Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Law

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


The Internet Of Bodies, Andrea M. Matwyshyn Oct 2019

The Internet Of Bodies, Andrea M. Matwyshyn

William & Mary Law Review

This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …


The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman Jan 2019

The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman

Catholic University Journal of Law and Technology

More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …


Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny Jan 2018

Consumer Protection In The Age Of Connected Everything, Terrell Mcsweeny

NYLS Law Review

No abstract provided.


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Mobile Banking: The Answer For The Unbanked In America?, Catherine Martin Christopher Mar 2016

Mobile Banking: The Answer For The Unbanked In America?, Catherine Martin Christopher

Catholic University Law Review

In the United States, the poor often lack access to mainstream banking services. Instead, they rely on expensive, poorly regulated alternatives like check cashers, payday lenders, pawnshops, and auto title lenders. These financial products jeopardize poor people’s financial and physical security. In pushing adoption of traditional banking products, both government officials and private enterprise have attempted to craft solutions to the banking access problem, but so far these attempts have fallen short. This Article asserts that mobile banking may be a transformative technology that can significantly increase financial inclusion in the United States.

The Article discusses current statistics and demographics …


Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin Jul 2015

Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin

Akron Law Review

Participants in online auctions use a variety of payment mechanisms, but checks and money orders still represent the most commonly used means of payment. Credit cards afford greater protection to buyers, but until recently payment by credit card was not even an option for person-to-person transactions. However, several online payment services have been established that enable individuals to make credit card payments to one another, generally with the payment service acting as an intermediary. These services are growing rapidly, mainly because of the speed and convenience that they offer. Yet relatively little attention has been paid to the risks and …


Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert Oct 2012

Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert

Pepperdine Law Review

No abstract provided.


Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn May 2012

Behavioral Advertising: The Cryptic Hunter And Gatherer Of The Internet, Joanna Penn

Federal Communications Law Journal

In an era where three out of every four Americans have Internet access, the term "surfing" has transformed from riding waves into running the risk of having private information gathered, stored, and disseminated-all without the user's knowledge or permission. This new found online practice, known as "behavioral advertising," is a veritable goldmine for those companies that know the game. But will the FTC or Congress soon make new rules concerning how to play? This Note begins by explaining the differences between behavioral targeting and retargeting and the techniques that the two methods use to collect data. This Note then explores …


Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons Dec 2010

Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons

University of Michigan Journal of Law Reform

This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


The Law Of Unintended Consequences, Susan Ness Jun 2006

The Law Of Unintended Consequences, Susan Ness

Federal Communications Law Journal

No abstract provided.


The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra Jun 2006

The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra

Federal Communications Law Journal

No abstract provided.


Rankings, Reductionism, And Responsibility , Frank Pasquale Jan 2006

Rankings, Reductionism, And Responsibility , Frank Pasquale

Cleveland State Law Review

After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


Protecting Privacy And Enabling Pharmaceutical Sales On The Internet: A Comparative Analysis Of The United States And Canada, Nicole A. Rothstein Mar 2001

Protecting Privacy And Enabling Pharmaceutical Sales On The Internet: A Comparative Analysis Of The United States And Canada, Nicole A. Rothstein

Federal Communications Law Journal

The Internet raises enhanced and unique concerns regarding informational health privacy and Internet pharmacy sales. As technology advances and the Internet changes the way people obtain medical services and products, protecting consumers and their informational health data in online pharmaceutical transactions is paramount. This Comment charts and compares the existing legal frameworks in the United States and Canada relative to informational health privacy. Following this discussion, each legal framework comes into sharp focus with regard to Internet pharmacy sales. Ultimately, this Comment concludes that based on the highly sensitive nature of personal medical information, a baseline privacy standard should be …


"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat Jan 2000

"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat

Seattle University Law Review

Although there are a wide array of unresolved trademark issues with regard to the Internet, this Comment will not address disputes involving anything beyond the visible content of an individual's website. Domain name and meta-tag issues, though often referenced in order to demonstrate trends in analysis, are not the subjects of this inquiry. Rather, this Comment will focus on the triumvirate of claims most frequently asserted against individual web masters in the battle over the propriety of consumer commentary: trademark infringement, unfair competition, and trademark dilution. A recent court decision, Bally Total Fitness v. Faber, provides an example of the …


Networked Health Information: Assuring Quality Control On The Internet, Kristin B. Keltner Mar 1998

Networked Health Information: Assuring Quality Control On The Internet, Kristin B. Keltner

Federal Communications Law Journal

The Clinton Administration's Health Information and Applications Working Group promotes networked health information provided to all citizens through the Internet as one way to lower health care costs while improving the health of Americans. Managed care organizations and private health information providers already use the World Wide Web to disseminate consumer health information to broad segments of society. No standards exist to ensure that the information these Web sites carry is accurate and otherwise free from corruption. Disclaimers as to the reliability of the information as well as to the responsibility of the information provider for any harm caused by …


The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver Dec 1997

The Information Superhighway: Trolls At The Tollgate, Charles M. Oliver

Federal Communications Law Journal

Prior to the passage of the 1996 Telecommunications Act, policymakers sought funding and regulatory mechanisms capable of fulfilling the vision of an Information Superhighway. Vice President Gore, the Clinton Administration's point person on the issue, initially proposed assessing fees on other sectors of the telecommunications industry to fund construction. Meanwhile, conservatives asserted that deregulation of the industry would achieve the desired result. A compromise ultimately was reached: the 1996 Act requires local exchange carriers to unbundle their networks and provide access at a reasonable cost to competitors. The use of regulatory formulas in lieu of taxes to subsidize a national …


The Telecommunications Act Of 1996: Codifying The Digital Divide, Allen S. Hammond Iv Dec 1997

The Telecommunications Act Of 1996: Codifying The Digital Divide, Allen S. Hammond Iv

Federal Communications Law Journal

The Telecommunications Act of 1996 purports to ensure every American eventual access to advanced telecommunications networks and services, and more immediate access to basic telephone networks and services. This access is essential because it determines the ease with which Americans can acquire an education, obtain employment, control financial affairs, access emergency assistance, and participate in the political process. The interpretation and implementation of the 1996 Act is critical because there is an imminent danger that a large portion of society— in inner cities, near suburbs, and small towns— not be connected to the "national electronic nervous system." To ensure that …