Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Series

2008

Institution
Keyword
Publication
File Type

Articles 31 - 44 of 44

Full-Text Articles in Law

Government Data Mining: The Need For A Legal Framework, Fred H. Cate Jan 2008

Government Data Mining: The Need For A Legal Framework, Fred H. Cate

Articles by Maurer Faculty

The article examines the government's growing appetite for collecting personal data. Often justified on the basis of protecting national security, government data mining programs sweep up data collected through hundreds of regulatory and administrative programs, and combine them with huge datasets obtained from industry. The result is an aggregation of personal data - the "digital footprints" of individual lives - never before seen. These data warehouses are then used to determine who can work and participate in Social Security programs, who can board airplanes and enter government buildings, and who is likely to pose a threat in the future, even …


Asterisk Revisited: Debating A Right Of Reply On Search Results, Frank Pasquale Jan 2008

Asterisk Revisited: Debating A Right Of Reply On Search Results, Frank Pasquale

Faculty Scholarship

No abstract provided.


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Jan 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Articles

When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Who Owns 'Hillary.Com'? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton Jan 2008

Who Owns 'Hillary.Com'? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton

Articles

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns "hillaryclinton.com", the more generic "hillary.com" is registered to a software firm, Hillary Software, Inc. What about "hillary2008.com"? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


Technological Due Process, Danielle K. Citron Jan 2008

Technological Due Process, Danielle K. Citron

Faculty Scholarship

Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason.

The dichotomy between these procedural regimes has become outmoded. This century's automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …


The Next Frontier For Network Neutrality, Philip J. Weiser Jan 2008

The Next Frontier For Network Neutrality, Philip J. Weiser

Publications

The challenge for policymakers evaluating calls to institute some form of network neutrality regulation is to bring reasoned analysis to bear on a topic that continues to generate more heat than light and that many telecommunications companies appear to believe will just fade away. Over the fall of 2007, the hopes of broadband providers that broadband networks could escape any form of regulatory oversight were dealt a blow when it was revealed that Comcast had degraded the experience of some users of Bittorent (a peer-to-peer application) and engaged in an undisclosed form of network management. This incident, as well as …


The Memory Gap In Surveillance Law, Patricia L. Bellia Jan 2008

The Memory Gap In Surveillance Law, Patricia L. Bellia

Journal Articles

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison Jan 2008

Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison

Articles

This essay, prepared as part of a Symposium on intellectual property law and business models, suggests the re-examination of the role of intellectual property law in the persistence of cultural forms of all sorts, including (but not limited to) business models. Some argue that the absence of intellectual property law inhibits the emergence of durable or persistent cultural forms; copyright and patent regimes are justified precisely because they supply foundations for durability. The essay tests that proposition via brief reviews of three persistent but very different cultural models, each of which represents a distinct form of American culture: The Rocky …


Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen Jan 2008

Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of visibility has created two problems. First, focusing on visibility diminishes the salience and obscures the operation of nonvisual mechanisms designed to render individual identity, behavior, and preferences transparent to third parties. The metaphoric mapping to visibility suggests that surveillance is simply passive observation, rather than the active production of categories, narratives, and, norms. Second, even a broader conception of privacy harms as a function …


Prediction Markets And The First Amendment, Miriam A. Cherry, Robert L. Rogers Jan 2008

Prediction Markets And The First Amendment, Miriam A. Cherry, Robert L. Rogers

Faculty Publications

The continuing development of prediction markets is important because of their success in foretelling the future in politics, economics, and science. In this article, we identify the expressive elements inherent in prediction markets and explore how legislation such as the Unlawful Internet Gambling Enforcement Act of 2006 might harm such predictive speech. This article is the first to explore First Amendment protections for prediction markets in such depth, and in so doing, we distinguish prediction markets from other regulated areas such as gambling, commodities, and securities trading. The article’s examination of prediction markets also illustrates the limitations of current commercial …


Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher Jan 2008

Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher

Faculty Scholarship

This Essay explores the enforceability and presence of pro-seller contract terms in internet retail contracts. Analyzing case law on internet contract enforceability and a survey of 500 firms'websites, it demonstrates that even the enforceability of many internet contracts is questionable. It then presents new data that suggest that the prevalence of pro-seller contract terms is far less than usually assumed. It suggests that the benefit of making these terms enforceable is outweighed by the loss of user friendliness required for the necessary interface changes. Finally, it uses fresh statistical analyses to determine what relationship, if any, exists between enforceability, pro-seller …


Recent Developments In Us Copyright Law – Part Ii, Caselaw: Exclusive Rights On The Ebb?, Jane C. Ginsburg Jan 2008

Recent Developments In Us Copyright Law – Part Ii, Caselaw: Exclusive Rights On The Ebb?, Jane C. Ginsburg

Faculty Scholarship

The 1976 Act announces broad exclusive rights, offset by a myriad of specific exemptions, and one wide exception for "fair use." In words and intent, the exclusive rights are capacious, but new technologies may have caused some of the general phrases to become more constraining than might have been expected from a text whose drafters took pains to make forward-looking. Thus, the scope of the reproduction right turns on the meaning of "copy;" the reach of the distribution right on "distribute copies" and "transfer of ownership;" the range of the public performance right on "public" and "perform." Entrepreneurs and users …


Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater Jan 2008

Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater

Faculty Scholarship

America's communications infrastructure is stuck at a copper wall. For the vast majority of homes, copper wires remain the principal means of getting broadband services. The deployment of fiber optic connections to the home would enable exponentially faster connections, and few dispute that upgrading to more robust infrastructure is essential to America's economic growth. However, the costs of such an upgrade are daunting for private sector firms and even for governments. These facts add up to a public policy challenge.

Our intuition is that an innovative model holds unrealized promise: household investments in fiber. Consumers may one day purchase and …