Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4088 Full-Text Articles 3233 Authors 2133273 Downloads 116 Institutions

All Articles in Internet Law

Faceted Search

4088 full-text articles. Page 7 of 106.

An Expressive Theory Of Privacy Intrusions, Craig Konnoth 2017 University of Colorado Law School

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Articles

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by ...


Dig Once And Work Together: A Common Sense Solution To America’S Failing Broadband Network, Nicholas Kanakis 2017 The University of Pacific, McGeorge School of Law

Dig Once And Work Together: A Common Sense Solution To America’S Failing Broadband Network, Nicholas Kanakis

The University of the Pacific Law Review

No abstract provided.


Domestic Violence Law, Abusers’ Intent, And Social Media: How Transaction-Bound Statutes Are The True Threats To Prosecuting Perpetrators Of Gender-Based Violence, Megan L. Bumb 2017 Brooklyn Law School

Domestic Violence Law, Abusers’ Intent, And Social Media: How Transaction-Bound Statutes Are The True Threats To Prosecuting Perpetrators Of Gender-Based Violence, Megan L. Bumb

Brooklyn Law Review

The rapid expansion of social media has brought with it a new platform for perpetrators of domestic violence to assert power and control over their victims. The statutes presently used to prosecute abusers fail to protect victims from social media threats and to punish abusers for making those threats. Using the Supreme Court’s 2015 decision in Elonis v. United States, this note proposes a straightforward solution to a multifaceted problem—how to better protect victims of domestic violence from social media threats while maintaining abusers’ First Amendment rights. The answer is not mere clarification of the true threat doctrine ...


Denying Certiorari In Bell V. Itawamba County School Board: A Missed Opportunity To Clarify Students’ First Amendment Rights In The Digital Age, Elizabeth A. Shaver 2017 Brooklyn Law School

Denying Certiorari In Bell V. Itawamba County School Board: A Missed Opportunity To Clarify Students’ First Amendment Rights In The Digital Age, Elizabeth A. Shaver

Brooklyn Law Review

In the last decade, the federal circuit courts have grappled with the issue whether, and to what extent, school officials constitutionally may discipline students for their off-campus electronic speech. Before 2015, three federal circuit courts had extended school authority to off-campus electronic speech by applying a vague test that allows school officials to reach far beyond the iconic “schoolhouse gate” referenced in the Supreme Court’s landmark decision in Tinker v. Des Moines Independent Community School District. Two other federal circuits had avoided the issue altogether by deciding the cases before them on other grounds. In 2015, the Fifth Circuit ...


Tallinn, Hacking, And Customary International Law, Ahmed Ghappour 2017 Boston University School of Law

Tallinn, Hacking, And Customary International Law, Ahmed Ghappour

Faculty Scholarship

Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.

This essay focuses on one area of state practice where states are already dealing with these issues: the use ...


Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello 2017 University of Michigan Law School

Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello

Articles

There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.


"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr. 2017 Duke Law School

"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.

Faculty Scholarship

If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?

Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed ...


Broadband Privacy Within Network Neutrality: The Fcc's Application Of The Cpni Rules, Justin S. Brown 2016 University of South Florida

Broadband Privacy Within Network Neutrality: The Fcc's Application Of The Cpni Rules, Justin S. Brown

Justin S. Brown

No abstract provided.


Open Source Operational Risk: Should Public Blockchains Serve As Financial Market Infrastructures?, Angela Walch 2016 St. Mary's University School of Law

Open Source Operational Risk: Should Public Blockchains Serve As Financial Market Infrastructures?, Angela Walch

Angela Walch

This chapter explores the operational risks raised by the use of common 'grassroots' open source software practices in public blockchains, such as Bitcoin and Ethereum, in their potential role as financial market infrastructures. These practices include the informal software development process, problematic funding for software development, and the possibility of forking inherent to open source software. The paper argues that the risks raised by these practices significantly undermine public blockchains’ suitability to serve as financial market infrastructures. Further, they herald the need to reevaluate the use of these practices outside the blockchain technology setting, in other critical infrastructures based on ...


Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills 2016 University of Florida Levin College of Law

Cybermedicine: The Benefits And Risks Of Purchasing Drugs Over The Internet, David Mills

Journal of Technology Law & Policy

In today's rapidly changing world of e-commerce, almost anything can be bought over the Internet and delivered right to your front door. Virtually every day there is news of yet another company selling some type of product online. Included in this barrage of products is prescription medication. Not only is it possible to order prescription medication over the Internet, in some cases it is not necessary to be examined, or even to consult with a physician. ~ To some, this new type of "cybermedicine" is an affront to traditional medicine, as well as potentially dangerous to consumers. In addition, the ...


Proposed Arbitration Ban Would Be Bad Law And Bad Policy, Daniel A. Lyons 2016 Boston College Law School

Proposed Arbitration Ban Would Be Bad Law And Bad Policy, Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood 2016 Notre Dame Law School

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood

Journal of Legislation

While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and ...


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen 2016 University of Pennsylvania Law School

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply ...


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon 2016 Brooklyn Law School

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional ...


Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber 2016 Brooklyn Law School

Governance By Proxy: Cyber Challenges To Civil Liberties, Niva Elkin-Koren, Eldar Haber

Brooklyn Law Review

No abstract provided.


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts 2016 Brooklyn Law School

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they ...


Can I Skype My Doctor? Limited Medicare Coverage Hinders Telemedicine’S Potential To Improve Health Care Access, Hana Sahdev 2016 Boston College Law School

Can I Skype My Doctor? Limited Medicare Coverage Hinders Telemedicine’S Potential To Improve Health Care Access, Hana Sahdev

Boston College Law Review

Telemedicine services, such as virtual consultations and remote patient monitoring, are revolutionizing health care delivery. The Patient Protection and Affordable Care Act of 2010 (“ACA”) promotes the use of technology in health care reform as a means to increase quality and access while reducing costs. Despite the excitement around telemedicine, the lack of Medicare reimbursement hinders access and innovation. This Note analyzes the utilization of telemedicine to promote health care access for Medicare beneficiaries, and argues that legislative and regulatory changes are needed to reconcile current Medicare policies with the ACA’s encouragement of using telemedicine services. Specifically, this Note ...


Corporate Privacy Failures Start At The Top, Victoria L. Schwartz 2016 Pepperdine University School of Law

Corporate Privacy Failures Start At The Top, Victoria L. Schwartz

Boston College Law Review

With the rise of big data, numerous corporations are in the privacy business. Yet even corporations not directly in the privacy business must also make important decisions potentially impacting the privacy of their employees, consumers, and shareholders. A wide consensus of scholars and commentators has agreed that corporations fail to adequately protect privacy. The existing scholarship has largely focused on demand-side market failures to explain this privacy failure phenomenon. This Article offers a supply-side market distortion theory that reinforces the existing demand-side explanations to better account for corporate privacy failures. Under this supply-side theory, extensive corporate disclosure requirements, including the ...


Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim 2016 Boston College Law School

Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim

Boston College Law Review

YouTube has quickly become the dominant player in the Internet video sharing platform market. To keep its leading position, it created an internal automated system to police potential copyright infringements known as Content ID. Generally, that system functions similarly to third-party computer automated systems that send takedown requests, yet it is exempt from liability for removing lawful videos under a safe harbor provided by the Digital Millennium Copyright Act of 1998 (“DMCA”). Although some industry experts first championed Content ID, many now question whether it unfairly favors copyright holders and YouTube itself at the expense of content creators and the ...


Avoiding The Pitfalls Of Net Uniformity: Zero Rating And Nondiscrimination, Christopher S. Yoo 2016 University of Pennsylvania Law School

Avoiding The Pitfalls Of Net Uniformity: Zero Rating And Nondiscrimination, Christopher S. Yoo

Faculty Scholarship

The current debate over network neutrality has not fully appreciated how service differentiation can benefit consumers and promote Internet adoption. On the demand-side, service differentiation addresses the primary obstacle to adoption, which is the lack of perceived need for Internet service, and reflects the growing heterogeneity of consumer demand. On the supply-side, monopolistic competition has long underscored how product differentiation can create stable equilibria with multiple providers – notwithstanding the presence of unexhausted economies of scale – by allowing competitors to target subsegments of the overall market that place a higher value on particular services. Conversely, prohibiting service differentiation would restrict competition ...


Digital Commons powered by bepress