Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago Jan 2020

The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago

Seattle University Law Review

As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton Jun 2018

Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton

Seattle University Law Review

Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …


When The Classroom Is Not In The Schoolhouse: Applying Tinker To Student Speech At Online Schools, Brett T. Macintyre May 2013

When The Classroom Is Not In The Schoolhouse: Applying Tinker To Student Speech At Online Schools, Brett T. Macintyre

Seattle University Law Review

Despite the overwhelming increase in students’ Internet use and the growing popularity of online public schools, the United States Supreme Court has never addressed how, or if, schools can discipline students for disruptive online speech without violating the students’ First Amendment rights. What the Supreme Court has addressed is how school administrators can constitutionally discipline students within traditional schools. In a landmark decision, Tinker v. Des Moines Independent Community School District, the Supreme Court announced the now famous principle that students do not “shed their constitutional rights to freedom of speech or expression at the schoolhouse gate.” Still, the Court …


Oh, What A Tangled World Wide Web We Weave: An Analysis Of Washington's Computer Spyware Act In A National Context, Laura L. Edwards Jan 2008

Oh, What A Tangled World Wide Web We Weave: An Analysis Of Washington's Computer Spyware Act In A National Context, Laura L. Edwards

Seattle University Law Review

Spyware affects businesses as well as individuals. Spyware can expose a company's confidential information, slow down computers and networks, and destroy data. Employees lose efficiency while waiting for IT staff to fix the various problems caused by spyware, which increases costs. Accordingly, spyware is not just a minor annoyance suffered by individual Internet users; rather, it harms American businesses and the economy as well.


Internet Voting With Initiatives And Referendums: Stumbling Towards Direct Democracy, Rebekah K. Browder Jan 2005

Internet Voting With Initiatives And Referendums: Stumbling Towards Direct Democracy, Rebekah K. Browder

Seattle University Law Review

Imagine that it is Tuesday, November 4, 2008, and you realize that you have not yet voted for the candidate that you want to be President of the United States. The polls close at 7 p.m., and it is already 6:45 p.m. Instead of rushing off to the nearest polling place, you simply go to your computer, log in, fill out a ballot, and email your ballot to your designated polling website. The whole process takes fewer than ten minutes, and you have done your civic duty. Leading proponents of Internet voting point to five possible benefits of electronic voting: …


Keynote Colloquy: Finding Justice In The Internet Dimension, Hon. Alex Kozinski Jan 1997

Keynote Colloquy: Finding Justice In The Internet Dimension, Hon. Alex Kozinski

Seattle University Law Review

The Internet community—just like all other speech communities—ought to be afforded First Amendment protections. I don't see any reason why Internet speech should be treated any less favorably than other kinds of speech. But the vastly overblown claim that the communications medium somehow deserves to be put outside normal legal constraints--because it's so global, or because it's so different—is self-defeating. It substitutes generalities and sentiments for real thinking. The kind of analysis we've seen at this conference—the kind of debate we've had here—is very useful, because we're talking about the specifics of what legal constraints should be allowed. Not whether …


The Name Is Not Always The Same, Neal J. Friedman, Kevin Siebert Jan 1997

The Name Is Not Always The Same, Neal J. Friedman, Kevin Siebert

Seattle University Law Review

This Article explores the present Internet addressing system, the history of trademark disputes on the Internet, and proposals for resolving these disputes. Part I provides a brief history of the Internet, discusses its addressing system, and explains the use of domain names as identifiers for companies on the Internet. Part II introduces the current system for registering Internet domain names and the problems associated with its structure. Part III gives a brief background of trademark law and tracks the evolution of disputes that have arisen as a result of the intersection of the Internet and trademark law. Finally, Part IV …


The Internet And Its Legal Ramifications In Taiwan, George C.C. Chen Jan 1997

The Internet And Its Legal Ramifications In Taiwan, George C.C. Chen

Seattle University Law Review

Part I of this Article briefly introduces the five main legal issues related to Internet use in Taiwan. Part II discusses network-related copyright issues, including the doctrine of fair use, personal and corporate use of the Internet, and one of the first court cases in Taiwan on this issue. Part III discusses issues arising from commercial activity on the Internet, including the validity of on-line contracts, the use of digital signatures for authentication, and the applicability of Taiwan's Broadcasting and Television Law, Cable Television Law, and Fair Trade Law to regulating commercial advertising on the Internet. Part IV discusses the …


Bridging The Analogy Gap: The Internet, The Printing Press And Freedom Of Speech, Jonathan Wallace, Michael Green Jan 1997

Bridging The Analogy Gap: The Internet, The Printing Press And Freedom Of Speech, Jonathan Wallace, Michael Green

Seattle University Law Review

The Supreme Court will bring the highest degree of clarity to the Internet freedom of speech debate if, in ACLU v. Reno, it sets forth the operative metaphor for freedom of speech and applies the metaphor in conjunction with an appropriate analogy for the technology.Part I of this Article discusses judicial decision-making tools with an emphasis on the use of analogy and the importance of applying legal precedents in a manner which is consistent and logical. Part I also discusses the use of metaphor in judicial decisionmaking and illustrates how operative metaphors for free speech have served to provide …


Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch Jan 1997

Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch

Seattle University Law Review

On the national level, there are proposals to make the Internet the primary, and even the exclusive, means of disseminating certain government information. Concurrently, corporations and other private organizations may adopt a similar approach for their reports and other documents. Intertwined with these official and quasi-official documents are innumerable others created by individuals around the world. With so many documents, there is potential for dissemination of false, biased, and even fraudulent information. This is the source of the authentication problem.


Cyberspace Must Exceed Its Grasp, Or What's A Metaphor? Tropes, Trips And Stumbles On The Info Highway, Robert C. Cumbow Jan 1997

Cyberspace Must Exceed Its Grasp, Or What's A Metaphor? Tropes, Trips And Stumbles On The Info Highway, Robert C. Cumbow

Seattle University Law Review

This Essay will focus on three metaphors, and show briefly how the arguments that copyright law is “unworkable” in the Internet context are based on a misreading of these metaphors. The first metaphor is the use of the term “cyberspace” to apply to the Internet; the second is the tendency to describe Internet communication as “going” somewhere. Both of these metaphors mistakenly suggest a space in which enforcement—and, indeed, violation—of any law is impossible. The third metaphor is the “wine and bottles” analogy, set forth by John Perry Barlow in his widely circulated article, “The Economy of Ideas," to show …