Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,081 Full-Text Articles 3,297 Authors 2,186,894 Downloads 128 Institutions

All Articles in Internet Law

Faceted Search

4,081 full-text articles. Page 4 of 104.

Contents, 2018 The Catholic University of America, Columbus School of Law

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat 2018 The Catholic University of America, Columbus School of Law

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in ...


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy 2018 Catholic University of America (Student)

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of ...


Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett 2018 Duke Law

Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett

Duke Law & Technology Review

Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection. Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success ...


Prophylactic Merger Policy, Herbert J. Hovenkamp 2018 University of Pennsylvania Law School

Prophylactic Merger Policy, Herbert J. Hovenkamp

Faculty Scholarship

An important purpose of the antitrust merger law is to arrest certain anticompetitive practices or outcomes in their “incipiency.” Many Clayton Act decisions involving both mergers and other practices had recognized the idea as early as the 1920s. In Brown Shoe the Supreme Court doubled down on the idea, attributing to Congress a concern about a “rising tide of economic concentration” that must be halted “at its outset and before it gathered momentum.” The Supreme Court did not explain why an incipiency test was needed to address this particular problem. Once structural thresholds for identifying problematic mergers are identified there ...


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


The Regulation Of Digital Trade In The Tpp: New Trade Rules For The Digital Age, Henry S. GAO 2018 Singapore Management University

The Regulation Of Digital Trade In The Tpp: New Trade Rules For The Digital Age, Henry S. Gao

Research Collection School Of Law

With the rapid development of the internet, electronic commerce is also gaining importance in international trade. However, the rules governing digital trade is still largely lacking. While WTO Members have been discussing the regulation of electronic commerce since the last century, little progress has been made. Instead, most of the progresses are made in various free trade agreements, especially those sponsored by the United States. This article starts with a review of the efforts to regulate e-commerce in the WTO, as well as what the pre-TPP US FTAs have achieved so far, followed by a critical appraisal of the achievements ...


Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall 2018 John Marshall Law School

Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall

The John Marshall Journal of Information Technology & Privacy Law

Social media is about sharing information. If you are a parent, often the tendency is to relate every aspect of your children’s lives. Most of the time, children do not consent to postings about them and will have a permanent digital shadow created by their parents that follows them the rest of their lives. The purpose of this article is to analyze the current status and potential future of children’s online privacy from a comparative legal approach, highlighting recent case law in the United Kingdom, which is trending toward carving out special privacy rights for children. This contrasts ...


Nothing Personal, It’S Just Business: How Google’S Course Of Business Operates At The Expense Of Consumer Privacy, 33 J. Marshall J. Info. Tech. & Privacy L. 187 (2018), Kayla McKinnon 2018 John Marshall Law School

Nothing Personal, It’S Just Business: How Google’S Course Of Business Operates At The Expense Of Consumer Privacy, 33 J. Marshall J. Info. Tech. & Privacy L. 187 (2018), Kayla Mckinnon

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Are “Evan’S Law” And The Textalyzer Immediate Solutions To Today’S Rapid Changes In Technology Or Encroachments On Drivers’ Privacy Rights?, 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018), Aggie Baumert 2018 John Marshall Law School

Are “Evan’S Law” And The Textalyzer Immediate Solutions To Today’S Rapid Changes In Technology Or Encroachments On Drivers’ Privacy Rights?, 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018), Aggie Baumert

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Table Of Contents, 2018 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui 2018 Catholic University of America (Student)

International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui

Catholic University Journal of Law and Technology

Currently large email service providers, such as Google, Microsoft and Yahoo are refusing to comply with warrants issued under the Secured Communications Act (“SCA”) because in many instances, the requested information may be stored in servers located abroad. In the dismissed Supreme Court case, In re Warrant to Search a Certain E-Mail Account Controlled & Maintained by Microsoft Corporation, the Supreme Court should have addressed whether an internet service provider must comply with a warrant issued under the SCA when the requested information is stored in a foreign country and whether enforcement of these warrants would be an impermissible extraterritorial application ...


Shielding Children From Pornography By Incentivizing Private Choice, Karen Hinkley 2018 Washington University School of Law

Shielding Children From Pornography By Incentivizing Private Choice, Karen Hinkley

Washington University Law Review

In March of 2016, Playboy stopped publishing images of naked women in their magazines. According to the company’s chief executive, Scott Flanders, “[the] battle has been fought and won . . . . You’re now one click away from every sex act imaginable for free. And so it’s just passé at this juncture.” In stark contrast to the world of past generations, “[n]ow every teenage boy has an Internet-connected phone . . . . Pornographic magazines, even those as storied as Playboy, have lost their shock value, their commercial value and their cultural relevance.”

One consequence of modern technological advancements is that online pornography ...


Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich 2018 Brooklyn Law School

Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich

Brooklyn Law Review

In recent years, “home grown” terrorists—individuals inspired to violence after watching terrorist videos online—have been responsible for devastating attacks in the United States and across Europe. Such terrorist propaganda falls outside the realm of the First Amendment’s protection because it has been proven to indoctrinate attackers, thus inciting imminent lawless action. Seizing on this, victims’ families have brought suits alleging that social media platforms, including Twitter, Facebook, and Google, provided material support to terrorists in violation of the Anti-Terrorism Act (ATA). The Communications Decency Act (CDA), however, has served as an impenetrable shield against these claims, protecting ...


What A Technical Services Librarian Wants Their Library Director To Know, Georgia Briscoe 2018 University of Colorado Law School

What A Technical Services Librarian Wants Their Library Director To Know, Georgia Briscoe

Articles

Promoting the value of technical services librarians in the digital age.


Territorialization Of The Internet Domain Name System, Marketa Trimble 2018 University of Nevada, Las Vegas -- William S. Boyd School of Law

Territorialization Of The Internet Domain Name System, Marketa Trimble

Scholarly Works

A territorialization of the internet – the linking of the internet to physical geography – is a growing trend. Internet users have become accustomed to the conveniences of localized advertising, have enjoyed location-based services, and have witnessed an increasing use of geolocation and geoblocking tools by service and content providers who – for various reasons – either allow or block access to internet content based on users’ physical locations. This article analyzes whether, and if so how, the territorialization trend has affected the internet Domain Name System (“DNS”). As a hallmark of cyberspace governance that aimed to be detached from the territoriallypartitioned governance of ...


There's An "App" For That: Developing Online Dispute Resolution To Empower Economic Development, Amy J. Schmitz 2018 University of Missouri School of Law

There's An "App" For That: Developing Online Dispute Resolution To Empower Economic Development, Amy J. Schmitz

Faculty Publications

Traditionally, litigation has been the norm for resolving disputes. It takes place in a public forum and face-to-face. In a global economy, however, such public and face-to-face dispute resolution is not feasible. This is especially true with cross-border purchases through e-commerce. E-commerce requires more efficient and less litigious remedy systems that allow consumers to obtain remedies on their purchases without the cost and travel associated with traditional face-to-face procedures. This has led to development of online dispute resolution (“ODR”) processes, especially with respect to business-to-consumer contracts. Accordingly, scholarship and policy papers have advanced ODR for the benefit of consumers. What ...


Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley 2018 Columbia Law School

Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley

Faculty Scholarship

Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results ...


A Blueprint For Online Dispute Resolution System Design, Amy J. Schmitz 2018 University of Missouri School of Law

A Blueprint For Online Dispute Resolution System Design, Amy J. Schmitz

Faculty Publications

A great deal of discussion focuses on how arbitration and similar private dispute resolution harms consumers, and how businesses seek ways to avoid helping consumers. It is often assumed that companies and consumers are on opposing “teams.” In reality, however, consumers and companies enjoy more commonalities than contradictions. Both benefit when deals go well and disputes are resolved quickly and cheaply. The problem is that face-to-face dispute resolution can be costly in terms of time and money. Furthermore, getting lawyers involved may inspire gamesmanship and adversarial antics aimed to protect one’s reputation for staying “strong” and refusing to settle ...


Black Letter Law, Dan Svantesson 2017 Bond University

Black Letter Law, Dan Svantesson

Law Faculty Publications

[Extract] The topic of how well the tool of black letter law works in the Internet law setting is of course huge, and associated with obvious definitional challenges. To point to but one; how ought we define “black letter law” in our present legal culture where legal rules necessarily must take account of the technical reality in which they operate? Indeed, given Wikipedia’s definition of “black letter laws” as laws that are “the well-established technical legal rules that are no longer subject to reasonable dispute,” one may legitimately question whether we can speak of any real black letter law ...


Digital Commons powered by bepress