Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Public Forum 2.0, Lyrissa Barnett Lidsky Apr 2016

Public Forum 2.0, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Oct 2013

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Patricia L. Bellia

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …


The Memory Gap In Surveillance Law, Patricia L. Bellia Oct 2013

The Memory Gap In Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Oct 2013

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Patricia L. Bellia

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm Aug 2013

Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm

James Grimmelmann

No abstract provided.


Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor Feb 2013

Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor

Jonathan I. Ezor

No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.


Super-Intermediaries, Code, Human Rights, Ira Nathenson Jan 2013

Super-Intermediaries, Code, Human Rights, Ira Nathenson

Ira Steven Nathenson

We live in an age of intermediated network communications. Although the internet includes many intermediaries, some stand heads and shoulders above the rest. This article examines some of the responsibilities of “Super-Intermediaries” such as YouTube, Twitter, and Facebook, intermediaries that have tremendous power over their users’ human rights. After considering the controversy arising from the incendiary YouTube video Innocence of Muslims, the article suggests that Super-Intermediaries face a difficult and likely impossible mission of fully servicing the broad tapestry of human rights contained in the International Bill of Human Rights. The article further considers how intermediary content-control procedures focus too …


Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq. Oct 2012

Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author analyzes and describes the necessary elements of a successful social media and Internet corporate policy; through citing common pitfalls and learning lessons from different jurisdictions across the world. The author then offers general guidelines on policies for Mexican enterprises under Mexican legislation.///////////////////////////////////////////////////////////////////////////////////////El autor analiza y describe los elementos necesarios de una política corporativa sobre internet y redes sociales exitosa, citando los errores más comunes y aprendiendo lecciones de las legislaciones de distintos países.


Navigating The Uncharted Waters Of Teaching Law With Online Simulations, Ira Steven Nathenson Jan 2012

Navigating The Uncharted Waters Of Teaching Law With Online Simulations, Ira Steven Nathenson

Ira Steven Nathenson

The Internet is more than a place where the Millennial Generation communicates, plays, and shops. It is also a medium that raises issues central to nearly every existing field of legal doctrine, whether basic (such as Torts, Property, or Contracts) or advanced (such as Intellectual Property, Criminal Procedure, or Securities Regulation). This creates tremendous opportunities for legal educators interested in using the live Internet for experiential education. This Article examines how live websites can be used to create engaging and holistic simulations that tie together doctrine, theory, skills, and values in ways impossible to achieve with the case method. In …


Teaching Law With Online Role-Playing Simulations, Ira Nathenson Jun 2011

Teaching Law With Online Role-Playing Simulations, Ira Nathenson

Ira Steven Nathenson

This document contains materials prepared for the summer 2011 conference of the Institute for Law Teaching and Learning held at New York Law School. The concise materials include: a listing of useful online tools; documentation for a miniature simulation; suggested components of an "associate" case file; methodology for formative and summative evaluation; and a sample scoresheet incorporating all ten MacCrate skills. A summary of the presentation is provided below: Live websites provide a dynamic “sandbox” for role-playing simulations that cast students as “lawyers” acting for fictional clients. Such simulations, initially crafted for a Cyberlaw class, can also be used in …


Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias Apr 2009

Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias

Tim Iglesias

This presentation argues that the internet offers both great promise and possible peril for anti-discrimination in housing. The potential for self-regulation is mixed but ultimately weak. The presentation concludes with a call for federal regulatory reform.


The Reclassification Of Extreme Pornographic Images, Andrew D. Murray Jan 2009

The Reclassification Of Extreme Pornographic Images, Andrew D. Murray

Professor Andrew D Murray

Legal controls over the importation and supply of pornographic imagery promulgated nearly half a century ago in the Obscene Publications Acts have proven to be inadequate to deal with the challenge of the internet age. With pornographic imagery more readily accessible in the UK than at any time in our history, legislators have been faced with the challenge of stemming the tide. One particular problem has been the ready accessibility of extreme images which mix sex and violence or which portray necrophilia or bestiality. This article examines the Government’s attempt to control the availability of such material through s.63 of …


Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson Jan 2009

Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson

Ira Steven Nathenson

Like a ballet, the notice-and-take-down provisions of the Digital Millennium Copyright Act ("DMCA") provide complex procedures to obtain take-downs of online infringement. Copyright owners send notices of infringement to service providers, who in turn remove claimed infringement in exchange for a statutory safe harbor from copyright liability. But like a dance meant for two, the DMCA is less effective in protecting the "third wheel," the users of internet services. Even Senator John McCain - who in 1998 voted for the DMCA - wrote in exasperation to YouTube after some of his presidential campaign videos were removed due to take-downs. McCain …


Virtual Third Parties, Michael Risch Dec 2008

Virtual Third Parties, Michael Risch

Michael Risch

In virtual worlds, where 20 million people spend $200 million each year, rules of life are governed by contract, and three-party transactions are ubiquitous; every exchange of virtual cash, property, sound, pictures, and even conversation introduces a third party into the contractual relationship between user and virtual-world provider. Whenever a contract affects a non-party, the third-party beneficiary ("TPB") doctrine might apply; to date, however, the practical and theoretical boundaries of this important doctrine's application to virtual worlds have yet to be explored, perhaps because of an overly narrow doctrinal conception. Many states have loosened TPB requirements somewhat; most have adopted …


Virtual Rule Of Law, Michael Risch Dec 2008

Virtual Rule Of Law, Michael Risch

Michael Risch

This article, which follows a presentation at the West Virginia Law Review Digital Entrepreneurship Symposium, is the first to consider whether virtual worlds provide a rule of law that sets expectations for virtual business. Many consider the rule of law a catalyst for economic development, and there is reason to believe that it will be equally important in virtual economies, despite differences from the real world. As more people turn to virtual worlds to earn a livelihood, the rule of law will become prominent in encouraging investments in virtual business. The article finds – unsurprisingly – that virtual worlds now …


Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia Dec 2007

Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain Dec 2005

Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain

Jonathan Zittrain

We assess the impact of spam that touts stocks upon the trading activity of those stocks and sketch how profitable such spamming might be for spammers and how harmful it is to those who heed advice in stock-touting e-mails. We find convincing evidence that stock prices are being manipulated through spam. We suggest that the effectiveness of spammed stock touting calls into question prevailing models of securities regulation that rely principally on the proper labeling of information and disclosure of conflicts of interest as means of protecting consumers, and we propose several regulatory and industry interventions. Based on a large …


O Fim Dos Intermediários?., Ivo T. Gico Dec 1999

O Fim Dos Intermediários?., Ivo T. Gico

Ivo Teixeira Gico Jr.

Neste artigo, o autor discute a perda gradativa da importância do intermediário comercial face o desenvolvimento do comércio eletrônico e seu novo papel na logística.

In this article, the author discusses the gradual loss of importance of the middlemen against the electronic commerce development and its new role in logistics.


Showdown At The Domain Name Corral: Property Rights And Personal Jurisdiction Over Squatters, Poachers And Other Parasites, Ira Nathenson Jan 1997

Showdown At The Domain Name Corral: Property Rights And Personal Jurisdiction Over Squatters, Poachers And Other Parasites, Ira Nathenson

Ira Steven Nathenson

This paper on domain names disputes has two main goals. The first is to analyze the principal points of litigation in domain name disputes, namely, personal jurisdiction and trademark liability. The second is to propose an analytic framework to better help resolve matters of jurisdiction and liability. Regarding personal jurisdiction, domain names are problematic because an internet site can be viewed almost anywhere, potentially subjecting the domain name owner to suit everywhere. For example, should a Florida domain name owner automatically be subject to suit in Alaska where the site can be viewed? If not, then where? Regarding liability, trademark …