Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (71)
- SelectedWorks (43)
- UIC School of Law (22)
- University of Maryland Francis King Carey School of Law (12)
- Schulich School of Law, Dalhousie University (11)
-
- Maurer School of Law: Indiana University (10)
- University of Michigan Law School (8)
- Pepperdine University (7)
- University of Richmond (7)
- Brigham Young University Law School (3)
- Columbia Law School (3)
- Northwestern Pritzker School of Law (3)
- Singapore Management University (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University of Massachusetts Amherst (3)
- University of Pennsylvania Carey Law School (3)
- Cleveland State University (2)
- Florida A&M University College of Law (2)
- Loyola University Chicago, School of Law (2)
- New York Law School (2)
- Pace University (2)
- Roger Williams University (2)
- Seattle University School of Law (2)
- Universitas Indonesia (2)
- University at Buffalo School of Law (2)
- University of Colorado Law School (2)
- University of Florida Levin College of Law (2)
- University of Pittsburgh School of Law (2)
- University of the Pacific (2)
- Vanderbilt University Law School (2)
- Keyword
-
- Law and Technology (49)
- Privacy (34)
- Internet (26)
- Science and Technology (20)
- Intellectual Property Law (19)
-
- Computer Law (17)
- Constitutional Law (15)
- Law and Society (15)
- Communications Law (13)
- Fourth Amendment (13)
- Google (13)
- Surveillance (13)
- Copyright (12)
- First Amendment (11)
- Cyberlaw (10)
- Jurisprudence (9)
- Antitrust (8)
- Criminal Law and Procedure (8)
- Facebook (7)
- National Security (7)
- Technology (7)
- Consumer Protection Law (6)
- Contracts (6)
- E-mail (6)
- Selected Professional Activities (6)
- Copyright law (5)
- Economics (5)
- Emerging Technologies (5)
- Food and Drug Law (5)
- General Law (5)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (14)
- Canadian Journal of Law and Technology (11)
- Daniel Lyons (10)
- Faculty Scholarship (9)
- Patricia L. Bellia (8)
-
- Frank A. Pasquale (7)
- Professor Katina Michael (7)
- All Faculty Scholarship (5)
- Indiana Law Journal (5)
- Maryland Law Review (5)
- Richmond Journal of Law & Technology (5)
- UIC Review of Intellectual Property Law (5)
- Danielle Keats Citron (4)
- Journal of Business & Technology Law (4)
- Journal of the National Association of Administrative Law Judiciary (4)
- Michigan Telecommunications & Technology Law Review (4)
- David C. Gray (3)
- Journal Articles (3)
- Laura Quilter (3)
- Northwestern Journal of Technology and Intellectual Property (3)
- Pepperdine Law Review (3)
- Research Collection Yong Pung How School Of Law (3)
- Rodolfo C. Rivas (3)
- Articles (2)
- Brigham Young University Education and Law Journal (2)
- David Barnhizer (2)
- Florida Law Review (2)
- Giancarlo Francesco Frosio (2)
- IP Theory (2)
- Indonesia Law Review (2)
- Publication Type
- File Type
Articles 1 - 30 of 259
Full-Text Articles in Law
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
Social Engineering Through Shari’A: Islamic Law And State-Directed Da’Wa In Contemporary Aceh, R. Michael Feener
Social Engineering Through Shari’A: Islamic Law And State-Directed Da’Wa In Contemporary Aceh, R. Michael Feener
Indonesia Law Review
This study of the contemporary Islamic legal system in Aceh, Indonesia argues for new attention to be paid to the ways in which contemporary Muslim agendas for the implementation of Islamic law can be read as projects for future oriented social transformation—rather than as a series of reactive measures to perceived ‘crises of modernity’ and/or the political machinations of rival elites in contesting control of state power. In doing so it highlights the ways in which the ideals of, and institutional formations developed by, proponents of Islamic law are configured in relation to a broad range of non-Muslim modernist projects, …
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies
Law Faculty Scholarship
This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks
Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks
Danielle Keats Citron
Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.
The Player-Authors Project, Greg Lastowka
Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg
Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg
Michigan Telecommunications & Technology Law Review
Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Michigan Telecommunications & Technology Law Review
Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Seattle Journal for Social Justice
No abstract provided.
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …
E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik
E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik
Research Collection Yong Pung How School Of Law
Existing e-commerce regulations constitute a premature and unnecessary interference in the natural evolution of commercial practices and technologies. I question not just their quality, mainly attributable to the technological ignorance of the regulator, but their very necessity. I observe the practical futility of drafting effective regulatory instruments in areas subject to continuous and unpredictable technological change. I criticize the overly homogenous approach to "everything Internet" (i.e. everything involving the Internet requires new law) as well as the creation of new regulatory spheres and legal categories. Some might claim that it is too early for a critical retrospective of this subject. …
Misplaced Misrepresentations: Why Misrepresentation-Of-Age Statutes Must Be Reinterpreted As They Apply To Children’S Online Contracts, Michelle A. Sargent
Misplaced Misrepresentations: Why Misrepresentation-Of-Age Statutes Must Be Reinterpreted As They Apply To Children’S Online Contracts, Michelle A. Sargent
Michigan Law Review
The information age revolutionized the relationship between individuals and the internet. Today, children are the targets of online advertisements that lure them into accepting terms of service, thus entering into online agreements. While children may feel comfortable navigating websites, they are psychologically predisposed to be unsophisticated and impulsive actors online. Children lack the digital literacy to understand the implications of accepting website terms of service. Meanwhile, several states have misrepresentation-of-age statutes that prevent children from using the infancy doctrine to disaffirm online contracts because, in accepting the terms of service, children often represent that they are old enough to enter …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Patricia L. Bellia
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Patricia L. Bellia
The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.
This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …
Federalization In Information Privacy Law, Patricia L. Bellia
Federalization In Information Privacy Law, Patricia L. Bellia
Patricia L. Bellia
In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …
Defending Cyberproperty, Patricia L. Bellia
Defending Cyberproperty, Patricia L. Bellia
Patricia L. Bellia
This Article explores how the law should treat legal claims by owners of Internet-connected computer systems to enjoin unwanted uses of their systems. Over the last few years, this question has become increasingly urgent and controversial, as system owners have sought protection from unsolicited commercial e-mail and from robots that extract data from Web servers for competitive purposes. In the late 1990s and early 2000s, courts utilizing a wide range of legal doctrines upheld claims by network resource owners to prevent unwanted access to their computer networks. The vast weight of legal scholarship has voiced strong opposition to these cyberproperty …
The Memory Gap In Surveillance Law, Patricia L. Bellia
The Memory Gap In Surveillance Law, Patricia L. Bellia
Patricia L. Bellia
U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …
Spyware And The Limits Of Surveillance Law, Patricia L. Bellia
Spyware And The Limits Of Surveillance Law, Patricia L. Bellia
Patricia L. Bellia
For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Patricia L. Bellia
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Patricia L. Bellia
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.
Undermining Parental Authority, Unethical Advertising And The Accountability Of Self-Regulation: Thomascook.Ca As A Fable, Nachshon Goltz, Peter Neufeld
Undermining Parental Authority, Unethical Advertising And The Accountability Of Self-Regulation: Thomascook.Ca As A Fable, Nachshon Goltz, Peter Neufeld
Nachshon Goltz
This paper demonstrates the shortcomings of Advertising Standards Canada, the Canadian self-regulatory body overseeing advertising to children. It uses a case study initiated by a complaint regarding a parental undermining advertisement. Advertising Standards Canada failure to address this complaint illustrate the greater need for Canada to move away from self-regulation in children advertising to a less de-centralized regulatory regime. This move is increasingly important due to the unprecedented rise in electronic marketing and its ability to use stealth advertising and collect information from its child consumers.
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Rape Shield Laws And The Social Media Revolution: Discoverability Of Social Media--It's Not Private, Seth I. Koslow
Rape Shield Laws And The Social Media Revolution: Discoverability Of Social Media--It's Not Private, Seth I. Koslow
Touro Law Review
No abstract provided.
Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler
Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler
Amy A. Hinkler
No abstract provided.
Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik
Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik
Touro Law Review
This Comment focuses on the dangers of social media sites when a person gains access to another's online account through two different methods: (1) stealing the third party's password, or (2) creating a completely fake profile and subsequently impersonating that person.
Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland
Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland
Steven I. Friedland
State and federal courts are split over whether cell phone searches incident to a lawful arrest are permissible under the Fourth Amendment. The Supreme Court has the opportunity to create uniformity by accepting a certiorari petition in a cell phone search incident to arrest case, either United States v. Wurie or Riley v. California. The Court should do so to create an analysis that incorporates sensory enhancing technology, not avoids it, as it has done to date.
The split in case law evidences a central contradiction. Fourth Amendment rules need to be predictable and based on clear guidelines for effective …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira
Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira
Indiana Law Journal
Roundtable on Regulating Assisted Reproductive Technology 2012
Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins
Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins
Indiana Law Journal
Scholarship on assisted reproductive technologies (ART) has emphasized the commercial nature of the interaction between fertility patients and their physicians, but little attention has been paid to precisely how clinics persuade patients to choose their clinics over their competitors’. This Article offers evidence about how clinics sell ART based on clinics’ advertising on their websites. To assess clinics’ marketing efforts, I coded advertising information on 372 fertility clinics’ websites. The results from the study confirm some suspicions of prior ART scholarship while contradicting others. For instance, in line with scholars who are concerned that racial minorities face barriers to accessing …