Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 59

Full-Text Articles in Law

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


Future Strategies For Improving Consent In Electronic Contracting, Ran Bi Sep 2015

Future Strategies For Improving Consent In Electronic Contracting, Ran Bi

Ran Bi

China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.

E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors . Users are easy to become victims of exploitative terms, because their consent has …


Future Strategies For Improving Consent In Electronic Contracting, Ran Bi Sep 2015

Future Strategies For Improving Consent In Electronic Contracting, Ran Bi

Ran Bi

China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.

E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors1. Users2 are easy to become victims of exploitative terms, because their consent has been …


E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Aug 2015

E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …


The Shaky Ground Of The Right To Be Delisted, Miquel Peguera Aug 2015

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Miquel Peguera

It has long been discussed whether individuals should have a “right to be forgotten” online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v AEPD, the Court of Justice of the European Union addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results, in searches made on the basis of their name. It found that they do have this right – which can be best described as a “right to be …


The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed Aug 2015

The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed

Ahad Syed

This Article examines the purpose and interpretation by courts of Freedom of Information Act’s 7(C) Exemption. Specifically, the Article sets out to unravel the current federal circuit court split over Exemption 7(C) by examining its application to the digital privacy dilemma as applied to arrestee photographs, commonly known as “mug shots.” Automated data-scraping programs continuously scour the internet, reaping, replicating, and reposting photographs of arrestees who may or may not have had charges dismissed in order to shame them into paying website owners for removal. While other commentators have argued for state law penalizing pay-to-remove mug shot websites only, this …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden Jul 2015

Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden

Rob Frieden

This paper will examine the FCC’s March, 2015 Open Internet Order with an eye to assessing whether and how the Commission can successfully defend its decision in an appellate court. On two prior occasions, the FCC failed to convince a reviewing court that proposed regulatory safeguards do not unlawfully impose common carrier duties on private carriers. The Commission now has opted to reclassify broadband Internet access as common carriage, a decision sure to trigger a third court appeal. The FCC Open Internet Order offers several, possibly contradictory, justifications for its decision to apply Title II of the Communications Act, subject …


Toward A New Language Of Legal Drafting, Matthew Roach Jul 2015

Toward A New Language Of Legal Drafting, Matthew Roach

Matthew Roach

Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.


Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi May 2015

Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi

Hussam M. Alkanbashi

Cybercrime is one of the greatest threats facing the International community. Defined as criminal activity perpetrated using computers and the internet, cybercrime has developed into a trillion dollar a year industry, affecting millions of people around the world, as well as countless businesses and the governments of every nation. With nearly 431 million victims projected in 2015, cyber related crime is one of if not the most frequent, costly and pervasive crimes worldwide. This article examines and assesses the effectiveness of Saudi and American Cyber Laws in deterring the growing global threats posed by cybercrime. The article studies cyber identity …


Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden May 2015

Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden

Rob Frieden

This paper assesses whether and how ISPs can offer quality of service enhancements, at premium prices for full motion video, while still complying with the new rules and regulations established by the Federal Communications Commission (“FCC”) in March, 2015. The paper explains that having made the controversial decision to reclassify all forms of Internet access as a telecommunications service, the FCC increases regulatory uncertainty. In particular, the FCC has failed to identify instances where “retail ISPs,” serving residential broadband subscribers, can offer quality of service enhancements that serve real consumer wants without harming competition and the ability of most content …


Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey Apr 2015

Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey

Andrew Leahey

No abstract provided.


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Apr 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Julian Dibbell

When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …


, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta Mar 2015

, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta

Jeffrey A. Van Detta

This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":

“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”

This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education, …


The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan Mar 2015

The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan

Fazal Khan

The nascent field of mobile health technology is still very small but is predicted to grow exponentially as major technology companies such as Apple, Google, Samsung, and even Facebook have announced mobile health initiatives alongside influential healthcare provider networks. Given the highly regulated nature of healthcare, significant legal barriers stand in the way of mobile health’s potential ascension. I contend that the most difficult legal challenges facing this industry will be restrictive professional licensing and scope of practice laws. The primary reason is that mobile health threatens to disrupt historical power dynamics within the healthcare profession that have legally enshrined …


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum Jan 2015

How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum

Angela Goodrum

No abstract provided.


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden Sep 2014

Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden

Rob Frieden

Many advocates for less intrusive government oversight of telecommunications support the migration from regulation by an expert agency to the use of adjudication remedies largely guided by antitrust/competition policy principles. They believe that competition authorities, or reviewing courts can resolve disputes after they have occurred in lieu of having expert regulatory agencies available to anticipate and resolve problems before they become acute. Such ex post remedies typically determine whether anticompetitive conduct has occurred and what marketplace harm has resulted. Advocates for retaining so-called ex ante regulation believe that an expert agency remains essential particularly in light of fast changing market …


What’S New In The Network Neutrality Debate, Rob Frieden Sep 2014

What’S New In The Network Neutrality Debate, Rob Frieden

Rob Frieden

For over ten years, academics, practitioners, policy makers, consumers and other stakeholders have debated whether and how governments should regulate the Internet with an eye toward promoting accessibility, affordability and neutrality. This issue has triggered grave concerns about the Internet’s ability to continue generating substantial and widespread benefits. Advocates for various outcomes have vastly different assessments about many baseline subjects including the viability of sustainable competition and self-regulation. Consumers become agitated and confused by different framing of the issues, particularly when participants in the Internet ecosystem cannot reach closure on interconnection and compensation issues. Increasingly these disputes trigger temporary degradation …


The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden Aug 2014

The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden

Rob Frieden

This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


The Replicator And The First Amendment, Kyle Langvardt Aug 2014

The Replicator And The First Amendment, Kyle Langvardt

Kyle Langvardt

As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights. This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first law review …


Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman Mar 2014

Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman

Bill D. Herman

With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …