Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Doxing; cyberharassment; interstate communications statute; criminal law (2)
- Communications law; communications decency act; computer law; internet law (1)
- Computer law; computer fraud anad abuse act; criminal law; civil law (1)
- Social media; First Amendment; state legislation; sex offenders; criminal law (1)
- Sports law; computer law; administrative law; esports; video games; gaming; regulation; internet law (1)
Articles 1 - 6 of 6
Full-Text Articles in Law
Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb
Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb
Fordham Law Review
Under the current interpretations of authorization, instances where an individual harmlessly accesses the cloud data of another user could be classified as hacking and a violation of this federal statute. As such, this Note demonstrates that all of the current interpretations of the CFAA are too broad because they could result in this nonsensical outcome. This Note accordingly proposes an amendment to the CFAA specifically addressing user access to data on the cloud. Such an amendment would eliminate the unusual result of innocuous cloud-computing users being deemed hackers under federal law.
Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble
Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble
Fordham Law Review
This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under the revised …
“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao
“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao
Fordham Law Review
The popularity of “esports,” also known as “electronic sports” or competitive video gaming, has exploded in recent years and captured the attention of cord-cutting millennials—often to the detriment of sports such as basketball, football, baseball, and hockey. In the United States, the commercial dominance of such traditional sports stems from decades of regulatory support. Consequently, while esports regulation is likely to emulate many aspects of traditional sports governance, the esports industry is fraught with challenges that inhibit sophisticated ownership and capital investment. Domestic regulation is complicated by underlying intellectual property ownership and ancillary considerations such as fluctuations in a video …
The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister
The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister
Fordham Law Review
In recent years, malevolent actors have seized upon a new tool to harass, silence, threaten, and injure people online: doxing—the malicious publication of personal identifying information like a home address. Although doxing is an online tool, it causes concrete and serious harm to victims by moving harassment from the Internet to the physical world. Congress and state legislatures have begun to address different forms of cyberharassment. However, no effective and consistent legal remedy for doxing currently exists. This Note examines and critiques current federal and state schemes, and it ultimately proposes that lower federal courts should adopt a new intent …
The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister
The Doxing Dilemma: Seeking A Remedy For The Malicious Publication Of Personal Information, Julia M. Macallister
Fordham Law Review
In recent years, malevolent actors have seized upon a new tool to harass, silence, threaten, and injure people online: doxing—the malicious publication of personal identifying information like a home address. Although doxing is an online tool, it causes concrete and serious harm to victims by moving harassment from the Internet to the physical world. Congress and state legislatures have begun to address different forms of cyberharassment. However, no effective and consistent legal remedy for doxing currently exists. This Note examines and critiques current federal and state schemes, and it ultimately proposes that lower federal courts should adopt a new intent …
Updating The Social Network: How Outdated And Unclear State Legislation Violates Sex Offenders’ First Amendment Rights, Elizabeth Tolon
Updating The Social Network: How Outdated And Unclear State Legislation Violates Sex Offenders’ First Amendment Rights, Elizabeth Tolon
Fordham Law Review
Readily available on computers, phones, tablets, or television, social media has become a necessary platform of expression for many. But, for others, social media is an inaccessible tool whose very use has criminal repercussions. To protect innocent children, many states have enacted legislation restricting sex offenders’ access to social media. Unfortunately, this legislation is often outdated, overly restrictive, and unconstitutional under the First Amendment. North Carolina has recently attracted national attention, as its statute highlights the potential constitutional issues states face in drafting such legislation. To avoid the constitutional concerns that North Carolina faces, state legislators must draft statutes narrowly …