Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1,812 Full-Text Articles 1,666 Authors 606,797 Downloads 67 Institutions

All Articles in Computer Law

Faceted Search

1,812 full-text articles. Page 1 of 29.

Employee Electronic Communications In A Boundaryless World, Robert Sprague 2015 University of Wyoming

Employee Electronic Communications In A Boundaryless World, Robert Sprague

Robert Sprague

In 2007, the National Labor Relations Board decided that an employer could maintain an email communications policy that prohibits nonwork-related messages, even if those messages involve communications otherwise protected under the National Labor Relations Act. This article argues that such a proscription is outdated and archaic in light of today’s modern workplace filled with communications devices and systems that blur the distinction between work and personal life. The article explains that such a proscription causes employees to turn to personal communications options to discuss concerns that don’t necessarily involve work, but do involve the workplace; an environment with ...


Breaking Encryption And Gathering Data: International Law Applications, Grant Hodgson 2014 SelectedWorks

Breaking Encryption And Gathering Data: International Law Applications, Grant Hodgson

Grant Hodgson

The international legal principle of sovereignty applies to breaking encryption and provides guidance on when a state may break the encryption on data coming from other states. In general, breaking encryption on data that is traveling on the high seas or traveling within a state’s territory does not violate sovereignty. States must be careful, however, of communications that meet diplomacy protection requirements and must leave these communications alone if they are found. There are many methods used to defeat encryption and gather data including brute force attacks, man in the middle attacks, stealing cryptographic keys, taking advantage of predictable ...


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian 2014 SelectedWorks

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu 2014 University of San Diego

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets ...


Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun 2014 Maurer School of Law: Indiana University

Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun

Theses and Dissertations

This dissertation focuses on the issues of copyright enforcement and management. Especially, the research looks into how the digital technology reshapes the general perceptions and landscape of the copyright system in terms of online enforcement and management. Stepping into the digital age, the interaction between copyright holders and other parties, including online users and the ISPs, establishes two coexisting models—the right-holder-centric model and the cooperative model. Therefore, the dissertation analyzes which model is more appropriate and efficient with respect to online copyright enforcement and management.

As a matter of fact, the coexistences of two models provides copyright holders and ...


Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo 2014 University of Pennsylvania Law School

Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo

Faculty Scholarship

The D.C. Circuit’s January 2014 decision in Verizon v. FCC represented a major milestone in the debate over network neutrality that has dominated communications policy for the past decade. This article analyzes the implications of the D.C. Circuit’s ruling, beginning with a critique of the court’s ruling that section 706 of the Telecommunications Act of 1996 gave the Federal Communications Commission (FCC) the authority to mandate some form of network neutrality. Examination of the statute’s text, application of canons of construction such as ejusdem generis and noscitur a sociis, and a perusal of the ...


E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk 2014 Seattle University School of Law

E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk

Seattle University Law Review

Amazon’s main rival, Apple, went to great lengths and took major risks to enter the e-book market. Why did Apple simply choose not to compete on the merits of its product and brand equity (the iPad and iBookstore) as it does with its other products? Why did Apple decide not to continue to rely on its earlier success of situating its products differently in the market than other electronics and working hard to be different and cutting-edge with its e-book delivery? This Note argues that the combination of Amazon’s 90% market share, network externalities, and an innovative technology ...


Self, Privacy, And Power: Is It All Over?, Richard Warner 2014 Chicago-Kent College of Law

Self, Privacy, And Power: Is It All Over?, Richard Warner

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the ...


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner 2014 Chicago-Kent College of Law

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

Richard Warner

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the ...


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner 2014 Chicago-Kent College of Law

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the ...


International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek 2014 University of Georgia School of Law

International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn 2014 University of Georgia School of Law

Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn

Georgia Journal of International & Comparative Law

No abstract provided.


Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders 2014 University of Georgia School of Law

Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders

Georgia Journal of International & Comparative Law

No abstract provided.


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas 2014 Pace University

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside ...


Technology And Family Law Hearings, Ron S. Foster, Lianne M. Cihlar 2014 Western University

Technology And Family Law Hearings, Ron S. Foster, Lianne M. Cihlar

Western Journal of Legal Studies

Technological innovations are changing the practice of law. Lawyers need to be aware of both the advantages of new technologies and the novel concerns that arise in the digital age. This article discusses eight issues that lawyers should be aware of with respect to technological advances within the legal field: (1) cloud technology, (2) the privacy implications that arise from new technology, (3) data storage technology, (4) electronic trials and hearings, (5) demonstrative evidence, (6) digital exhibit books, (7) internet searches and witnesses, and (8) video conference testimony.


Privacy And Security In The Cloud: Some Realism About Technical Solutions To Transnational Surveillance In The Post-Snowden Era, Joris van Hoboken, Ira S. Rubinstein 2014 NELLCO

Privacy And Security In The Cloud: Some Realism About Technical Solutions To Transnational Surveillance In The Post-Snowden Era, Joris Van Hoboken, Ira S. Rubinstein

New York University Public Law and Legal Theory Working Papers

This Article considers the organizational and technical responses of cloud computing companies in response to the Snowden leaks, which revealed the extent of NSA surveillance of foreign citizens whose data was held by U.S. based cloud services. The industry has sought to restore trust in their services by stepping up their efforts to protect the privacy and confidentiality interests of their customers against what we call “transnational surveillance.” While the legal debate about the proper legal standards for such surveillance is ongoing, the article focuses on two broad classes of technical and organizational responses and their interaction with the ...


Linking To Liability: When Linking To Leaked Films, Scripts, And Television Shows Is Copyright Infringement,, Kimberlianne Podlas 2014 SelectedWorks

Linking To Liability: When Linking To Leaked Films, Scripts, And Television Shows Is Copyright Infringement,, Kimberlianne Podlas

Kimberlianne Podlas

This article examines the problem of movies, scripts, and other entertainment works being leaked online, and whether news and fan sites that link to such works are liable for copyright infringement. In the past few months alone, The Expendables 3, next week’s Doctor Who Series 8 premier, and Quentin Tarantino’s The Hateful Eight screenplay have all been leaked online. Internet leaks are uniquely problematic, as it is often not possible to identify the source of leak, traditional contract and tort remedies may not apply, or the greatest harm may be due to third parties’ linking to the work ...


The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden 2014 SelectedWorks

The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden

Rob Frieden

This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable ...


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden 2014 SelectedWorks

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format.

This paper assesses whether and how Internet Service Providers (“ISPs”) can offer ...


The Replicator And The First Amendment, Kyle Langvardt 2014 SelectedWorks

The Replicator And The First Amendment, Kyle Langvardt

Kyle Langvardt

As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights.

This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first ...


Digital Commons powered by bepress