Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4215 Full-Text Articles 3297 Authors 2186894 Downloads 122 Institutions

All Articles in Internet Law

Faceted Search

4215 full-text articles. Page 5 of 110.

The World Wide Web Extension: From Dot-Com To Dot ...Everything, Alexa Halloran 2017 Pepperdine University

The World Wide Web Extension: From Dot-Com To Dot ...Everything, Alexa Halloran

The Journal of Business, Entrepreneurship & the Law

Today businesses are facing a new Internet dilemma. The Internet Corporation for Assigned Names and Numbers (ICANN) recently granted the public the opportunity to operate and register domain names under a plethora of generic domain extensions. Although no one knows exactly what this new program’s effect will be, the buzz around it informs business owners of a renewed need for innovation. And who is at the forefront of this new era of technology? Internet powerhouses like Google and Amazon, and worldwide investors are gambling on the success of this new program. Only one thing is certain, no company wants ...


Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer 2017 Seattle University School of Law

Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer

Seattle University Law Review

Part I of this Article describes how the healthcare industry has arrived in this place of vulnerability, including (1) the history of the movement toward EHRs through HIPAA, (2) HIPAA’s meaningful use regulations and the background of current ransomware attacks, and (3) the distinctions between these attacks and other security breaches that have plagued large insurers and health systems within the last five years. Next, Part II will examine current industry culture when it comes to cybersecurity and review current legal and business approaches to address this growing threat. Then, Part III will argue that, while the current laws ...


Mean Muggin’ No More: Detroit Free Press V. U.S. Dep’T Of Justice And A Non-Trivial Privacy Interest In Booking Photographs, Meghan Looney 2017 Boston College Law School

Mean Muggin’ No More: Detroit Free Press V. U.S. Dep’T Of Justice And A Non-Trivial Privacy Interest In Booking Photographs, Meghan Looney

Boston College Journal of Law & Social Justice

On July 14, 2016, the U.S. Court of Appeals for the Sixth Circuit held that criminal defendants have a legitimate privacy interest in their booking photographs, thereby reversing and remanding a grant of summary judgment in favor of the Detroit Free Press’s request for the booking photographs of four police officers who had recently been indicted for bribery and drug conspiracy. In holding that the public disclosure of booking photographs may constitute an unwarranted invasion of personal privacy, the majority overturned twenty years’ worth of Sixth Circuit precedent. The court properly acknowledged that booking photographs convey a portrait ...


Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum 2017 DePaul University

Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum

Georgia Journal of International & Comparative Law

No abstract provided.


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler 2017 Electronic Privacy Information Center

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation ...


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. MacKenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law 2017 Venable LLP

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford 2017 Indiana University Kelley School of Business

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford

University of Michigan Journal of Law Reform

No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in ...


Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung HUI, Seung Hyun KIM, QIU-HONG WANG 2017 Singapore Management University

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by ...


Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard 2017 Catholic University of America (Student)

Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard

Catholic University Journal of Law and Technology

This note argues that the current framework that governs health care applications and consumer privacy is slacking and outlines strategies to ensure protection against third party accessibility of information that consumers deem private.


Table Of Contents, 2017 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2017 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry 2017 University of Minnesota

Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry

Catholic University Journal of Law and Technology

Following the appearances of presidential candidates Donald Trump, Bernie Sanders and Hillary Clinton on episodes of Saturday Night Live, local television affiliates were required to upload documents related to the appearances to the FCC’s online public file database. After discussing the FCC’s database, the Bona Fide News Exception and the modern application of Section 315’s Equal Time Requirements, this study examines the compliance by the local NBC affiliates in the top 100 television markets with the public file requirements for candidate appearances and subsequent equal time requests as a test of station compliance with the requirements of ...


How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel 2017 Southern Illinois University Edwardsville

How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel

Catholic University Journal of Law and Technology

The article focuses on two Supreme Court decisions, King v. Burwell and FCC v. Fox Televisions Stations, Inc., that provide diametrically different models for how deferential a court should be when it reviews administrative action. The former case addresses how deferential a court should be for an agency’s statutory interpretation of an ambiguous statute for a question that has significant economic and political effects but Congress had not expressly delegated the question to the agency. The latter case addresses how deferential a court should be when an agency’s changes a policy that is within its statutory authority. These ...


#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu 2017 The Catholic University of America, Columbus School of Law

#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini 2017 University of Richmond School of Law

Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini

Catholic University Journal of Law and Technology

No abstract provided.


Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin 2017 Boston University

Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin

Catholic University Journal of Law and Technology

337 of the Tariff Act of 1930 (“Section 337”) is one of the statutes that prohibit unfair trade or unfair competition in importation, and it aims at protecting intellectual property at the United States borders. Because of the international impacts of Section 337 and the injunctive nature of its remedies, the application of the statute has profound impacts on the trade between U.S. and other countries.

China is a country that has enormous trade with the U.S and imports large amounts of goods to the U.S. each year. Moreover, the weak intellectual property protection in China has ...


Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin 2017 Catholic University of America (Student)

Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin

Catholic University Journal of Law and Technology

No abstract provided.


Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross 2017 The Catholic University of America, Columbus School of Law

Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross

Catholic University Journal of Law and Technology

This Note examines the disruptive effects that distributed ledger technology will have on payment systems and the financial services industry. It discusses how financial technology companies and banks will need to adapt to ensure that American consumers and banks, as well as the American economy at large, remain secure and efficient within an increasingly online and global financial system. This Note argues that the disjointed digital currency licensing regimes and complex landscape of state-by-state money transmission licensing directly threaten to stifle innovation, capital formation, consumer protection, and national cybersecurity. To ensure the U.S. remains competitive in the global financial ...


Yet Another French Exception: The Legal, Cultural, And Political Dimensions Of France’S Support For The Digital Right To Be Forgotten, Zarine Kharazian 2017 College of William and Mary

Yet Another French Exception: The Legal, Cultural, And Political Dimensions Of France’S Support For The Digital Right To Be Forgotten, Zarine Kharazian

Undergraduate Honors Theses

In 2015, the European Court of Justice established an online “right to be forgotten” in Europe. Under this right to be forgotten, individuals may request that search engines delist links that reference their personal information from search results. Search engines need not grant these requests, but they are now obligated to review them.

While the Court's decision to establish the right to be forgotten certainly ignited a debate among Western privacy scholars and policymakers hailing from both sides of the Atlantic, no country has participated in the debate with as much fervor as has France. This thesis addresses the ...


Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon 2017 Penn State Law

Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon

Penn State Journal of Law & International Affairs

No abstract provided.


Digital Commons powered by bepress