Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The Catholic University of America, Columbus School of Law (13)
- University of Michigan Law School (12)
- Maurer School of Law: Indiana University (10)
- SelectedWorks (9)
- American University Washington College of Law (7)
-
- Selected Works (5)
- University of Pittsburgh School of Law (5)
- Boston University School of Law (3)
- Georgetown University Law Center (3)
- University of Pennsylvania Carey Law School (3)
- BLR (2)
- Chicago-Kent College of Law (2)
- Florida A&M University College of Law (2)
- Fordham Law School (2)
- Roger Williams University (2)
- Schulich School of Law, Dalhousie University (2)
- Seattle University School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Colorado Law School (2)
- University of Florida Levin College of Law (2)
- University of Kentucky (2)
- University of Maryland Francis King Carey School of Law (2)
- Vanderbilt University Law School (2)
- Barry University School of Law (1)
- City University of New York (CUNY) (1)
- Columbia Law School (1)
- Florida International University College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- National Law School of India University (1)
- New York Law School (1)
- Publication Year
- Publication
-
- Catholic University Journal of Law and Technology (12)
- Federal Communications Law Journal (8)
- Michigan Telecommunications & Technology Law Review (8)
- All Faculty Scholarship (6)
- Faculty Scholarship (6)
-
- Articles (5)
- Dr Rebecca Wong (5)
- Articles in Law Reviews & Other Academic Journals (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Joint PIJIP/TLS Research Paper Series (3)
- Michigan Law Review First Impressions (3)
- Articles, Book Chapters, & Popular Press (2)
- ExpressO (2)
- Journal Publications (2)
- Journal of Business & Technology Law (2)
- Life of the Law School (1993- ) (2)
- Publications (2)
- Seattle University Law Review (2)
- Touro Law Review (2)
- UF Law Faculty Publications (2)
- American University Business Law Review (1)
- Articles by Maurer Faculty (1)
- Center on Law and Information Policy (1)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (1)
- Continuing Legal Education Materials (1)
- Dickinson Law Review (2017-Present) (1)
- Dissertations (1)
- FIMS Presentations (1)
- FIU Law Review (1)
- Faculty Articles (1)
- Publication Type
Articles 31 - 60 of 114
Full-Text Articles in Law
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Law Faculty Scholarship
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.
The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
University of Richmond Law Review
No abstract provided.
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Catholic University Journal of Law and Technology
No abstract provided.
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
United States Media Law Update, Lyrissa Barnett Lidsky, Rachael Jones
United States Media Law Update, Lyrissa Barnett Lidsky, Rachael Jones
Lyrissa Barnett Lidsky
In June 2015 the United States Supreme Court completed what was hailed as its most ‘liberal term of the ages’, issuing major decisions on controversial issues, such as same-sex marriage, affirmative action and the Affordable Care Act. The Court’s free press jurisprudence, however, remained largely unchanged after its last term. The Court did not decide any significant press cases. Instead, the Court sidestepped the opportunity to resolve important questions about the constitutional limits on the prosecution of threats made via social media in one notable case, and set a new, more speech-protective standard for determining when a law is content-based …
Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law
Newsroom: Margulies On Apple V. Fbi Standoff 02-18-2016, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
Faculty Scholarship
No abstract provided.
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Loyola of Los Angeles Law Review
No abstract provided.
When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski
When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski
Publications
Consumer privacy protection is largely within the purview of the Federal Trade Commission. In recent years, however, the National Telecommunications and Information Administration (NTIA) at the Department of Commerce has hosted multistakeholder negotiations on consumer privacy issues. The NTIA process has addressed mobile apps, facial recognition, and most recently, drones. It is meant to serve as a venue for industry self-regulation. Drawing on the literature on co-regulation and on penalty defaults, I suggest that the NTIA process struggles to successfully extract industry expertise and participation against a dearth of federal data privacy law and enforcement. This problem is most exacerbated …
U.S. Media Law Update, Lyrissa Lidsky, Racheal Jones
U.S. Media Law Update, Lyrissa Lidsky, Racheal Jones
Faculty Publications
In June 2015 the United States Supreme Court completed what was hailed as its most ‘liberal term of the ages’, issuing major decisions on controversial issues, such as same-sex marriage, affirmative action and the Affordable Care Act. The Court’s free press jurisprudence, however, remained largely unchanged after its last term. The Court did not decide any significant press cases. Instead, the Court sidestepped the opportunity to resolve important questions about the constitutional limits on the prosecution of threats made via social media in one notable case, and set a new, more speech-protective standard for determining when a law is content-based …
United States Media Law Update, Lyrissa Barnett Lidsky, Rachael Jones
United States Media Law Update, Lyrissa Barnett Lidsky, Rachael Jones
UF Law Faculty Publications
In June 2015 the United States Supreme Court completed what was hailed as its most ‘liberal term of the ages’, issuing major decisions on controversial issues, such as same-sex marriage, affirmative action and the Affordable Care Act. The Court’s free press jurisprudence, however, remained largely unchanged after its last term. The Court did not decide any significant press cases. Instead, the Court sidestepped the opportunity to resolve important questions about the constitutional limits on the prosecution of threats made via social media in one notable case, and set a new, more speech-protective standard for determining when a law is content-based …
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To Eberlein Et Al. Tbgi Analytical Framework, Nachshon Goltz Mr.
Nachshon Goltz Mr.
This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America and the European Union according to Eberlein et. al. Transnational Business Governance Framework. The article reviews the regulatory structure of this field in these two jurisdictions including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Finally, conclusions are drawn and suggestions are made.
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
No More Shortcuts: Protect Cell Site Location Data With A Warrant Requirement, Lauren E. Babst
Michigan Telecommunications & Technology Law Review
In modern society, the cell phone has become a virtual extension of most Americans, managing all kinds of personal and business matters. Modern cell tower technology allows cell service providers to accumulate a wealth of individuals’ location information while they use their cell phones, and such data is available for law enforcement to obtain without a warrant. This is problematic under the Fourth Amendment, which protects reasonable expectations of privacy. Under the Katz two-prong test, (1) individuals have an actual, subjective expectation of privacy in their cell site location data, and (2) society is prepared to acknowledge that expectation as …
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
The Dawn Of Social Intelligence (Socint), Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.
The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …
Data Breach (Regulatory) Effects, David Thaw
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Touro Law Review
No abstract provided.
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman
Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman
Touro Law Review
No abstract provided.
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
Seattle University Law Review
Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …
Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst
Give Me Your Password: The Intrusive Social Media Policies In Our Schools, Talon Hurst
CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015)
No abstract provided.
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Journal of Business & Technology Law
No abstract provided.
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen
Journal of Business & Technology Law
No abstract provided.
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …