Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Law

Strengthening Our Intuitions About Hacking, Jeffrey L. Vagle Jan 2023

Strengthening Our Intuitions About Hacking, Jeffrey L. Vagle

Indiana Law Journal

The computer trespass analogy has served us reasonably well as a basis for cybersecurity policies and related anti-hacking laws, but computers, and our uses of them, have changed significantly in ways that stretch the computer trespass metaphor beyond usefulness. This Essay proposes an approach to expanding and strengthening our intuitions about computer security that accounts for new computing paradigms, giving courts and lawmakers additional tools for interpreting and drafting effective anti-hacking laws.

This Essay argues that many new and existing computer use scenarios leave courts unsure how existing anti-hacking laws might apply, increasing the possibility of under- or over-inclusive policies …


What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells Apr 2021

What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells

Indiana Law Journal

This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir Jan 2016

A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir

Indiana Law Journal

Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.

Our survey is the first comprehensive examination of the intersection of …


Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans Apr 2015

Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans

Indiana Law Journal

This Comment analyzes the regulations in place on 3D-printed firearms and proposes a new standard for regulating 3D-printed goods. Part I provides a brief primer on 3D printing and 3D-printed firearms. Part II turns to the events surrounding Defense Distributed’s creation of the world’s first 3D-printed firearm and the subsequent government censorship of the corresponding CAD files. Part III discusses the regulations affecting 3D-printed firearms and why these regulations are ill-suited for CAD files and 3D-printed goods. Part IV analyzes the implications of treating CAD files and 3D-printed goods as equivalents of traditional goods. Finally, Part V offers a proposal …


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …


A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia Oct 2013

A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia

Indiana Law Journal

No abstract provided.


The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva Apr 2013

The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva

IP Theory

No abstract provided.


Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying Oct 2012

Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying

IP Theory

No abstract provided.


“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez Jul 2012

“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez

IP Theory

No abstract provided.


An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub May 2012

An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub

Federal Communications Law Journal

Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …


The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund Jan 2012

The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund

IP Theory

No abstract provided.


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.


Vernor V. Autodesk: Power To The . . . Producers?, Elizabeth Hayes Jan 2012

Vernor V. Autodesk: Power To The . . . Producers?, Elizabeth Hayes

IP Theory

No abstract provided.


Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders Mar 2011

Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders

Federal Communications Law Journal

In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …


Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele Jan 2009

Privacy By Deletion: The Need For A Global Data Deletion Principle, Benjamin J. Keele

Indiana Journal of Global Legal Studies

With global personal information flows increasing, efforts have been made to develop principles to standardize data protection regulations. However, no set of principles has yet achieved universal adoption. This note proposes a principle mandating that personal data be securely destroyed when it is no longer necessary for the purpose for which it was collected. Including a data deletion principle in future data protection standards will increase respect for individual autonomy and decrease the risk of abuse of personal data. Though data deletion is already practiced by many data controllers, including it in legal data protection mandates will further the goal …


Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp Jul 2008

Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp

Indiana Law Journal

No abstract provided.


Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman Dec 2006

Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman

Federal Communications Law Journal

This Article calls for mandated "network neutrality," which would require broadband service providers to treat all nondestructive data equitably. The Author argues that neutral networks are preferable because they better foster online innovation and provide a more equitable distribution of the power to communicate. Without mandated network neutrality, providers in highly concentrated regional broadband markets will likely begin charging content providers for the right to send data to end users at the fastest speeds available. The Author demonstrates that regional broadband competition and forthcoming transmission technologies are unlikely to prevent broadband discrimination, ad hoc regulation under current statutory authority is …


Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller Jul 2003

Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller

Indiana Journal of Global Legal Studies

No abstract provided.


The Legacy Of The Federal Communications Commission’S Computer Inquiries, Robert Cannon Mar 2003

The Legacy Of The Federal Communications Commission’S Computer Inquiries, Robert Cannon

Federal Communications Law Journal

The FCC and the computer industry have learned much in the 35 years since the agency first began to regulate computer networks. Safeguards were imposed on common carriers for the benefit of the networks. This Article examines the so-called Computer Inquiries and how they have repeatedly re-examined and redefined the nature of the regulatory treatment of computer networks over communications networks. The Author reviews Computer I, in which the FCC first attempted to divide the world technologically between computers that ran communications networks ("pure communications") and computers at the end of telephone lines with which people interacted ("pure data processing"). …


Humans, Computers, And Binding Commitment, Margaret Jane Radin Oct 2000

Humans, Computers, And Binding Commitment, Margaret Jane Radin

Indiana Law Journal

Addison C. Harris Lecture at the Indiana University School of Law-Bloomington on October 26, 1999.


A Leap Forward: Why States Should Ratify The Uniform Computer Information Transactions Act, David A.P. Neboyskey May 2000

A Leap Forward: Why States Should Ratify The Uniform Computer Information Transactions Act, David A.P. Neboyskey

Federal Communications Law Journal

The Uniform Computer Information Transaction Act (UCITA) has been presented to the states for their ratification. Patterned after the Uniform Commercial Code (UCC), UCITA began as an addition to the UCC, but differences between the statutes required UCITA to emerge as a separate entity. The National Conference of Commissioners of Uniform State Laws (NCCUSL) drafted UCITA and approved the Act in Summer 1999. The Act now awaits approval by state legislatures. This Comment analyzes UCITA and argues that the states should ratify the Act. The Comment favorably compares the UCC and UCITA. The UCC follows the principle of "freedom of …


Shrinkwrap And Clickwrap Agreements: 2b Or Not 2b?, Garry L. Founds Dec 1999

Shrinkwrap And Clickwrap Agreements: 2b Or Not 2b?, Garry L. Founds

Federal Communications Law Journal

Several problems plague typical mass-market software licensing agreement, specifically that the public is powerless to negotiate and the terms often are perceived as exceedingly broad and restrictive. The Uniform Computer Information Transactions Act is designed to remedy those problems and establish the general enforceability of such agreements, with certain qualifications related to unconscionability, assent, and other caveats. UCITA, however, does not resolve, or even purport to resolve, the tension between federal copyright law and state contract law. This Note analyzes UCITA's attempt to resolve the enforceability issue; argues for an approach to preemption that promotes clarity and preserves the objectives …


Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed Oct 1998

Controlling World Wide Web Links, Property Rights, Access Rights And Unfair Competition, Chris Reed

Indiana Journal of Global Legal Studies

No abstract provided.


Domain Names, Globalization, And Internet Governance, Marshall Leaffer Oct 1998

Domain Names, Globalization, And Internet Governance, Marshall Leaffer

Indiana Journal of Global Legal Studies

No abstract provided.


Considering Multiple And Overlapping Sovereignties: Liberalism, Libertarianism, National Sovereignty, "Global" Intellectual Property, And The Internet, Keith Aoki Apr 1998

Considering Multiple And Overlapping Sovereignties: Liberalism, Libertarianism, National Sovereignty, "Global" Intellectual Property, And The Internet, Keith Aoki

Indiana Journal of Global Legal Studies

No abstract provided.


The Internet And The Abiding Significance Of Territorial Sovereignty, Jack L. Goldsmith Apr 1998

The Internet And The Abiding Significance Of Territorial Sovereignty, Jack L. Goldsmith

Indiana Journal of Global Legal Studies

No abstract provided.


The Internet As A Threat To Sovereignty? Thoughts On The Internet's Role In Strengthening National And Global Governance, Henry H. Perritt Jr. Apr 1998

The Internet As A Threat To Sovereignty? Thoughts On The Internet's Role In Strengthening National And Global Governance, Henry H. Perritt Jr.

Indiana Journal of Global Legal Studies

No abstract provided.


Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer Apr 1998

Cyberspatial Sovereignties: Offshore Finance, Digital Cash, And The Limits Of Liberalism, Bill Maurer

Indiana Journal of Global Legal Studies

No abstract provided.


The "Unsettled Paradox": The Internet, The State, And The Consent Of The Governed, David G. Post Apr 1998

The "Unsettled Paradox": The Internet, The State, And The Consent Of The Governed, David G. Post

Indiana Journal of Global Legal Studies

No abstract provided.