of intimate, personal information about people without their knowledge. Perhaps more shocking is the current lack of legal recourse available to contest the nonconsensual use of personal data.
In this Note, the Author examines the currently loose constitutional and common-law protections and suggests strategies …