Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Series

2011

Institution
Keyword
Publication

Articles 1 - 30 of 56

Full-Text Articles in Law

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen Dec 2011

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen

Faculty Scholarship

Among the most important issues for American National Security is the national response to the growing threat from cyber activities. This threat is both ubiquitous and potentially catastrophic as recently demonstrated by both the recent decision by the UK to prioritize cyber capabilities over putting in service an air-capable aircraft carrier and the targeted effectiveness of the STUXNET worm. The evolving cyber paradigm will force the United States to reevaluate the way in which it thinks of both national security and the concept of armed conflict. To combat this threat, President Obama must refocus America’s attention, by both reallocating the …


Google’S China Problem: A Case Study On Trade, Technology And Human Rights Under The Gats, Henry S. Gao Dec 2011

Google’S China Problem: A Case Study On Trade, Technology And Human Rights Under The Gats, Henry S. Gao

Research Collection Yong Pung How School Of Law

Trade and human rights have long had a troubled relationship. The advent of new technologies such as internet further complicates the relationship. This article reviews the relationship between trade, technology and human rights in light of the recent dispute between Google and China from both theoretical and practical perspectives. Starting with an overview of the internet censorship regime in China, the article goes on to assess the legal merits of a WTO challenge in this case. First, the article discusses which service sector or subsectors might be at issue. Second, the article analyzes whether and to what extent China has …


Ombuds In Cloud Of Exabytes--Understanding The Ombuds' Digital Trail, Craig Mousin Nov 2011

Ombuds In Cloud Of Exabytes--Understanding The Ombuds' Digital Trail, Craig Mousin

Mission and Ministry Publications

This article examines Ombuds Standards of Practice as Ombuds increasingly rely upon electronic communication. It first explores the expansion of electronically stored information (ESI) due to the many different electronic devices Ombuds rely upon or interact with including computers, smartphones, and printers. It then reviews how novel legal issues caused by e-discovery--the search for relevant digital documents in litigation--will impact Ombuds. Finally, it offers Ombuds suggestions on managing and controlling ESI while raising the question of whether the International Ombudsman Association must review its Standards of Practice in light of these ESI developments.


The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation -- A Presentation, Marketa Trimble Aug 2011

The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation -- A Presentation, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble presented these materials at the Def Con 19 Conference in Las Vegas, Nevada on August 7, 2011. The presentation discussed what the law has (or does not have) to say about evasion of geolocation or "cybertravel" -- acts by which a user makes geolocation tools believe that he is physically located somewhere other than where he is located.


Does Legalzoom Have First Amendment Rights? Some Thoughts About Freedom Of Speech And The Unauthorized Practice Of Law, Catherine J. Lanctot Aug 2011

Does Legalzoom Have First Amendment Rights? Some Thoughts About Freedom Of Speech And The Unauthorized Practice Of Law, Catherine J. Lanctot

Working Paper Series

At a time of economic dislocation in the legal profession, it is likely that bar regulators will turn their attention to pursuing lay entities that appear to be engaged in the unauthorized practice of law. One prominent target of these efforts is LegalZoom, an online document preparer that has come under increasing pressure from the organized bar for its marketing and sale of basic legal documents. As regulatory pressure against LegalZoom and similar companies continues to mount, it is worth considering whether there may be unanticipated consequences from pursuing these unauthorized practice claims. In several well-known instances, lay people have …


The Google Conundrum: Perpetrator Or Facilitator On The Net? - Forging A Fair Copyright Framework Of Rights, Liability And Responsibility In Response To Search Engine 2.0 - Part Ii: The Google Books Search Project, Warren B. Chik Aug 2011

The Google Conundrum: Perpetrator Or Facilitator On The Net? - Forging A Fair Copyright Framework Of Rights, Liability And Responsibility In Response To Search Engine 2.0 - Part Ii: The Google Books Search Project, Warren B. Chik

Research Collection Yong Pung How School Of Law

Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a …


Stolen Art, Looted Antiquities, And The Insurable Interest Requirement, Robert L. Tucker Jul 2011

Stolen Art, Looted Antiquities, And The Insurable Interest Requirement, Robert L. Tucker

Akron Law Faculty Publications

Trafficking in stolen art and looted antiquities is a multi-billion dollar enterprise. Stolen art and looted antiquities are ultimately sold to museums or private collectors. Sometimes the purchasers acquire them in good faith. But other times, the purchasers know, suspect, or willfully blind themselves to the possibility that the piece was stolen or illegally excavated and exported up the chain of title.

This problem is compounded by customs and course of dealing in the art and antiquities trade. Dealers generally decline to provide meaningful information to prospective purchasers about the provenance of a piece, and sophisticated purchasers customarily acquiesce in …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton Jul 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group “Kill a Jew Day,” for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like “How to Kill Beaners,” “Execute the Gays,” and “Murder Muslim Scum.” The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based approach to …


Government Sponsored Social Media And Public Forum Doctrine Under The First Amendment: Perils And Pitfalls, Lyrissa Lidsky Jul 2011

Government Sponsored Social Media And Public Forum Doctrine Under The First Amendment: Perils And Pitfalls, Lyrissa Lidsky

Faculty Publications

Between the extremes of no interactivity and complete interactivity, it is difficult to predict whether courts will label a government sponsored social media site a public forum or not. But it is precisely "in between" where government actors are likely to wish to engage citizens and where citizens are most likely to benefit from government social media initiatives. The goal of this article, therefore, is to provide guidance to lawyers trying to navigate the morass that is the U.S. Supreme Court's public forum jurisprudence in order to advise government actors wishing to establish social media forums.


Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan Apr 2011

Re-Mapping Privacy Law: How The Google Maps Scandal Requires Tort Law Reform, Lindsey A. Strachan

Law Student Publications

This Comment explores how the law should handle such privacy claims. In analyzing both the photographic privacy claims as well as the Wi-Fi data privacy claims, this paper argues that current tort law is inadequate for such technologically advanced legal issues. Section II explores the background of Google Maps Street View and current privacy law, while Section III looks at the holes in current privacy torts in the context of the images displayed on Street View. Section IV examines the privacy implications surrounding the Wi-Fi scandal, and finally, Section V reviews the solution and provides a conclusion.


The Google Conundrum: Perpetrator Or Facilitator On The Net? - Forging A Fair Copyright Framework Of Rights, Liability And Responsibility In Response To Search Engine 2.0 - Part I: The Google Images Search Engine, Warren B. Chik Apr 2011

The Google Conundrum: Perpetrator Or Facilitator On The Net? - Forging A Fair Copyright Framework Of Rights, Liability And Responsibility In Response To Search Engine 2.0 - Part I: The Google Images Search Engine, Warren B. Chik

Research Collection Yong Pung How School Of Law

Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a …


Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries Apr 2011

Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries

Faculty Law Review Articles

The American criminal justice system, (therefore), is facing a future domestic violence crisis. Unfortunately, authorities-both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing "normal" teenage behavior seems counter-productive. While an effective criminal justice system response to this problem has yet to be developed, the first step will be for parents and law enforcement to recognize the risk and take it seriously. The second step will be to "renorm" unhealthy teenage relationship norms. It is possible that …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


Craigslist, The Cda, And Inconsistent International Standards Regarding Liability For Third-Party Postings On The Internet, Peter Adamo Feb 2011

Craigslist, The Cda, And Inconsistent International Standards Regarding Liability For Third-Party Postings On The Internet, Peter Adamo

Pace International Law Review Online Companion

This Comment explores the nature and purpose of the Communications Decency Act (CDA), the legislative upbringing, and the application of the CDA to Craigslist. It compares the CDA to approaches taken abroad through legislation and judicial proceedings. It explains, contrary to the one other commentator to broach the subject matter, how the CDA continues to provide robust protection to Craigslist. Finally, it explores potential avenues for redrafting the CDA as well as the difficulties and trade-offs associated with implementing such change.


Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton Jan 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill Beaners, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based …


Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale Jan 2011

Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale

Faculty Scholarship

When American lawyers talk about "essential facilities," they are usually referring to antitrust doctrine that has required certain platforms to provide access on fair and nondiscriminatory terms to all comers. Some have recently characterized Google as an essential facility. Antitrust law may shape the search engine industry in positive ways. However, scholars and activists must move beyond the crabbed vocabulary of competition policy to develop a richer normative critique of search engine dominance.

In this chapter, I sketch a new concept of "essential cultural and political facility," which can help policymakers recognize and address situations where a bottleneck has become …


Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan Jan 2011

Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan

Amicus Briefs

This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen Norton Jan 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen Norton

Publications

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill a Beaner, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate's history. We believe that a thoughtful and nuanced intermediary-based approach …


Judges, Friends, And Facebook: The Ethics Of Prohibition, 24 Geo. J. Legal Ethics 281 (2011), Samuel Vincent Jones Jan 2011

Judges, Friends, And Facebook: The Ethics Of Prohibition, 24 Geo. J. Legal Ethics 281 (2011), Samuel Vincent Jones

UIC Law Open Access Faculty Scholarship

No abstract provided.


Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long Jan 2011

Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long

UIC Law Open Access Faculty Scholarship

Trademarks have long suffered from an "ugly stepsister" status in the realm of intellectual property. Quasi-market regulation tool, quasi-investment property; trademark's historical role as both consumer-information signifier and producer-investment asset has led to increasingly confusing dichotomous treatment under the Lanham Act. The potentially borderless markets of cyberspace, with their new marketing techniques and new competitive spaces, have only heightened this confusion. Stumbling attempts to extend protection for marks under the Lanham Act beyond traditional notions of trademark use and consumer confusion to encompass the investment protection side of trademarks, such as the development of federal dilution and anti-cybersquatting acts, only …


Supervising Managed Services, James B. Speta Jan 2011

Supervising Managed Services, James B. Speta

Faculty Working Papers

Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …


Downstream Copyright Infringers, Yvette Joy Liebesman Jan 2011

Downstream Copyright Infringers, Yvette Joy Liebesman

All Faculty Scholarship

The advent of on-line music sales has been a boon to the recording industry as well as for musicians and the general public. Previously unknown artists have found new avenues to showcase their work, and consumers have easy access to an enormous variety of musical genres.

Yet an unintended consequence of the ability to sell songs through internet downloads is a novel, and until now, unnoticed way to infringe on copyrights - which, unless remedied, could lead to new classes of defendants never contemplated or desired to be ensnared in the Copyright Act’s protections for artists, musicians and authors. Unlike …


The Unresolved Legality Of Online Gambling In Singapore, Siyuan Chen Jan 2011

The Unresolved Legality Of Online Gambling In Singapore, Siyuan Chen

Research Collection Yong Pung How School Of Law

This article addresses what appears to be a hitherto (legislatively and judicially) unresolved issue in a country where gambling is an established sub-culture – the legality of online gambling. The existing legislation does not provide direct answers, and as a result, the courts have not been given the opportunity to answer the question directly either. The police have previously made a few statements to the press and the media, but what should we make of them? While placing bets with unauthorised bookies (including those who operate their own website or use others’ websites) is clearly outlawed, leaving the offender with …


Hart V Finnis: How Will Positivism And Natural Law Account For The Socio-Legal Paradigm In Wikipedia, Siyuan Chen Jan 2011

Hart V Finnis: How Will Positivism And Natural Law Account For The Socio-Legal Paradigm In Wikipedia, Siyuan Chen

Research Collection Yong Pung How School Of Law

There is little doubt that Wikipedia is one of the world’s most influential websites today – and its sphere of influence is set to grow in days to come. The evidence for this is strong. As of December 2010, Wikipedia is the Internet’s 6th most popular website (by virtue of the Alexa Traffic Rank), and it is also the most popular "general reference" site in cyberspace, with almost 4 million articles in the English language edition. It has been and will continue to be the flagship of Web 2.0, with every single edit being potentially scrutinised by a global audience, …


The Unimportance Of Being "Electronic" Or Popular Misconceptions About “Internet Contracting”, Eliza Mik Jan 2011

The Unimportance Of Being "Electronic" Or Popular Misconceptions About “Internet Contracting”, Eliza Mik

Research Collection Yong Pung How School Of Law

Existing e-commerce literature abounds with misconceptions regarding both technology and contract law. Long-standing legal concepts are adorned with “e-” or “cyber-” to appear more exciting. The traditional contractual regime issupplanted with new principles instead of being supplemented with technological considerations. It is one thing, to include technology in legal analyses, it is another to create separate, technology-specific categories. Separate categories justify the departure from traditional principles. Most, if not all, alleged “challenges” created by new communication scenarios fit within the existing legal framework, technological complexity and novelty of the Internet notwithstanding. Most “challenges” are also unrelated to the fact that …


Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie Jan 2011

New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie

Articles, Book Chapters, & Popular Press

The globalized and decentralized Internet has become the new locus for a wide range of human activity, including commerce, crime, communications and cultural production. Activities which were once at the core of domestic jurisdiction have moved onto the Internet, and in doing so, have presented numerous challenges to the ability of states to exercise jurisdiction. In writing about these challenges, some scholars have characterized the Internet as a separate “space” and many refer to state jurisdiction over Internet activities as “extraterritorial.” This article examines these challenges in the context of the overall international law of jurisdiction, rather than focusing on …