Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

6,084 Full-Text Articles 5,026 Authors 5,313,269 Downloads 158 Institutions

All Articles in Internet Law

Faceted Search

6,084 full-text articles. Page 111 of 189.

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim 2015 UIC School of Law

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim

UIC John Marshall Journal of Information Technology & Privacy Law

To understand the laws of a foreign nation, one must first under-stand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not …


Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015), 2015 UIC School of Law

Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin 2015 UIC School of Law

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015), 2015 UIC School of Law

Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015), 2015 UIC School of Law

Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer 2015 UIC School of Law

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser 2015 UIC School of Law

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Comments: Judicial Messaging: Remote Texter Liability As Public Education, Morgan Gough 2015 University of Baltimore School of Law

Comments: Judicial Messaging: Remote Texter Liability As Public Education, Morgan Gough

University of Baltimore Law Review

No abstract provided.


Cover Letter, Laura M. Bedson 2015 University of Richmond

Cover Letter, Laura M. Bedson

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the Twenty-First Volume. As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. From the Journal’s inception in 1995, JOLT has strived to be a step ahead of these laws in an effort to help shape the emerging legal landscape. Additionally, JOLT recognizes the practical benefit that many of its articles have on legal professionals and we publish articles with this goal in mind. The following articles …


Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey 2015 University of Richmond

Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey

Richmond Journal of Law & Technology

Lawyers and technology have an uneasy relationship. Although some lawyers are early adapters, others take pride in ignoring technology because they believe it is alien to the practice of law. As Jody R. Westby observed, lawyers confronted with technology and security issues tend to have their “eyes glaze over” and “want to call in their ‘IT guy’ and go back to work.” But this technophobic attitude may no longer just be harmless conservatism. In the world of growing security risks, ignorance of technology may lead to violations of lawyers’ fundamental ethical duties of competence and confidentiality.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer 2015 University of Richmond

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Richmond Journal of Law & Technology

The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.


Cover Letter, Laura M. Bedson 2015 University of Richmond

Cover Letter, Laura M. Bedson

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its fourth and final issue of the Twenty-First Volume. At its inception in 1995 JOLT became the first law review to be published exclusively online. From this moment on, the Journal has continued to set trends in the legal scholarship world. As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. The articles in this fourth issue are no exception. Each of the following articles present exciting discussions on cutting-edge areas of …


Personal Jurisdiction And The "Interwebs", Alan M. Trammell, Derek E. Bambauer 2015 Washington and Lee University School of Law

Personal Jurisdiction And The "Interwebs", Alan M. Trammell, Derek E. Bambauer

Scholarly Articles

For nearly twenty years, lower courts and scholars have struggled to figure out how personal jurisdiction doctrine should apply in the Internet age. When does virtual conduct make someone amenable to jurisdiction in any particular forum? The classic but largely discredited response by courts has been to give primary consideration to a commercial Web site’s interactivity. That approach distorts the current doctrine and is divorced from coherent jurisdictional principles. Moreover, scholars have not yielded satisfying answers. They typically have argued either that the Internet is thoroughly exceptional and requires its own rules, or that it is largely unexceptional and can …


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher 2015 University of Richmond

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

Law Student Publications

This comment considers recent cases interpreting the Digital Millennium Copyright Act ("DMCA") and urges Congress to expand the protection of service providers through the DMCA safe harbors. The comment proceeds in six parts. Part I explains contributory and vicarious liability, the applicable sections of the DMCA to this comment, and the fair use doctrine. Part II provides a brief overview of video-sharing websites. It further observes the impact that video-sharing websites have had on digital media, focusing on the impact on the music industry. Part III looks at the recent cases interpreting the DMCA's red flag exception to safe harbor …


From Silicon Valley To The Kitchen Table: Innovative Online Agriculture & Food Start-Ups And The Law, Matthew A. Forcum 2015 University of Kentucky

From Silicon Valley To The Kitchen Table: Innovative Online Agriculture & Food Start-Ups And The Law, Matthew A. Forcum

Kentucky Journal of Equine, Agriculture, & Natural Resources Law

No abstract provided.


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher 2015 University of Richmond School of Law

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

University of Richmond Law Review

No abstract provided.


Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle Keats Citron 2015 Case Western Reserve University School of Law

Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle Keats Citron

Journal of Law, Technology, & the Internet

"This short piece will take a step back and give an overhead view of the problem of cyber harassment and the destructive impact it can have on victims’ lives. Then, it will address about what the law can do to combat online harassment and how a legal agenda can be reconciled with the First Amendment. Finally, it will turn to recent changes in social media companies’ treatment of online abuse and what that might mean for our system of free expression." Symposium Article.


More Harm Than Good? Why Schools Who Take A Zero-Tolerance Stance On Cyberbullying Cause More Problems Than Solutions, Sydney L. Brunecz 2015 Case Western Reserve University School of Law

More Harm Than Good? Why Schools Who Take A Zero-Tolerance Stance On Cyberbullying Cause More Problems Than Solutions, Sydney L. Brunecz

Journal of Law, Technology, & the Internet

"Cyberbullying has become an epidemic in today’s society. Cyberbullying has escalated so much that some victims commit suicide in order to escape their tormentors. Increased media coverage of these suicides has led the public to demand legislative action. Although no federal law exists, state legislation has been enacted to prevent bullying and cyberbullying. Most states delegate this task to public schools that respond by implementing zero- tolerance policies. Zero-tolerance policies against bullying and cyberbullying can impinge on many student rights, including speech protected by the First Amendment. Well intentioned zero tolerance policies may infringe on Constitutionally protected free speech, and …


The Fda Guidance Document For Medical Mobile Apps And Its Impact On Innovation: Bringing The Promise Of A New Way To Look At Medicine Closer, Or Pushing It Further?, Ioana Ciopraga 2015 Case Western Reserve University School of Law

The Fda Guidance Document For Medical Mobile Apps And Its Impact On Innovation: Bringing The Promise Of A New Way To Look At Medicine Closer, Or Pushing It Further?, Ioana Ciopraga

Journal of Law, Technology, & the Internet

"This Note critiques the guidance document released by the Food and Drug Administration (“FDA”) in connection with the medical mobile apps it intends to regulate and the regulations that govern medical mobile apps. Specifically, the main argument of this Note is that, while the document is clearly a step in the right direction, significantly more guidance, focused on the characteristics of this new field, such as the rapid change of mobile technology, and on the transformational impact on healthcare of health IT in general and mHealth in particular, should follow soon. Part I provides an overview of the guidance document, …


The Right To Be Forgotten: A Step In The Right Direction For Cyberspace Law And Policy, Lyndsay Cook 2015 Case Western Reserve University School of Law

The Right To Be Forgotten: A Step In The Right Direction For Cyberspace Law And Policy, Lyndsay Cook

Journal of Law, Technology, & the Internet

This comment examines a case referred to the Court of Justice of the European Union (“EU”) on “a Spanish citizen’s complaint against Google Spain and Google Inc.. arguing that an auction notice of his repossessed home on Google’s search results, violated his privacy rights because the repossession proceeding had been resolved long ago, and was no longer relevant. The EU court was asked to decide whether an individual has the right to request that his or her personal data be removed from accessibility via a search engine (‘the right to be forgotten’). In a landmark decision, the EU court held …


Digital Commons powered by bepress