Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (611)
- Intellectual Property Law (326)
- Communications Law (184)
- Computer Law (182)
- Science and Technology Law (172)
-
- First Amendment (138)
- Privacy Law (117)
- Social and Behavioral Sciences (110)
- Constitutional Law (105)
- Law and Society (92)
- International Law (87)
- Entertainment, Arts, and Sports Law (76)
- Legislation (66)
- Administrative Law (54)
- Criminal Law (51)
- Antitrust and Trade Regulation (47)
- Commercial Law (47)
- Legal Writing and Research (45)
- Contracts (41)
- Comparative and Foreign Law (40)
- Legal Education (39)
- Consumer Protection Law (38)
- Civil Rights and Discrimination (37)
- Business Organizations Law (35)
- Communication (35)
- Business (33)
- Jurisdiction (31)
- Law and Economics (31)
- Torts (30)
- Institution
-
- Selected Works (140)
- University of Michigan Law School (132)
- SelectedWorks (91)
- Fordham Law School (86)
- Maurer School of Law: Indiana University (81)
-
- Northwestern Pritzker School of Law (44)
- New York Law School (39)
- Duke Law (34)
- American University Washington College of Law (33)
- Boston University School of Law (32)
- Marquette University Law School (30)
- Touro University Jacob D. Fuchsberg Law Center (29)
- Seattle University School of Law (24)
- University of Georgia School of Law (24)
- Cleveland State University (23)
- Pepperdine University (20)
- Roger Williams University (20)
- University of Missouri School of Law (20)
- University of Richmond (20)
- University of South Carolina (20)
- William & Mary Law School (20)
- Saint Louis University School of Law (18)
- The University of Akron (18)
- University of Pennsylvania Carey Law School (18)
- University of Colorado Law School (17)
- University of Maryland Francis King Carey School of Law (15)
- University of New Hampshire (15)
- BLR (14)
- University of Baltimore Law (14)
- University of Kentucky (13)
- Publication
-
- Faculty Scholarship (73)
- Michigan Telecommunications & Technology Law Review (72)
- Federal Communications Law Journal (48)
- Fordham Intellectual Property, Media and Entertainment Law Journal (40)
- All Faculty Scholarship (36)
-
- Faculty Publications (36)
- Northwestern Journal of Technology and Intellectual Property (35)
- Fordham Law Review (34)
- Articles (29)
- NYLS Law Review (29)
- Scholarly Works (26)
- Touro Law Review (25)
- Seattle University Law Review (21)
- Articles in Law Reviews & Other Academic Journals (20)
- South Carolina Law Review (16)
- Duke Law & Technology Review (15)
- Articles by Maurer Faculty (14)
- ExpressO (14)
- Law Faculty Scholarship (14)
- Michigan Law Review (14)
- Pepperdine Law Review (14)
- Publications (14)
- Marquette Elder's Advisor (13)
- Akron Law Review (12)
- Georgia State University Law Review (12)
- University of Michigan Journal of Law Reform (12)
- GW Law Faculty Publications & Other Works (11)
- Missouri Law Review (11)
- UF Law Faculty Publications (11)
- Cleveland State Law Review (10)
- Publication Type
Articles 1 - 30 of 1520
Full-Text Articles in Law
Legal Uncertainty In Virtual Worlds And Digital Goods: Do The Same Laws Apply?, Alanna Sadler
Legal Uncertainty In Virtual Worlds And Digital Goods: Do The Same Laws Apply?, Alanna Sadler
University of Miami Business Law Review
The growth of virtual worlds and digital goods will force US courts to examine whether traditional laws are sufficient to protect consumers. To do so requires judges and legislative officials to possess a deep understanding of concepts that are everchanging. Many aspects of virtual worlds, such as the metaverse(s), are driven by web3 technology, the technology responsible for the NFT and cryptocurrency craze of recent years. It is impossible to ascertain the impact of virtual worlds on daily life, however, companies must nevertheless prepare for the shift toward virtual spaces and digital goods. There is greater skepticism regarding the utility …
The Myth Of Children’S Online Privacy Protection, Stacey Steinberg
The Myth Of Children’S Online Privacy Protection, Stacey Steinberg
UF Law Faculty Publications
Digital technology has changed the landscape young people face as they come of age. It has changed how children interact with their parents, schools, community organizations, and the state. Despite many benefits, digital technologies that employ data collection, algorithms, and artificial intelligence pose significant risks for the next generation. Private businesses can collect, use, and sell a child’s data in ways never imagined by their families. Information collected by third parties with good intentions can be stolen through data breaches. Through faulty algorithms, websites can make inaccurate assumptions about young people’s interests, teachers can make inaccurate assumptions about a student’s …
Online Disinhibited Contracts, Wayne R. Barnes
Online Disinhibited Contracts, Wayne R. Barnes
Faculty Scholarship
There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …
Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Terms Of Service And Fourth Amendment Rights, Orin S. Kerr
Terms Of Service And Fourth Amendment Rights, Orin S. Kerr
University of Pennsylvania Law Review
Almost everything you do on the Internet is governed by Terms of Service. The language in Terms of Service typically gives Internet providers broad rights to address potential account misuse. But do these Terms alter Fourth Amendment rights, either diminishing or even eliminating constitutional rights in Internet accounts? In the last five years, many courts have ruled that they do. These courts treat Terms of Service like a rights contract: by agreeing to use an Internet account subject to broad Terms of Service, you give up your Fourth Amendment rights.
This Article argues that the courts are wrong. Terms of …
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Washington Law Review Online
In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …
Social Media, The Modern Public Forum: The State Action Doctrine And Resurrection Of Marsh, Erika L. Andersen
Social Media, The Modern Public Forum: The State Action Doctrine And Resurrection Of Marsh, Erika L. Andersen
Mitchell Hamline Law Review
No abstract provided.
Target(Ed) Advertising, Derek E. Bambauer
Target(Ed) Advertising, Derek E. Bambauer
UF Law Faculty Publications
Targeted advertising—using data about consumers to customize the ads they receive—is deeply controversial. It also creates a regulatory quandary. Targeted ads generate more money than untargeted ones for apps and online platforms. Apps and platforms depend on this revenue stream to offer free services to users, if not for their financial viability altogether. However, targeted advertising also generates significant privacy risks and consumer resentment. Despite sustained attention to this issue, neither legal scholars nor policymakers have crafted interventions that address both concerns, and existing regulatory regimes for targeted advertising have critical gaps.
This Article makes three key contributions to the …
A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey
A Matter Of Facts: The Evolution Of Copyright’S Fact-Exclusion And Its Implications For Disinformation And Democracy, Jessica Silbey
Faculty Scholarship
The Article begins with a puzzle: the curious absence of an express fact-exclusion from copyright protection in both the Copyright Act and its legislative history despite it being a well-founded legal principle. It traces arguments in the foundational Supreme Court case (Feist Publications v. Rural Telephone Service) and in the Copyright Act’s legislative history to discern a basis for the fact-exclusion. That research trail produces a legal genealogy of the fact-exclusion based in early copyright common law anchored by canonical cases, Baker v. Selden, Burrow-Giles v. Sarony, and Wheaton v. Peters. Surprisingly, none of them …
Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe
Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe
Marquette Intellectual Property & Innovation Law Review
None
Section 230 As Civil Rights Statute, Enrique Armijo
Section 230 As Civil Rights Statute, Enrique Armijo
University of Cincinnati Law Review
Many of our most pressing discussions about justice, progress, and civil rights have moved online. Activists advocating for social change no longer need to be in the same physical space to connect with others who share their challenges and aspirations. But the convergence of mobility, connectivity, and technology is not the only reason why. Thanks to Section 230 of the Communications Decency Act’s (“Section 230”) immunity for online platforms, websites, and their hosts, speakers can engage in speech about protest, equality, and dissent without fear of collateral censorship from governments, authorities, and others in power who hope to silence them. …
All The Internet's A Stage: Reform Of The Digital Millennium Copyright Act And Broadway's Bootleg Problem, Emma K. Wimberly
All The Internet's A Stage: Reform Of The Digital Millennium Copyright Act And Broadway's Bootleg Problem, Emma K. Wimberly
Georgia Law Review
Broadway is the cultural epicenter of theatre arts. While Broadway performances are internationally known and hugely profitable, they remain inaccessible to a significant number of fans. The inability to bear the increasing costs of travel, lodging, and tickets leads many fans to turn to bootlegs. Bootlegs are illegal recordings of live performances. They are widely viewed and shared online, and uploaders purposefully work to obscure the illegality of these recordings, allowing them to evade tools designed to combat copyright infringement.
The Digital Millennium Copyright Act (DMCA), enacted in 1998, amended U.S. copyright law to attempt to prevent digital copyright infringement. …
All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous
All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous
Scholarly Works
Roughly half of Americans get some of their news from social media, and nearly two-thirds get some of their news from search engines. As our modern information gatekeepers, these internet companies bear a special responsibility to consider the impact of their platform and site policies on users’ access to high-quality news sources. They should adopt policies that clear the digital pathway between the public and press by facilitating such access. To that end, the companies must first, address the threshold issue of how best to identify high-quality news sources. This article examines factors that would be useful, drawing from legal …
Cyber Borders: Exercising State Sovereignty Online, Beth Simmons, Rachel Hulvey
Cyber Borders: Exercising State Sovereignty Online, Beth Simmons, Rachel Hulvey
All Faculty Scholarship
The internet brings challenges that threaten national identities and the foundations of what it means to be a state. Well-known challenges include difficulties maintaining important national values, competition threatening local economic plans, and even the inability to maintain a meaningful informational environment for self-governance. These influences are plausibly understood as challenges to some of the basic functions of a sovereign state. Despite these challenges, we identify the social practice of establishing control over mercurial mediums. States have responded by erecting cyberborders with a collection of laws, practices, and internet architecture designed to filter digital information within the territorial jurisdiction of …
Constitutional Law—The Current System For Abolishing Child Pornography Online Is Ineffective: The Alternative Measure For Eradicating Online Predators, Virginia Kendall
Constitutional Law—The Current System For Abolishing Child Pornography Online Is Ineffective: The Alternative Measure For Eradicating Online Predators, Virginia Kendall
University of Arkansas at Little Rock Law Review
No abstract provided.
The Five Internet Rights, Nicholas J. Nugent
The Five Internet Rights, Nicholas J. Nugent
Washington Law Review
Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …
Boden Lecture: The Past’S Lessons For Today: Can Common-Carrier Principles Make For A Better Internet?, James B. Speta
Boden Lecture: The Past’S Lessons For Today: Can Common-Carrier Principles Make For A Better Internet?, James B. Speta
Marquette Law Review
None.
From America Online To America, Online: Reassessing Section 230 Immunity In A New Internet Landscape, Madeleine E. Blair
From America Online To America, Online: Reassessing Section 230 Immunity In A New Internet Landscape, Madeleine E. Blair
Journal of Intellectual Property Law
In 1996, Congress passed the Communications Decency Act, a body of legislation aimed at regulating a nascent internet. Section 230 of the Act has become a subject of contention on both sides of the political aisle due to an immunity provision in the law barring private actions against online service providers for the conduct of those services’ users. Few lawsuits against online entities have survived this immunity provision. But two successful cases, Lemmon v. Snap, Inc. and A.M. v. Omegle.com, LLC, have used a products liability theory to overcome the limitation.
This Note examines Section 230 in light of these …
Comment: Copyright Registration: Fourth Estate Implications For Photographers In The Modern World, Izabella Kanoza
Comment: Copyright Registration: Fourth Estate Implications For Photographers In The Modern World, Izabella Kanoza
Northern Illinois University Law Review
In 2019, the Supreme Court has settled a long-standing split issue among the Circuit Courts. The issue revolved around the interpretation of the word “registration” with the Copyright Office in order for a copyright owner to be able to initiate a copyright infringement lawsuit. However, the now settled precedent has presented challenges to the ever-evolving internet world and those who use it to create, advertise, and share their digital content. Digital photographers, specifically, have found this registration requirement inefficient when it comes to sharing their work on social media platforms, such as Instagram or Facebook, where copyright infringement in the …
Platform Accountability: Gonzalez And Reform, Eric Schnapper
Platform Accountability: Gonzalez And Reform, Eric Schnapper
Presentations
Section 230(c)(1) was adopted for the purpose of distinguishing between conduct of third parties and conduct of internet companies themselves. Its familiar language provides that “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” The last four words are central to the limitation on the defense created by the statute; it is only regarding information created by “another” that the defense may be available. Section 230(e)(3) makes clear that even a partial role played by an internet company in the creation of harmful …
The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page
The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page
University of Miami Law Review
The United States Department of Justice (“DOJ”) and three overlapping groups of states have filed federal antitrust cases alleging Google has monopolized internet search, search advertising, internet advertising technologies, and app distribution on Android phones. In this Article, we focus on the DOJ’s claims that Google has used contracts with tech firms that distribute Google’s search services in order to exclude rival search providers and thus to monopolize the markets for search and search advertising—the two sides of Google’s search platform. The primary mechanisms of exclusion, according to the DOJ, are the many contracts Google has used to secure its …
The Freedom Of Influencing, Hannibal Travis
The Freedom Of Influencing, Hannibal Travis
University of Miami Law Review
Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …
Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
The Internet Tax Freedom Act At 25, Walter Hellerstein, Andrew D. Appleby
The Internet Tax Freedom Act At 25, Walter Hellerstein, Andrew D. Appleby
Scholarly Works
In October 1998, Congress enacted the Internet Tax Freedom Act (ITFA), a temporary three-year “moratorium” on the enactment of new state and local “taxes on Internet access” and on “multiple or discriminatory taxes on electronic commerce.” After extending the act temporarily several times, Congress, in 2016, finally and controversially struck the language temporarily extending the act, thereby making it permanent.
With its idiosyncratic legislative history and statutory language, as well as the recent attention it has received in connection with legal challenges to digital services and analogous taxes, we thought it would be appropriate to commemorate ITFA’s 25th birthday by …
Utilizing Legal Expertise To Positively Impact Coastal Communities, Roger Williams University School Of Law
Utilizing Legal Expertise To Positively Impact Coastal Communities, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Toward Stronger Data Protection Laws, Margot E. Kaminski
Toward Stronger Data Protection Laws, Margot E. Kaminski
Publications
No abstract provided.
Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery
Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery
Community & Environmental Health Faculty Publications
The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is now expected to allow participants to redeem their food benefits online, i.e., via online ordering, rather than only in-store. However, it is unclear how this new benefit redemption model may impact participants’ welfare since vendors may have an asymmetric information advantage compared with WIC customers. The WIC online ordering environment may also change the landscape for WIC vendors, which will eventually affect WIC participants. To protect WIC consumers’ rights in the new online ordering model, policymakers need an appropriate legal and regulatory framework. This narrative review provides that …