Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4222 Full-Text Articles 3303 Authors 2186894 Downloads 122 Institutions

All Articles in Internet Law

Faceted Search

4222 full-text articles. Page 106 of 111.

Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn 2010 John Marshall Law School

Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn

The John Marshall Journal of Information Technology & Privacy Law

This comment examines the primary arguments for continuing to prohibit the federal government from establishing a federal firearm registry. The Background section of this comment surveys the development of laws restricting firearm sales and requiring federal firearm licensed dealers to maintain pertinent records. This section also describes how, if enacted, the Blair Holt’s Firearm Licensing and Registration Act of 2009, known as H.R. 45, would, through the creation of federal firearm registry, expose electronic records of private citizens’ firearm purchases and ownership to possible government abuse. The Analysis section examines why H.R. 45 is not the correct ...


The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan 2010 John Marshall Law School

The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan

The John Marshall Journal of Information Technology & Privacy Law

While there is a growing body of literature dealing with the General Public License (“GPL”), the potential viral effects of the GPL do not appear to have been analyzed in a detailed technical manner. This paper will attempt to demonstrate that a proper legal analysis of the viral effects of the GPL is dependent on a detailed technical understanding of the specific mechanisms used for each type of program-to-program interaction. Once these technical mechanisms are properly understood it will then be possible to identify the applicable copyright law needed to assess the viral effects of the GPL.


Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink 2010 John Marshall Law School

Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink

The John Marshall Journal of Information Technology & Privacy Law

Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school ...


Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles 2010 John Marshall Law School

Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles

The John Marshall Journal of Information Technology & Privacy Law

Cyberwarfare is a very real threat to the security of the nation. Yet there is confusion and disagreement as to which government body is most appropriate to assume the cyberwar mission. The Strategy to Secure Cyberspace treats the threat primarily as a criminal issue, and assigns responsibility to the Department of Homeland Security. The National Defense Strategy implies that cyberwarfare is a military issue. Both documents may be correct, depending on the case. The cyberspace terrain transcends boundaries, quickly blurring the line between civil or criminal action and an act of war, leaving the government with the issue of assigning ...


Interpretation & The Internet, 28 J. Marshall J. Computer & Info. L. 251 (2010), Cameron Hutchison 2010 John Marshall Law School

Interpretation & The Internet, 28 J. Marshall J. Computer & Info. L. 251 (2010), Cameron Hutchison

The John Marshall Journal of Information Technology & Privacy Law

Twenty years after the advent of the Internet, the revolutionary nature of the technology can no longer be in doubt. In spite of the ‘differentness” of the Internet, courts have proven adept at adapting extant law to the features and demands of this new technology. This paper will chronicle the differences between the Internet and other technologies which might, depending on the legal issue, justify the exclusion of the Internet from established rules on the basis of analogical reasoning. Two approaches to legal interpretation – literalism and purposivism—will be discussed in light of this new technology, with an explanation as ...


Internet Filtering: The Ineffectiveness Of Wto Remedies And The Availability Of Alternative Tort Remedies, 28 J. Marshall J. Computer & Info. L. 273 (2010), Kristen A. Knapp 2010 John Marshall Law School

Internet Filtering: The Ineffectiveness Of Wto Remedies And The Availability Of Alternative Tort Remedies, 28 J. Marshall J. Computer & Info. L. 273 (2010), Kristen A. Knapp

The John Marshall Journal of Information Technology & Privacy Law

Empirical studies have shown that government Internet filtering is increasing worldwide. Internet Service Providers have progressively begun to take on filtering responsibility in a quasi-governmental capacity. As filtering has increased, some have begun to question whether Internet filtering might violate WTO commitments under the General Agreement on Trade in Services (“GATS Agreement”). This paper will provide technical background on how Internet filtering is accomplished in practice, and explain the GATS Agreement that was held to govern Internet filtering in the U.S.-Gambling Services decision. This paper will further survey the current range of U.S. filtering actions and detail ...


Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener 2010 John Marshall Law School

Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener

The John Marshall Journal of Information Technology & Privacy Law

Heaping scholarship fills the academic print and online press about where legal scholars should publish and how to have one’s paper accepted for publication. But there is scarce writing about the contractual relationship between the law journal and the author of an accepted paper. This may be due in part to broadly misconstrued or ignored publication agrees, or perhaps that the business relationship is unworthy of scholarly attention. Regardless, this paper introduces a pragmatist’s perspective on evaluating and revising publication agreements, and informs student editors how publication agreements accomplish a journal’s objectives, based on current copyright law ...


Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act, 28 J. Marshall J. Computer & Info. L. 185 (2010), Richard G. Kunkel 2010 John Marshall Law School

Protecting Consumers From Spyware: A Proposed Consumer Digital Trespass Act, 28 J. Marshall J. Computer & Info. L. 185 (2010), Richard G. Kunkel

The John Marshall Journal of Information Technology & Privacy Law

“Spyware” is a broad term used to describe software that resides on a user’s computer and monitors the user’s online behavior. Though spyware may be helpful or benign, it can also be used for malicious purposes, commonly classified as “malware”. Consumers, who lack sophistication to avoid unintentionally downloading spyware, are especially vulnerable to the threat of malware. In lieu of this threat, it is important to understand the nature and scope of spyware problems affecting consumers. The paper will discuss how common law tort theories of trespass and trespass to chattel are difficult to apply to spyware, and ...


The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 28 J. Marshall J. Computer & Info. L. 119 (2010), Kelly Foss, Vince Lombardozzi, Jared Palmer 2010 John Marshall Law School

The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 28 J. Marshall J. Computer & Info. L. 119 (2010), Kelly Foss, Vince Lombardozzi, Jared Palmer

The John Marshall Journal of Information Technology & Privacy Law

The circuit court erred when it granted summary judgment in favor of MarshCODE because Mr. Murphy has demonstrated facts to support the elements of the (1) defamation, (2) false light invasion of privacy, and (3) breach of contract claims. First, Mr. Murphy has provided facts to support the defamation claim. MarshCODE made a false and defamatory statement about Mr. Murphy when it told Ms. Who that he was her father. Because this matter concerns Mr. Murphy's private life, a negligence standard applies rather than the First Amendment's actual malice standard. Mr. Murphy has demonstrated that MarshCODE acted either ...


The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Respondent, 28 J. Marshall J. Computer & Info. L. 151 (2010), Kimberly Hodgman, Jody Rodenberg, Erin Tyler 2010 John Marshall Law School

The Twenty-Ninth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Respondent, 28 J. Marshall J. Computer & Info. L. 151 (2010), Kimberly Hodgman, Jody Rodenberg, Erin Tyler

The John Marshall Journal of Information Technology & Privacy Law

The First District Court of Appeals properly affirmed summary judgment on behalf of MarshCODE because Appellant failed to raise a genuine issue of material fact on his defamation claim. First, MarshCODE's accidental disclosure of information, which implied that Appellant participated in premarital sex or had a homosexual child, was not defamatory because an average person would not lower his estimation or be deterred from associating with Appellant based on such a statement. Second, no publication was made because MarshCODE did not act with negligence and was unaware of the program malfunction that resulted in the release of the information ...


Everything In Its Right Place: Social Cooperation And Artist Compensation, Leah Belsky, Byron Kahr, Max Berkelhammer, Yochai Benkler 2010 Yale Law School Information Society Project

Everything In Its Right Place: Social Cooperation And Artist Compensation, Leah Belsky, Byron Kahr, Max Berkelhammer, Yochai Benkler

Michigan Telecommunications and Technology Law Review

The music industry's crisis response to the Internet has been the primary driver of U.S. copyright policy for over a decade. The core institutional response has been to increase the scope of copyright and the use of litigation, prosecution, and technical control mechanisms for its enforcement. The assumption driving these efforts has been that without heavily-enforced copyright, artists will not be able to make a living from their art. Throughout this period artists have been experimenting with approaches that do not rely on technological or legal enforcement, but on constructing web-based business models that engage fans and rely ...


Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble 2010 Yale Law School

Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble

Michigan Telecommunications and Technology Law Review

The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers ...


Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan 2010 University of Michigan Law School

Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan

Michigan Telecommunications and Technology Law Review

Google is the world's most preferred search engine, with an audience share of eighty percent of Internet users worldwide. With so many people browsing its search results, Google is a natural advertising vehicle, and it has exploited this quality to become one of the most profitable Internet companies in U.S. history. However, success has not come without controversy, and one of the most significant concerns Google AdWords, which displays keyword-triggered ads and sponsored links alongside non-sponsored search results. AdWords has come under attack in the United States and in the European Union ("EU") for its role in trademark ...


Cell Phone - A "Weapon" Of Mass Discretion, Mark L. Mayakis 2010 Campbell University School of Law

Cell Phone - A "Weapon" Of Mass Discretion, Mark L. Mayakis

Campbell Law Review

Initially, this Comment will discuss the development of the search incident to arrest exception from the warrant requirement and how this exception has been generally defined and judicially interpreted. The next section will include a discussion of how the search incident to arrest exception has been applied to searches of the content stored within pagers. This Comment will then explain how modern cell phones have created difficulties for courts applying the search incident to arrest exception, causing these courts to diverge down two different lines of reasoning, ultimately reaching opposite conclusions. Finally, this Comment will reiterate the necessity that the ...


Discriminatory Housing Advertisements On-Line: Lessons From Craigslist, Rigel C. Oliveri 2010 University of Missouri School of Law

Discriminatory Housing Advertisements On-Line: Lessons From Craigslist, Rigel C. Oliveri

Faculty Publications

The Fair Housing Act makes it illegal to publish discriminatory housing advertisements. This has long been applied to newspapers, which have effectively screened all discriminatory housing ads from sight. However, in 1996 Congress created a loophole when it immunized website operators from liability for the content posted to their sites by third parties. Without publisher liability, websites have no incentive to screen out discriminatory housing ads. The result is that such ads are proliferating in cyberspace.While this situation is problematic from a fair housing standpoint, it presents a valuable opportunity. For the first time in a generation discriminatory housing ...


Remixing Lessig (Reviewing Lawrence Lessig, Remix (2008)), Edward Lee 2010 IIT Chicago-Kent College of Law

Remixing Lessig (Reviewing Lawrence Lessig, Remix (2008)), Edward Lee

All Faculty Scholarship

This book review analyzes - and remixes - Lawrence Lessig's last copyright-related book, "Remix." It takes the central ideas, including some quotations, from Remix, and transforms them with some new examples and commentary of my own. Part I summarizes and critiques Lessig’s discussion of (1) the remix and read-write (RW) culture, and (2) its relationship to the sharing, commercial, and hybrid economies. Part II discusses some of Lessig’s reform proposals for our copyright system to foster a remix culture.


Not Undertaking The Almost-Impossible Task: The 1961 Wire Act’S Development, Initial Applications, And Ultimate Purpose, David G. Schwartz 2010 University of Nevada, Las Vegas

Not Undertaking The Almost-Impossible Task: The 1961 Wire Act’S Development, Initial Applications, And Ultimate Purpose, David G. Schwartz

Library Faculty Publications

For a Camelot-era piece of legislation, the Wire Act has a long and unintended shadow. Used haltingly in the 1960s, when the Wire Act failed to deliver the death blow to organized crime, 1970’s Racketeer-Influenced and Corrupt Organizations Act (RICO) became a far better weapon against the mob. Yet starting in the 1990s, the Wire Act enjoyed a second life, when the Justice Department used to it prosecute operators of online betting Web sites that, headquartered in jurisdictions where such businesses were legal, took bets from American citizens. The legislative history of the Wire Act, however, suggests that it ...


Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs 2010 Tilburg Law and Economic Center

Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs

Federal Communications Law Journal

Network neutrality has become a contentious issue both in Europe and the United States. Regulators on both sides of the Atlantic face digital divides in their society, and are confronted with potentially conflicting policy goals-to incentivize private investment in next-generation broadband while maintaining "neutral" and competitive broadband networks.

This Article compares nascent American and European network neutrality policy in terms of regulatory error costs. Emerging markets, such as broadband, are more likely to be affected by regulatory errors, and these errors have graver consequences in emerging markets than in regular markets. U.S. telecommunications policy traditionally has advanced a trial-and-error ...


Creating Effective Broadband Network Regulation, Daniel L. Brenner 2010 Stanford Law School

Creating Effective Broadband Network Regulation, Daniel L. Brenner

Federal Communications Law Journal

The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for "network neutrality" or "nondiscrimination" assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article's chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates.

The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the ...


Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker 2010 Federal Communications Commission

Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker

Federal Communications Law Journal

Comprehensive and long-term spectrum reform can play a critical role in the FCC's development of a National Broadband Plan and in its consideration of Open Internet rules. More efficient and intensive use of the nation's spectrum resources would help provide a path to greater broadband deployment, competition and innovation for all consumers. Wireless and mobile technologies hold great promise to offer consumers new services to complement, extend, or even replace existing broadband offerings. A comprehensive review of the nation's spectrum policy is, therefore, necessary to ensure that wireless and mobile broadband services are not hamstrung by outdated ...


Digital Commons powered by bepress