Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,081 Full-Text Articles 3,297 Authors 2,186,894 Downloads 128 Institutions

All Articles in Internet Law

Faceted Search

4,081 full-text articles. Page 5 of 104.

Slipping Through The Cracks: How Digital Music Streaming Cuts Corners On Artists’ Royalty Revenues Globally, Frances Lewis 2017 Brooklyn Law School

Slipping Through The Cracks: How Digital Music Streaming Cuts Corners On Artists’ Royalty Revenues Globally, Frances Lewis

Brooklyn Journal of International Law

At a time when the digital distribution of music is dominating the music industry, there are more music consumers than ever. This makes it vitally important for performing artists to receive the credit they are due. An inherent problem in music’s digital distribution market is that music streaming companies often fail to acquire proper licenses to expand their music libraries faster than their competitors. Performing artists who may not have the same income stream as their A-list counterparts often cannot bear the cost of litigation to pursue uncredited royalties. The U.S. class action model provides performing artists with ...


Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge 2017 Brooklyn Law School

Video Review; Routine Data Sharing Practices Place Video-Streaming Providers In The Crosshairs Of The Video Privacy Protection Act, Jeremiah P. Ledwidge

Brooklyn Journal of Corporate, Financial & Commercial Law

The Video Privacy Protection Act of 1988 (VPPA) creates a private cause of action for any consumer whose personally identifiable information has been disclosed by a video tape service provider to a third party. The rapid growth of media companies that provide free internet-based video-streaming services, and the technologically-advanced advertising methods employed to fund this business model, have created uncertainty regarding the specific consumer segments the VPPA is designed to protect. The extensive role that third-party providers play in the collection, analysis, and segmentation of user data in the personalized advertising process raises justifiable privacy concerns for consumers. Recent VPPA ...


Something's Gotta Give: Origin-Based E-Commerce Sales Tax, Juliana Frenkel 2017 Brooklyn Law School

Something's Gotta Give: Origin-Based E-Commerce Sales Tax, Juliana Frenkel

Brooklyn Journal of Corporate, Financial & Commercial Law

How to tax interstate online purchases is a frequently debated and contentious topic in the business and tax arena. There are numerous parties affected when a transaction occurs and each affected party would like a taxation policy that benefits its own economic interests, without regard for others. Neither the legislative nor the judicial branch has successfully resolved this e-commerce taxation issue. With the growing need for tax revenue, it is prudent for Congress to finally resolve this circuit split and agree on a unifying Online Sales Tax Law. As opposed to the vast majority of proposals pending in Congress, this ...


Cybersecurity And Tax Information: A Vicious Cycle?, Diane M. Ring 2017 Boston College Law School

Cybersecurity And Tax Information: A Vicious Cycle?, Diane M. Ring

Boston College Law School Faculty Papers

A review of Michael Hatfield, Cybersecurity and Tax Reform, 93 Ind. L.J., scheduled to be published in Spring 2018.


Piracy, Policy, And Pandora: Outdated Copyright In A Digital World, Stephanie Caress 2017 Chapman University

Piracy, Policy, And Pandora: Outdated Copyright In A Digital World, Stephanie Caress

Student Research Day Abstracts and Posters

This project examines how current copyright laws and digital distribution practices in music can be improved for both the creator and the consumer. The laws that govern our digital atmosphere, and thus a large portion of music distribution, are outdated and cause a wide variety of problems for both artists and fans. To create a comprehensive picture and establish the scope of this problem, I start by outlining the process a song goes through from when it is written to when it is in the hands, or rather ears, of listeners. From there, copyright laws are entwined with this process ...


"The Exclusive Right To Their Writings": Copyright And Control In The Digital Age, Jane C. Ginsburg 2017 University of Maine School of Law

"The Exclusive Right To Their Writings": Copyright And Control In The Digital Age, Jane C. Ginsburg

Maine Law Review

The recent coincidence of new technology and new legislation in the United States may have enhanced the ability of U.S. copyright owners to wield electronic protective measures to control the exploitation of their works. The legislation, which reinforces the technology, has led many to perceive and to deplore a resulting imbalance between copyright owners and the copyright-using public. Critics assert that the goals of copyright law have never been, and should not now become, to grant “control” over works of authorship. Instead, copyright should accord certain limited rights over some kinds of exploitations. Economic incentives to create may be ...


The Unicorn Governance Trap, Renee M. Jones 2017 Boston College Law School

The Unicorn Governance Trap, Renee M. Jones

Boston College Law School Faculty Papers

The recent trend of large-scale start-up companies delaying an IPO creates a new kind of corporate governance problem. The prevalence of “unicorns” – privately held companies with market valuations of $1 billion or more – means the disciplinary mechanisms on which investors traditionally relied no longer function to prevent misconduct or mismanagement by unicorn founders. High profile frauds by unicorns like Zenefits and Theranos, and the recent travails of Uber highlight the need to rethink unicorn governance structure. These burgeoning controversies call for reconsideration of legal reforms that allow unicorns to remain for protracted periods in an ill-defined limbo between private and ...


An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short 2017 University of Maine School of Law

An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short

Maine Law Review

The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article ...


Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky 2017 University of Maine School of Law

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to ...


Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen 2017 University of Maine School of Law

Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen

Maine Law Review

The subject matter we are going to talk about is variously named and the words have some resonances of importance. I am going to use the phrase “Free Software” to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo 2017 University of Pennsylvania Law School

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by ...


Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden 2017 The University of Akron

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden

Akron Law Review

In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.


Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein 2017 University of Maine School of Law

Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein

Maine Law Review

For those within the information technology (IT) industry, the phrase “open source” has been as prominent at water cooler and boardroom discussions over the last several years as the phrase “out source.” Open source is at once a software development model, a business model, a social movement, and a philosophy that has recently garnered attention from outside of the IT sphere. As such, the topic has become increasingly fertile ground for academic scholarship from several disciplines. Economists, legal academics and practitioners, computer engineers, and social commentators have offered their varying perspectives on open source software. Whether or not this attention ...


New Wine, Old Wineskins: Emerging Issues In Internet-Based Personal Jurisdiction, Jeffrey Hunter Moon, Esq. 2017 St. John's University School of Law

New Wine, Old Wineskins: Emerging Issues In Internet-Based Personal Jurisdiction, Jeffrey Hunter Moon, Esq.

The Catholic Lawyer

No abstract provided.


You Can Run But You Can't Hide: Cell Phone Tracking Data Do Not Receive Fourth Amendment Protection, Merissa Sabol 2017 Southern Methodist University

You Can Run But You Can't Hide: Cell Phone Tracking Data Do Not Receive Fourth Amendment Protection, Merissa Sabol

Science and Technology Law Review

No abstract provided.


Vmg Salsoul, L.L.C. V. Ciccone: The Ninth Circuit Strikes A Pose, Applying The De Minimis Exception To Music Sampling, Jacob Quinn 2017 Southern Methodist University

Vmg Salsoul, L.L.C. V. Ciccone: The Ninth Circuit Strikes A Pose, Applying The De Minimis Exception To Music Sampling, Jacob Quinn

Science and Technology Law Review

No abstract provided.


Is Your Roommate A Felon? Considering The Effect Of Criminalizing Password Sharing In Nosal Ii, London Ryyanen England 2017 Southern Methodist University

Is Your Roommate A Felon? Considering The Effect Of Criminalizing Password Sharing In Nosal Ii, London Ryyanen England

Science and Technology Law Review

No abstract provided.


Lost Esi Under The Federal Rules Of Civil Procedure, Jeffrey A. Parness 2017 Northern Illinois University College of Law

Lost Esi Under The Federal Rules Of Civil Procedure, Jeffrey A. Parness

Science and Technology Law Review

Current Issue

Volume 20, Number 1 – The Privacy, Probability, and Political Pitfalls of Universal DNA Collection

Meghan J. Ryan 20 SMU Sci. & Tech. L. Rev. 3 Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered as the “gold standard” in criminal cases because, unlike eyewitness testimony, bite-mark evidence, hair analysis, and the like, it is considered nearly infallible. This potency of DNA evidence has led to suggestions that we, as a nation, should magnify the power of DNA by increasing the size ...


The Wisdom Of Universal Dna Collection: A Reply To Professor Meghan J. Ryan, Arnold Loewy 2017 Texas Tech University School of Law

The Wisdom Of Universal Dna Collection: A Reply To Professor Meghan J. Ryan, Arnold Loewy

Science and Technology Law Review

No abstract provided.


The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan 2017 Southern Methodist University

The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan

Science and Technology Law Review

Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered ...


Digital Commons powered by bepress