Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 118

Full-Text Articles in Law

The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang Mar 2024

The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang

Duke Law & Technology Review

Higher education institutions (HEIs) are highly susceptible to cyberattacks, particularly those facilitated through phishing, due to the substantial volume of confidential student and staff data and valuable research information they hold. Despite federal legislations focusing on bolstering cybersecurity for critical institutions handling medical and financial data, HEIs have not received similar attention. This Note examines the minimal obligations imposed on HEIs by existing federal and state statutes concerning data breaches, the absence of requirements for HEIs to educate employees and students about phishing attacks, and potential strategies to improve student protection against data breaches.


Any Safe Harbor In A Storm: Sesta-Fosta And The Future Of § 230 Of The Communications Decency Act, Charles Matula May 2020

Any Safe Harbor In A Storm: Sesta-Fosta And The Future Of § 230 Of The Communications Decency Act, Charles Matula

Duke Law & Technology Review

No abstract provided.


Esports, Player Positions, And The Benefits Of Unionization, Roshan Patel Jan 2020

Esports, Player Positions, And The Benefits Of Unionization, Roshan Patel

Duke Law & Technology Review

No abstract provided.


What Didn’T Happen: An Essay In Speculation, Peter Jaszi Aug 2019

What Didn’T Happen: An Essay In Speculation, Peter Jaszi

Duke Law & Technology Review

No abstract provided.


Revisiting Barlow's Misplaced Optimism, Benjamin Edelman Aug 2019

Revisiting Barlow's Misplaced Optimism, Benjamin Edelman

Duke Law & Technology Review

No abstract provided.


Is The Internet Over?! (Again?), James Boyle Aug 2019

Is The Internet Over?! (Again?), James Boyle

Duke Law & Technology Review

No abstract provided.


A Declaration Of The Independence Of Cyberspace, John Perry Barlow Aug 2019

A Declaration Of The Independence Of Cyberspace, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


A Political Economy Of Utopia?, Yochai Benkler Aug 2019

A Political Economy Of Utopia?, Yochai Benkler

Duke Law & Technology Review

No abstract provided.


Barlow's Legacy, Cory Doctorow Aug 2019

Barlow's Legacy, Cory Doctorow

Duke Law & Technology Review

No abstract provided.


Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder Aug 2019

Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle

Duke Law & Technology Review

No abstract provided.


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto Aug 2019

The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto

Duke Law & Technology Review

No abstract provided.


Imaginary Bottles, Jessica Litman Aug 2019

Imaginary Bottles, Jessica Litman

Duke Law & Technology Review

No abstract provided.


John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain Aug 2019

John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain

Duke Law & Technology Review

No abstract provided.


A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson Aug 2019

A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson

Duke Law & Technology Review

No abstract provided.


Inventing The Future: Barlow And Beyond, Cindy Cohn Aug 2019

Inventing The Future: Barlow And Beyond, Cindy Cohn

Duke Law & Technology Review

No abstract provided.


Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen Aug 2019

Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Where To Prosecute Cybercrimes, Jacob T. Wall May 2019

Where To Prosecute Cybercrimes, Jacob T. Wall

Duke Law & Technology Review

Selecting the appropriate venue for a criminal trial has been a matter of constitutional concern since the founding of the country. The issue is thought to be essential to the fair administration of justice and thus public confidence in the criminal justice system. Constitutionally, crimes must be prosecuted in the states and districts in which they were committed. However, the rise of cybercrime has complicated the venue inquiry: cyberspace, the domain of cybercrime, and physical space have become increasingly decoupled. Consequently, under America’s primary but dated cybercrime law, the ideal location for a trial may not be a constitutionally proper …


Defining And Regulating Cryptocurrency: Fake Internet Money Or Legitimate Medium Of Exchange?, Susan Alkadri Dec 2018

Defining And Regulating Cryptocurrency: Fake Internet Money Or Legitimate Medium Of Exchange?, Susan Alkadri

Duke Law & Technology Review

Digitalization makes almost everything quicker, sleeker, and more efficient. Many argue cryptocurrency is the future of money and payment transfers. This paper explores how the unique nature of cryptocurrencies creates barriers to a strict application of traditional regulatory strategies. Indeed, state and federal regulators remain uncertain if and how they can regulate this cutting-edge technology. Cryptocurrency businesses face difficulty navigating the unclear regulatory landscape, and consumers frequently fall prey to misinformation. To reconcile these concerns, this paper asserts cryptocurrency functions as “currency” or “money” and should be treated as such for regulatory purposes. It also proposes each state implement a …


Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire Nov 2018

Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire

Duke Law & Technology Review

The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate students’ constitutional …


These Walls Can Talk! Securing Digital Privacy In The Smart Home Under The Fourth Amendment, Stefan Ducich Mar 2018

These Walls Can Talk! Securing Digital Privacy In The Smart Home Under The Fourth Amendment, Stefan Ducich

Duke Law & Technology Review

Privacy law in the United States has not kept pace with the realities of technological development, nor the growing reliance on the Internet of Things (IoT). As of now, the law has not adequately secured the “smart” home from intrusion by the state, and the Supreme Court further eroded digital privacy by conflating the common law concepts of trespass and exclusion in United States v. Jones. This article argues that the Court must correct this misstep by explicitly recognizing the method by which the Founding Fathers sought to “secure” houses and effects under the Fourth Amendment. Namely, the Court must …


Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer Mar 2018

Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer

Duke Law & Technology Review

The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership …


Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris Feb 2018

Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris

Duke Law & Technology Review

The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be …


Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett Jan 2018

Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett

Duke Law & Technology Review

Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection. Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …


Websites As Facilities Under Ada Title Iii, Ryan C. Brunner Mar 2017

Websites As Facilities Under Ada Title Iii, Ryan C. Brunner

Duke Law & Technology Review

Title III of the Americans with Disabilities Act requires public accommodations—private entities that offer goods or services to the public—to be accessible to individuals with disabilities. There is an ongoing debate about whether Title III applies to websites that offer services to the public, but this debate may be resolved in the coming years by litigation or Department of Justice regulations. Assuming for the sake of argument that Title III will eventually be applied to websites, the next inquiry is what that application should look like. The regulatory definition of “facilities” should be amended to include nonphysical places of public …


Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones Feb 2017

Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones

Duke Law & Technology Review

Under the Supreme Court’s holding in Tinker v. Des Moines Independent Community School District, public schools may only restrict student speech where the speech is reasonably forecasted to cause a “substantial and material disruption.” With online forums calling into question who may control speech and forecast its impact, the circuit courts have granted public schools broad authority to monitor, and punish, their students for online activity that occurs off-campus. The Supreme Court recently declined the opportunity to reverse this disturbing trend by denying certiorari for Bell v. Itawamba County. As a result, questions remain unanswered regarding students’ right to free …


Legal Nature Of Emails: A Comparative Perspective, Edina Harbinja Feb 2016

Legal Nature Of Emails: A Comparative Perspective, Edina Harbinja

Duke Law & Technology Review

There is currently a conflict between laws and the market in their treatment of email. Laws mandate that emails are not protected as property unless copyrightable or protected by another legal mechanism. But the market suggests that emails are user-owned property without further qualification. Moreover, the nature of email is treated slightly differently between the U.S. and U.K. legal regimes. While the current legal regimes applicable to email in the U.K. and U.S. are reasonable, legal harmonization within these systems, and with the service provider market, should be achieved.


The Case For Capsl: Architectural Solutions To Licensing And Distribution In Emerging Music Markets, Cody Duncan Jul 2015

The Case For Capsl: Architectural Solutions To Licensing And Distribution In Emerging Music Markets, Cody Duncan

Duke Law & Technology Review

Compulsory licensing in music has paved the way for a limited class of new noninteractive services. However, innovation and competition are stifled in the field of interactive or otherwise novel services due to high transaction costs inherent in direct licensing. While the creation of a new compulsory license available to a wider array of services may facilitate growth and diversity in new markets, it is unlikely that the legislative process can deliver a new compulsory regime in time to serve relevant interests. Furthermore, the risk exists that legislation written in response to contemporary technology will likely fail to recognize the …