Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Law (68)
- Law and Technology (64)
- Science and Technology (42)
- Intellectual Property Law (36)
- Communications Law (26)
-
- Privacy (18)
- Copyright Law (17)
- International Law (16)
- Consumer Protection Law (15)
- Law and Society (13)
- Copyright (12)
- Constitutional Law (11)
- Arts and Entertainment (10)
- Administrative Law (9)
- Bruno (9)
- Commercial Law (9)
- Costantini (9)
- Data protection (9)
- First Amendment (9)
- Intellectual Property and Information Technology (9)
- Network neutrality (8)
- Presentaciones (8)
- Contracts (7)
- Corporations (7)
- Public Law and Legal Theory (7)
- Comparative and Foreign Law (6)
- Derecho (6)
- Facebook (6)
- Intellectual Property (6)
- Internet (6)
- Publication Year
- Publication
-
- Matthew Rimmer (31)
- Bruno L. Costantini García (16)
- Rob Frieden (9)
- Edward Ivan Cueva (7)
- Dr Rebecca Wong (6)
-
- Franck Dumortier (6)
- Jonathan I. Ezor (5)
- Lawrence J. Trautman Sr. (5)
- Aaron K. Perzanowski (4)
- Scott Shackelford (4)
- Angela Goodrum (3)
- Curtis E.A. Karnow (3)
- Curtis J Neeley Jr (3)
- Guido Noto La Diega (3)
- Hari Priya (3)
- Karen McCullagh (2)
- Konstantinos Stylianou (2)
- Kyle Langvardt (2)
- Panagiotis Kitsos (2)
- Ran Bi (2)
- Sharon K. Sandeen (2)
- Vincent J Roth Esq (2)
- Adam Lamparello (1)
- Ahad Syed (1)
- Akiva A Miller (1)
- Alex Steel (1)
- Allison L Tungate (1)
- Andres Guadamuz (1)
- Andrew J Daddono (1)
- Andrew Leahey (1)
- File Type
Articles 31 - 60 of 176
Full-Text Articles in Law
The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden
Rob Frieden
This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …
The Replicator And The First Amendment, Kyle Langvardt
The Replicator And The First Amendment, Kyle Langvardt
Kyle Langvardt
As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights. This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first law review …
Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega
Cloud Computing E Protezione Dei Dati Nel Web 3.0 (Cloud Computing And Data Protection In The Web 3.0), Guido Noto La Diega
Guido Noto La Diega
‘Cloud computing’ in simplified terms can be understood as the storing, processing and use of data on remotely located computers accessed over the internet. This means that users can command almost unlimited computing power on demand, that they do not have to make major capital investments to fulfil their needs and that they can get to their data from anywhere with an internet connection (COM(2012) 529 final, unleashing the potential of cloud computing in Europe). The essay focuses on the problems of privacy and data security in european law and italian law from the perspective of cloud computing. Italian Abstract: …
Bare Necessities: The Argument For A “Revenge Porn” Exception In Section 230 Immunity, Allison L. Tungate
Bare Necessities: The Argument For A “Revenge Porn” Exception In Section 230 Immunity, Allison L. Tungate
Allison L Tungate
No abstract provided.
Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman
Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman
Bill D. Herman
With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …
Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe
Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe
Nicholas A Wolfe
Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?
The Computer Fraud and Abuse Act was designed to draw this …
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Sharon K. Sandeen
As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.
While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Sharon K. Sandeen
As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.
While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …
Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao
Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao
Michael A. Alao
School districts rely on information systems to a similar extent as private, business organizations, yet the rules and regulations to ensure that school districts maintain adequate security to prevent data breaches and theft have failed to keep pace with private-sector developments. Advances in the private sector include notice-of-breach laws, consumer protection laws limiting individual liability for fraudulent electronic funds transfers, and auditing and reporting of internal controls. The public sector, including school districts, has also made advances in cyber security rules and regulations, but to a more limited extent than the private sector. Because of the sheer number of public …
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Timothy A Wiseman
Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.
This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Watt Lesley Black Jr.
This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Summary Judgment Motion, Curtis J. Neeley Jr
Summary Judgment Motion, Curtis J. Neeley Jr
Curtis J Neeley Jr
Read the ignored motion or ignore it like Hon Timothy L. Brooks already did.
Complaint For Violation Of Communications Privacy & Computer Frauds, Curtis J. Neeley Jr
Complaint For Violation Of Communications Privacy & Computer Frauds, Curtis J. Neeley Jr
Curtis J Neeley Jr
GOOG violations of communications privacy & computer frauds
Brief Supporting Summary Judgment Motion, Curtis J. Neeley Jr
Brief Supporting Summary Judgment Motion, Curtis J. Neeley Jr
Curtis J Neeley Jr
Brief Supporting IGNORED Motion for Summary Judgment
How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum
Angela Goodrum
No abstract provided.
New Models And Conflicts In The Interconnection And Delivery, Rob Frieden
New Models And Conflicts In The Interconnection And Delivery, Rob Frieden
Rob Frieden
As the Internet has evolved and diversified, interconnection terms and conditions have changed between Internet Service Providers (“ISPs”). These carriers experiment with alternatives to conventional models that classify interconnection as either peering or transiting. The former typically involves interconnection between high capacity carriers whose transoceanic traffic volumes generally match thereby eliminating the need for a transfer of funds. Historically smaller carriers have paid transit fees to larger Tier-1 ISPs for the opportunity to secure upstream links throughout the Internet cloud. With the growing availability of bandwidth intensive, video content carried via the Internet, traffic volume disparities have increased between ISPs. …
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …
Data Scraping And Abuse Of Dominance In Travel Services: Story Of An Antitrust Guerrilla, Valerio Cosimo Romano
Data Scraping And Abuse Of Dominance In Travel Services: Story Of An Antitrust Guerrilla, Valerio Cosimo Romano
Valerio Cosimo Romano
No abstract provided.
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Benton C. Martin
This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
Vincent J Roth Esq
Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
Vincent J Roth Esq
Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …
Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou
Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou
Chang Zhou
No abstract provided.
I Programmi Per Elaboratore E I Confini Del Diritto D'Autore. La Corte Di Giustizia Nega La Tutela A Funzionalità, Linguaggio Di Programmazione E Formato Dei File Di Dati (Computer Programs And The Boundaries Of Copyright: The Court Of Justice Denies Protection To Functionalities, Programming Language And Formats Of Data Files), Guido Noto La Diega
Guido Noto La Diega
A comment to the Sas Institute Inc. v. World Programming Ltd case [Court of Justice, Grand Chamber, 2 May 2012, C-406/10]. It is one of the most important European decisions in the field of computer programs and it is notable both from a practical and a theoretical point of view. The European Court of Justice denies protection to functionalities, programming language and format of data files, because they have to be considered as 'ideas' and not as 'expression'. The idea/expression dichotomy, often called into question especially in software copyright, is placed at the core of a not anymore ignorable, both …
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum
Angela Goodrum
No abstract provided.