Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Internet law

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 37

Full-Text Articles in Law

Beyond Social Media Analogues, Gregory M. Dickinson Jan 2024

Beyond Social Media Analogues, Gregory M. Dickinson

Faculty Articles

The steady flow of social-media cases toward the Supreme Court shows a nation reworking its fundamental relationship with technology. The cases raise a host of questions ranging from difficult to impossible: how to nurture a vibrant public square when a few tech giants dominate the flow of information, how social media can be at the same time free from conformist groupthink and also protected against harmful disinformation campaigns, and how government and industry can cooperate on such problems without devolving toward censorship.

To such profound questions, this Essay offers a comparatively modest contribution—what not to do. Always the lawyer’s instinct …


Brokered Abuse, Thomas E. Kadri Jan 2023

Brokered Abuse, Thomas E. Kadri

Scholarly Works

Data brokers are abuse enablers. These companies, which traffic information about people for profit, facilitate interpersonal abuse by making it easier to find and contact people. By thwarting people’s obscurity, brokers expose them to physical, psychological, financial, and reputational harm. To date, there have been four common legal responses to this situation: prohibiting abusive acts, mandating broker transparency, limiting data collection, and restricting data disclosure. Though these measures each have some merit, none is adequate, and several recent privacy laws have even made matters worse. Put simply, the current legal landscape is neither effective nor empathetic.

This Essay explores the …


Sovereignty 2.0, Anupam Chander, Haochen Sun Mar 2022

Sovereignty 2.0, Anupam Chander, Haochen Sun

Vanderbilt Journal of Transnational Law

Digital sovereignty-the exercise of control over the internet-is the ambition of the world's leaders, from Australia to Zimbabwe, seen as a bulwark against both foreign states and foreign corporations. Governments have resoundingly answered first-generation internet law questions of who, if anyone, should regulate the internet. The answer: they all will. Governments now confront second-generation questions--not whether, but how to regulate the internet. This Article argues that digital sovereignty is simultaneously a necessary incident of democratic governance and democracy's dreaded antagonist. As international law scholar Louis Henkin taught, sovereignty can insulate a government's worst ills from foreign intrusion. Assertions of digital …


The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery Oct 2021

The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery

St. Mary's Law Journal

Abstract forthcoming.


A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr Oct 2020

A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr

Dickinson Law Review (2017-Present)

Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.

To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …


Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman Feb 2020

Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman

Articles in Law Reviews & Other Academic Journals

In 1995, the Internet was becoming a global phenomenon and users needed "domain names"--the street signs of Internet addresses--for an array of commercial and noncommercial speech. A small community of "multistakeholders"--business, civil society, governments, technologists, intellectual property and non-government organization representations--began to write rules for Internet addresses largely on behalf of a global population that had yet to be connected to the Internet. I had the privilege of being part of that group. Since then, Internet use has skyrocketed from 70 million users (1.7% of the world population) in 1995 to over 4.5 billion users (58.8% of the world population) …


Internet Architecture And Disability, Blake E. Reid Jan 2020

Internet Architecture And Disability, Blake E. Reid

Publications

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li Jan 2019

Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li

Faculty Scholarship

The Wikimedia/Yale Law School Initiative on Intermediaries and Information (WIII) at Yale Law School has released a comprehensive report synthesizing key insights from intermediary liability and online speech and expression experts in Europe and the United States.

The report focuses on the critical but complicated issue of private speech regulation on the internet and the connections between platform liability laws and fundamental rights, including free expression. The report reflects discussions held at “Intermediaries & Private Speech Regulation: A Transatlantic Dialogue,” an invitation-only workshop convened by WIII, featuring leading internet law experts from the United States and Europe.

This report highlights …


Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li Feb 2018

Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li

Faculty Scholarship

On February 13, 2018, WIII hosted the workshop, “Beyond Intermediary Liability: The Future of Information Platforms.” Leading experts from industry, civil society, and academia convened at Yale Law School for a series of non-public, guided discussions. The roundtable of experts considered pressing questions related to intermediary liability and the rights, roles, and responsibilities of information platforms in society. Based on conversations from the workshop, WIII published a free, publicly available report detailing the most critical issues necessary for understanding the role of information platforms, such as Facebook and Google, in law and society today. The report highlights insights and questions …


Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards Jan 2018

Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards

Faculty Scholarship

At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law - the Communications Decency Act - that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a …


Three Strikes For Copyright, Jessica Silbey Oct 2017

Three Strikes For Copyright, Jessica Silbey

Faculty Scholarship

How should copyright law change to take account of the internet? Should copyright expand to plug the internet’s leakiness and protect content that the internet would otherwise make more freely available? Or, should copyright relax its strict liability regime given diverse and productive reuses in the internet age and the benefits networked diffusion provides users and second-generation creators? Answering these questions depends on what we think copyright is for and how it is used and confronted by creators and audiences. In a new article studying these questions in the very focused setting of Wikipedia articles about baseball and baseball players …


Netflix And No Chill: The Criminal Ramification Of Password Sharing, Benjamin Kweskin Aug 2017

Netflix And No Chill: The Criminal Ramification Of Password Sharing, Benjamin Kweskin

The Business, Entrepreneurship & Tax Law Review

Password sharing is a unique issue because it requires two actors: the person who accesses the information, and the sharer. Sharing your password and logging on could easily be seen as trespassing on Netflix’s website to provide you with content you should have otherwise paid for, thus it has value. All other elements aside, the question of whether or not the sharer of information could be criminally liable remains unanswered. Under Nosal, there is strong evidence to suggest liability. It is clear that the person who accesses this information is liable, but what about the password sharer?


Disruptive Platforms, Margot Kaminski Jan 2017

Disruptive Platforms, Margot Kaminski

Publications

No abstract provided.


Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher Aug 2016

Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher

Pace International Law Review

Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …


Geoblocking, Technical Standards And The Law, Marketa Trimble Jan 2016

Geoblocking, Technical Standards And The Law, Marketa Trimble

Scholarly Works

The idea that geoblocking could be used as a compliance tool is one part of the development of the relationship between geoblocking and legal compliance. This chapter outlines the three stages through which this development will proceed. In the first stage, geoblocking will be accepted as a tool of regulation and enforcement. While acceptance has already occurred in some countries in some contexts, this acceptance is certainly not yet general or widespread. In the second stage, minimum standards for geoblocking will be promulgated because the use of geoblocking for purposes of legal compliance necessarily calls for minimum technological standards that …


Note: A Series Of (Inseparable) Tubes? “New Media” Streaming And The Impact Of In Re. Pandora Media, Related Decisions, And Performance Licensing In The Internet Era, Ross Coker Sep 2015

Note: A Series Of (Inseparable) Tubes? “New Media” Streaming And The Impact Of In Re. Pandora Media, Related Decisions, And Performance Licensing In The Internet Era, Ross Coker

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley May 2015

Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley

PhD Dissertations

Reputation - we all have one. We do not completely comprehend its workings and are mostly unaware of its import until it is gone. When we lose it, our traditional laws of defamation, privacy, and breach of confidence rarely deliver the vindication and respite we seek due, primarily, to legal systems that cobble new media methods of personal injury onto pre-Internet laws. This dissertation conducts an exploratory study of the relevance of law to loss of individual reputation perpetuated on the Internet. It deals with three interrelated concepts: reputation, privacy, and memory. They are related in that the increasing lack …


Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg Jan 2015

Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg

Northwestern University Law Review

No abstract provided.


Cyberharassment And Workplace Law, Helen Norton Jan 2015

Cyberharassment And Workplace Law, Helen Norton

Publications

No abstract provided.


Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett Dec 2014

Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett

Touro Law Review

No abstract provided.


Federalization In Information Privacy Law, Patricia L. Bellia Oct 2013

Federalization In Information Privacy Law, Patricia L. Bellia

Patricia L. Bellia

In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Oct 2013

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …


Internet Law: Cases And Problems 4.0, James Grimmelmann Aug 2013

Internet Law: Cases And Problems 4.0, James Grimmelmann

James Grimmelmann

In this casebook author James Grimmelmann provides tightly edited cases, focused questions, and topical problems to direct students' attention to critical issues. Mini-essays provide students with the technical background they need to make sense of computer and Internet technologies. Where doctrine has historical roots, the casebook gives students the necessary context.The book covers essential topics but is still short enough that it can be taught in a 3-credit course. The casebook responds to the "law of the horse" critique by embracing the doctrinal diversity of Internet Law. It prepares students for complex, real-life practice by showing how actual Internet cases …


Personal Jurisdiction And Choice Of Law In The Cloud, Damon C. Andrews, John M. Newman Jan 2013

Personal Jurisdiction And Choice Of Law In The Cloud, Damon C. Andrews, John M. Newman

Maryland Law Review

No abstract provided.


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


Navigating The Uncharted Waters Of Teaching Law With Online Simulations, Ira Steven Nathenson Jan 2012

Navigating The Uncharted Waters Of Teaching Law With Online Simulations, Ira Steven Nathenson

Ira Steven Nathenson

The Internet is more than a place where the Millennial Generation communicates, plays, and shops. It is also a medium that raises issues central to nearly every existing field of legal doctrine, whether basic (such as Torts, Property, or Contracts) or advanced (such as Intellectual Property, Criminal Procedure, or Securities Regulation). This creates tremendous opportunities for legal educators interested in using the live Internet for experiential education. This Article examines how live websites can be used to create engaging and holistic simulations that tie together doctrine, theory, skills, and values in ways impossible to achieve with the case method. In …


Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton Jan 2010

Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton

Publications

No abstract provided.


Communication Indecency: Why The Communications Decency Act, And The Judicial Interpretation Of It, Has Led To A Lawless Internet In The Area Of Defamation, Colby Ferris Jan 2010

Communication Indecency: Why The Communications Decency Act, And The Judicial Interpretation Of It, Has Led To A Lawless Internet In The Area Of Defamation, Colby Ferris

Barry Law Review

First, this article explores how law of defamation has been applied in the brick and mortar world, and how those same principles were applied to the cyber world. Next it looks at Congress’s legislation of defamation law on the Internet, and how that legislation has been applied in court. Finally, it evaluates the changing attitude toward that legislation, and changes Congress should consider making.


Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias Apr 2009

Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias

Tim Iglesias

This presentation argues that the internet offers both great promise and possible peril for anti-discrimination in housing. The potential for self-regulation is mixed but ultimately weak. The presentation concludes with a call for federal regulatory reform.


Federalization In Information Privacy Law, Patricia L. Bellia Jan 2009

Federalization In Information Privacy Law, Patricia L. Bellia

Journal Articles

In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …