Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Series

2014

Institution
Keyword
Publication

Articles 1 - 30 of 62

Full-Text Articles in Law

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen Dec 2014

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen

Faculty Scholarship

The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States …


Recent Journalism Awards Won By "Old," "New," And "Hybrid" Media, Robert H. Lande, Thomas J. Horton, Virginia Callahan Dec 2014

Recent Journalism Awards Won By "Old," "New," And "Hybrid" Media, Robert H. Lande, Thomas J. Horton, Virginia Callahan

All Faculty Scholarship

This compares the quality of the "old" media to that of the "new" media by determining how often each type of media source wins major journalism awards. It divides media sources into three categories: old, new and hybrid. New media is limited to publications that were started purely as online news publications. Old media is classified in the traditional sense to include such newspapers as the New York Times. Hybrid media combines elements of both new and old media. Our research compares the number of Pulitzer Prizes and other major journalism awards won by these three types of media sources …


Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale Dec 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose Dec 2014

Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose

Faculty Scholarship

This paper takes a closer look at the First Amendment rights of college athletes to access social media while simultaneously participating in intercollegiate athletics. The question posed is quite simple: can a coach or athletic department at a public university legally restrict a student-athlete's use of social media? If so, does the First Amendment provide any restraints on the type or length of restrictions that can be imposed? Thus far, neither question has been presented to a court for resolution. However, the answers are vital, as college coaches and athletic directors seek to regulate their athletes in a constitutional manner.


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Tinkering With Success: College Athletes, Social Media And The First Amendment, Meg Penrose Oct 2014

Tinkering With Success: College Athletes, Social Media And The First Amendment, Meg Penrose

Faculty Scholarship

Good law does not always make good policy. This article seeks to provide a legal assessment, not a policy directive. The policy choices made by individual institutions and athletic departments should be guided by law, but absolutely left to institutional discretion. Many articles written on college student-athletes' social media usage attempt to urge policy directives clothed in constitutional analysis.

In this author's opinion, these articles have lost perspective-constitutional perspective. This article seeks primarily to provide a legal and constitutional assessment so that schools and their athletic departments will have ample information to then make their own policy choices.


The Challenges Of Preventing And Prosecuting Social Media Crimes, Thaddeus A. Hoffmeister Sep 2014

The Challenges Of Preventing And Prosecuting Social Media Crimes, Thaddeus A. Hoffmeister

School of Law Faculty Publications

Wanted: Caretaker For Farm. Simply watch over a 688 acre patch of hilly farmland and feed a few cows, you get 300 a week and a nice 2 bedroom trailer, someone older and single preferred but will consider all, relocation a must, you must have a clean record and be trustworthy—this is a permanent position, the farm is used mainly as a hunting preserve, is overrun with game, has a stocked 3 acre pond, but some beef cattle will be kept, nearest neighbor is a mile away, the place is secluded and beautiful, it will be a real get away …


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks Jul 2014

Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda Jun 2014

Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda

Columbia Center on Sustainable Investment Staff Publications

The initial phase of the Leveraging Mining-Related Infrastructure Investments for Development project consisted of a worldwide survey of regulatory, commercial and operating case studies of shared use of mining-related infrastructure. This Policy Paper delivers the findings for internet and telecommunications.


Terms Of Use: Reflections On A Theme, Eliza Mik May 2014

Terms Of Use: Reflections On A Theme, Eliza Mik

Research Collection Yong Pung How School Of Law

The paper presents multiple perspectives on the unpopular but omnipresent terms of use (or "ToUs"), i.e. terms and conditions contained in a link at the bottom of many websites. ToUs serve different functions: from governing the transaction taking place on a website, (e.g. contracts of sale) to the very act of browsing. Accordingly, every browsing experience has both a commercial and a legal tint. On a theoretical level ToUs raise concerns with regards to their validity as legally binding contracts as well as to their incorporation. Both formation and incorporation converge on the presence and quality of contractual intention. The …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale

Faculty Scholarship

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Of Relevance And Reform Under Section 215, Peter Margulies Feb 2014

Of Relevance And Reform Under Section 215, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Speech Engines, James Grimmelmann Feb 2014

Speech Engines, James Grimmelmann

Cornell Law Faculty Publications

Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.

A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …


Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies Jan 2014

Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson Jan 2014

Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …


Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard Jan 2014

Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard

Nebraska College of Law: Faculty Publications

Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences of such intrusions are sufficiently damaging, international humanitarian law (IHL) should generally govern them-and recourse to armed force may also be justified against states responsible for these actions under the jus ad bellum. This Article argues, however, that there are serious problems and perils in relying on analogies with physical armed force to extend these legal regimes to most events in cyberspace. Armed conflict models applied to the use of information as a weapon and a target are instead likely to …


Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi Jan 2014

Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi

Articles

No abstract provided.


Speech Engines, James Grimmelmann Jan 2014

Speech Engines, James Grimmelmann

Faculty Scholarship

Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.

A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …


Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks Jan 2014

Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale Jan 2014

The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale

Faculty Scholarship

Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees, reliable tenants, valuable customers—or deadbeats, shirkers, menaces, and “wastes of time.” Crucial opportunities are on the line, including the ability to obtain loans, work, housing, and insurance. Though automated scoring is pervasive and consequential, it is also opaque and lacking oversight. In one area where regulation does prevail—credit—the law focuses on credit history, not the derivation of scores from data.

Procedural regularity is essential for those stigmatized by “artificially intelligent” scoring systems. The American due process tradition should inform …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney Jan 2014

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an entire …


Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll Jan 2014

Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …


Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park Jan 2014

Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park

Management Faculty Publications and Presentations

When Justin Basset interviewed for a job in New York City in 2012, he expected to respond to questions one is typically asked in a job interview. However, his interview took a modern technological twist when the interviewer opened her computer and attempted to look at Mr. Basset’s Facebook profile on her computer. Unable to see the details of his profile because he had taken advantage of Facebook’s privacy options to limit public viewing, she asked for his login information to access his account. He declined and withdrew his application.1 In 2010, Robert Collins, a Maryland Department of Public …


Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra Jan 2014

Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra

Scholarly Works

More than fifteen years have passed since the two major U.S. statutes concerning the secondary liability of Internet service providers were adopted--the Communications Decency Act and the Digital Millennium Copyright Act. The statutes have been criticized; however, very little of the criticism has come from Internet service providers, who have enjoyed the benefits of generous safe harbors and immunity from suit guaranteed by these statutes. This Article raises the question of whether these statutes contribute to incumbent entrenchment--solidifying the position of the existing Internet service providers to the detriment of potential new entrants. The current laws and industry self-regulation may …