Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,286 Full-Text Articles 3,431 Authors 2,669,258 Downloads 133 Institutions

All Articles in Internet Law

Faceted Search

4,286 full-text articles. Page 6 of 111.

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim 2018 Indiana University

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept ...


Pii In Context: Video Privacy And A Factor-Based Test For Assessing Personal Information, Daniel L. Macioce Jr. 2018 Pepperdine University

Pii In Context: Video Privacy And A Factor-Based Test For Assessing Personal Information, Daniel L. Macioce Jr.

Pepperdine Law Review

As a central concept in American information privacy law, personally identifiable information (PII) plays a critical role in determining whether a privacy violation has occurred. Under the Video Privacy Protection Act of 1988 (VPPA), PII “includes information which identifies a person as having requested or obtained specific video materials or services.” Despite the clarity that these words may have when the Statute was enacted, the line separating PII from non-PII in the context of streaming video is not easily drawn, in part due to the prevalence of behavior tracking technologies and the emergence of “big data” analytics. The First Circuit ...


Mapping Legalzoom's Disruptive Innovation, Matthew T. Ciulla 2018 Pepperdine University

Mapping Legalzoom's Disruptive Innovation, Matthew T. Ciulla

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


The Rise Of Artificial Intelligence In The Legal Field: Where We Are And Where We Are Going, Sergio David Becerra 2018 Pepperdine University

The Rise Of Artificial Intelligence In The Legal Field: Where We Are And Where We Are Going, Sergio David Becerra

The Journal of Business, Entrepreneurship & the Law

The twenty-first century has brought significant technological advancement that permeates all aspects of our lives. The legal field, though slow in the adaption of this technology, is beginning to pick up the pace. Artificial Intelligence (AI) technology is used now to perform legal work once completed solely by legal practitioners. This Comment outlines what AI is and reviews the current use of AI in the legal field. It also identifies AI products and developments that are in place. Finally, it argues that lawyers will always be needed in the practice of law, despite the continued growth of AI.


These Walls Can Talk! Securing Digital Privacy In The Smart Home Under The Fourth Amendment, Stefan Ducich 2018 Duke Law

These Walls Can Talk! Securing Digital Privacy In The Smart Home Under The Fourth Amendment, Stefan Ducich

Duke Law & Technology Review

Privacy law in the United States has not kept pace with the realities of technological development, nor the growing reliance on the Internet of Things (IoT). As of now, the law has not adequately secured the “smart” home from intrusion by the state, and the Supreme Court further eroded digital privacy by conflating the common law concepts of trespass and exclusion in United States v. Jones. This article argues that the Court must correct this misstep by explicitly recognizing the method by which the Founding Fathers sought to “secure” houses and effects under the Fourth Amendment. Namely, the Court must ...


Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger 2018 Boston College Law School

Writing The Access Code: Enforcing Commercial Web Accessibility Without Regulations Under Title Iii Of The Americans With Disabilities Act, Daniel Sorger

Boston College Law Review

A growing number of private lawsuits allege that businesses are violating Title III of the Americans with Disabilities Act because their websites are inaccessible to disabled individuals. Courts remain divided, however, on the extent to which commercial websites are covered under Title III. Additionally, the Department of Justice has not promulgated commercial web accessibility regulations—adding further uncertainty to the private enforcement regime. This Note argues that Title III broadly covers commercial websites, but that private enforcement is not positioned to spur lasting, broad-based Title III compliance. It proposes that large-scale litigation, state attorney general action, and state laws should ...


Technological Opacity & Procedural Injustice, Seth Katsuya Endo 2018 NYU School of Law

Technological Opacity & Procedural Injustice, Seth Katsuya Endo

Boston College Law Review

From Google’s auto-correction of spelling errors to Netflix’s movie suggestions, machine-learning systems are a part of our everyday life. Both private and state actors increasingly employ such systems to make decisions that implicate individuals’ substantive rights, such as with credit scoring, government-benefit eligibility decisions, national security screening, and criminal sentencing. In turn, the rising use of machine-learning systems has led to questioning about whether they are sufficiently accurate, fair, and transparent. This Article builds on that work, focusing on how opaque technologies can subtly erode the due process norm of participation. To illuminate this issue, this Article examines ...


The Song Remains The Same: What Cyberlaw Might Teach The Next Internet Economy, Kevin Werbach 2018 University of Florida Levin College of Law

The Song Remains The Same: What Cyberlaw Might Teach The Next Internet Economy, Kevin Werbach

Florida Law Review

The next stage of the digital economy will involve trillions of networked devices across every industry and sphere of human activity: The Internet of the World. Early manifestations of this evolution through on-demand services such as Uber and Airbnb raise a host of serious legal questions. The stage seems set for a decisive battle between regulation and innovation. Yet this perception is mistaken. In the end, the emerging businesses will welcome government engagement, and regulatory actors will accept creative solutions to achieve their goals. Why expect such a resolution? Because the same story played out twenty years ago, in the ...


Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer 2018 Duke Law

Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer

Duke Law & Technology Review

The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership ...


International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof 2018 Yale Law School

International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof

Cornell Law Review

States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.

This Article draws on tort law and international law principles to construct ...


Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle Keats Citron 2018 University of Maryland Francis King Carey School of Law

Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle Keats Citron

Notre Dame Law Review

Silicon Valley has long been viewed as a full-throated champion of First Amendment values. The dominant online platforms, however, have recently adopted speech policies and processes that depart from the U.S. model. In an agreement with the European Commission, the dominant tech companies have pledged to respond to reports of hate speech within twenty-four hours, a hasty process that may trade valuable expression for speedy results. Plans have been announced for an industry database that will allow the same companies to share hashed images of banned extremist content for review and removal elsewhere. These changes are less the result ...


Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven 2018 University of Michigan Law School

Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven

Michigan Law Review

As the ubiquity and importance of the internet continue to grow, courts will address more cases involving online activity. In doing so, courts will confront the threshold issue of whether a defendant can be subject to specific personal jurisdiction. The Supreme Court, however, has yet to speak to this internet-jurisdiction issue. Current precedent, when strictly applied to the internet, yields fundamentally unfair results when addressing specific jurisdiction. To better achieve the fairness aim of due process, this must change. This Note argues that, in internet tort cases, the “express aiming” requirement should be discarded from the jurisdictional analysis and that ...


Commodifying Consumer Data In The Era Of The Internet Of Things, Stacy-Ann Elvy 2018 New York Law School

Commodifying Consumer Data In The Era Of The Internet Of Things, Stacy-Ann Elvy

Boston College Law Review

Internet of Things (“IoT”) products generate a wealth of data about consumers that was never before widely and easily accessible to companies. Examples include biometric and health-related data, such as fingerprint patterns, heart rates, and calories burned. This Article explores the connection between the types of data generated by the IoT and the financial frameworks of Article 9 of the Uniform Commercial Code and the Bankruptcy Code. It critiques these regimes, which enable the commodification of consumer data, as well as laws aimed at protecting consumer data, such as the Bankruptcy Abuse Prevention and Consumer Protection Act, various state biometric ...


Fair Use And Social Media, John Dettinger 2018 Gettysburg College

Fair Use And Social Media, John Dettinger

Musselman Library Staff Publications

This poster was created in a collaborative effort by Musselman Library’s Copyright Committee as part of a display for Fair Use Week 2018. The poster was intended to get viewers to think about the 4 factors of fair use in the context of two art projects that used social media photos: Yolocaust by Shahak Shapira and New Portraits by Richard Prince. It was also intended to get viewers thinking about the ways their social media content might get used beyond the original intention.


By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson 2018 Texas A&M University School of Law

By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson

Brian Larson

By June of 2017, Facebook had two billion (that’s billion, with a ‘b’) users accessing it per month (Balakrishnan 2017). Facebook believes that each of those consumer end-users is bound by its end-user license agreement (EULA), which Facebook calls a “Statement of Rights and Responsibilities,” available to end-users from a small link in light gray text called “Terms” on every Facebook page. EULAs like this, associated with websites, mobile apps, and consumer goods with embedded software, and styled “terms of service,” “terms of use,” etc., may purport to impose a wide variety of contractual obligations on consumers, for example ...


Tax Compliance In A Decentralizing Economy, Manoj Viswanathan 2018 University of California Hastings College of Law

Tax Compliance In A Decentralizing Economy, Manoj Viswanathan

Georgia State University Law Review

Tax compliance in the United States has long relied on information from centralized intermediaries—the financial institutions,employers, and brokers that help ensure income is reported and taxes are paid. Yet while the IRS remains tied to these centralized entities,consumers and businesses are not. New technologies, such as sharing economy platforms (companies such as Airbnb, Uber, and Instacart)and the blockchain (the platform on which various cryptocurrencies are based) are providing new, decentralized options for exchanging goods and services.

Without legislative and agency intervention, these technologies pose a critical threat to the reporting system underlying domestic and international tax ...


Not So Good: The Classification Of “Smart Goods” Under Ucc Article 2, Chadwick L. Williams 2018 Georgia State University College of Law

Not So Good: The Classification Of “Smart Goods” Under Ucc Article 2, Chadwick L. Williams

Georgia State University Law Review

Refrigerators can now tweet. Today, almost sixty years after the states widely adopted the Uniform Commercial Code (UCC), the line between goods and services is more blurred than ever. When the UCC was drafted, a good was the simple opposite of a service. A good was something “movable” and tangible, and a service was not. Article 2 of the UCC, which governs sales, limits its scope to goods.

However, because Article 2 was drafted long before the proliferation of so-called “smart goods,” courts continuously struggle to determine when a smart good falls within Article 2’s scope. Courts have developed ...


Access To Adjudication Materials On Federal Agency Websites, Daniel J. Sheffner 2018 The University of Akron

Access To Adjudication Materials On Federal Agency Websites, Daniel J. Sheffner

Akron Law Review

This Article offers recommendations and best practices for federal administrative agencies interested in improving the accessibility of orders, opinions, briefs, and other materials filed or issued in administrative adjudication proceedings on their websites and in maintaining more comprehensive online collections of such adjudication materials. Part I provides an overview of federal administrative adjudication and the laws and policies relevant to the online disclosure of adjudication materials. Part II summarizes a survey the author conducted of 24 federal agency websites and presents its results. Part III analyzes the survey’s findings, dividing the analysis into two sections. The first section discusses ...


Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris 2018 Duke Law School

Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris

Duke Law & Technology Review

The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be ...


A Feminist Framing Of Non-Consensual Pornography, Claire P. Donohue 2018 Boston College Law School

A Feminist Framing Of Non-Consensual Pornography, Claire P. Donohue

Boston College Law School Faculty Papers

No abstract provided.


Digital Commons powered by bepress