Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

PDF

Series

Internet

Institution
Publication Year
Publication

Articles 31 - 60 of 182

Full-Text Articles in Law

Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello Jan 2017

Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello

Articles

There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Against Data Exceptionalism, Andrew Keane Woods Apr 2016

Against Data Exceptionalism, Andrew Keane Woods

Law Faculty Scholarly Articles

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …


Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman Jul 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame Mar 2015

Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame

Department of Political Science and Law Faculty Scholarship and Creative Works

The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged from 25.5 percent to …


At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld Mar 2015

At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld

Articles

On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …


Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods Jan 2015

Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods

Law Faculty Scholarly Articles

The global nature of today’s Internet services presents a unique challenge to international law enforcement cooperation. On a daily basis, law enforcement agents in one country seek access to data that is beyond their jurisdictional reach; as one industry analyst put it, there has been, “an internationalization of evidence.” In order to gain lawful access to data that is subject to another state’s jurisdiction, law enforcement agents must request mutual legal assistance (MLA) from the country that can legally compel the data’s disclosure. But the MLA regime has not been updated to manage the enormous rise of requests for MLA. …


Trust And Social Commerce, Julia Y. Lee Jan 2015

Trust And Social Commerce, Julia Y. Lee

Journal Articles

Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.

The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble Jan 2015

The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble

Scholarly Works

From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.

This Article posits that …


Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman Jan 2015

Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman

Articles & Chapters

This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”

The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …


Authors, Online, Daniel J. Gervais Jan 2015

Authors, Online, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …


Recent Journalism Awards Won By "Old," "New," And "Hybrid" Media, Robert H. Lande, Thomas J. Horton, Virginia Callahan Dec 2014

Recent Journalism Awards Won By "Old," "New," And "Hybrid" Media, Robert H. Lande, Thomas J. Horton, Virginia Callahan

All Faculty Scholarship

This compares the quality of the "old" media to that of the "new" media by determining how often each type of media source wins major journalism awards. It divides media sources into three categories: old, new and hybrid. New media is limited to publications that were started purely as online news publications. Old media is classified in the traditional sense to include such newspapers as the New York Times. Hybrid media combines elements of both new and old media. Our research compares the number of Pulitzer Prizes and other major journalism awards won by these three types of media sources …


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson Jan 2014

Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll Jan 2014

Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …


Teenage Crowdfunding, Andrew A. Schwartz Jan 2014

Teenage Crowdfunding, Andrew A. Schwartz

Publications

Teenage startups are in the public interest and should be encouraged, yet the federal CARD Act of 2009 eliminated credit card financing for many such companies, cutting off an important source of early-stage business capital for teenage entrepreneurs. Since then, however, Congress passed the CROWDFUND Act of 2012 which will allow teenagers to raise early-stage financing through Internet crowdfunding. Teens, being masters of the Internet, are well positioned to exploit this new opportunity, with the upshot being that securities crowdfunding may become an important way for youthful entrepreneurs to fund their business dreams.


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman Jan 2014

Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman

All Faculty Scholarship

Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …


Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet Jan 2014

Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet

Publications

The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane Jan 2014

After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane

Articles

The Federal Trade Commission's (“FTC” or “the commission”) January 3, 2013 decision to close its longstanding investigation of Google1 brings to a close a flurry of discussion over the possibility that Google could become subject to a “search neutrality” principle in the United States. Although the Commission found against Google on several grounds, it rejected petitions from Google's critics to create a search neutrality principle as a matter of antitrust law. This essay briefly analyzes what remains of U.S. antitrust scrutiny of Internet search bias after the Google settlement. In particular, it suggests that a sensible line can be drawn …


Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande Sep 2013

Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande

All Faculty Scholarship

This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast …


Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park Apr 2013

Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park

Management Faculty Publications and Presentations

No abstract provided.


The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga Jan 2013

The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga

Law Faculty Publications

Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …