Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Internet

Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 169

Full-Text Articles in Law

"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar Jan 2019

"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar

Journal of Law, Technology, & the Internet

President Donald Trump’s affinity for Twitter has raised novel issues of constitutional law, tested the norms for presidential etiquette, and opened up a dialogue about whether tweets are considered the actual directives of the President. This note explores four subject areas that the President has tweeted about: judicial legitimacy, executive orders, removal of appointees, and entering into armed conflicts. Then, these topics will be considered in terms of whether presidential speech on social media should be regulated to protect against the risks of posting on the Internet and to ensure the preservation of the principles of democracy embedded in the …


Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2019

Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

The “server rule” holds that online displays or performances of copyrighted content accomplished through “in-line” or “framing” hyperlinks do not trigger the exclusive rights of public display or performance unless the linker also possesses a copy of the underlying work. As a result, the rule shields a vast array of online activities from claims of direct copyright infringement, effectively exempting those activities from the reach of the Copyright Act. While the server rule has enjoyed relatively consistent adherence since its adoption in 2007, some courts have recently suggested a departure from that precedent, noting the doctrinal and statutory inconsistencies underlying …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski Jun 2018

Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski

St. John's Law Review

(Excerpt)

When asking how fake news in social media can be combated under U.S. and German law, one must first take the systems’ most fundamental differences into consideration. U.S. law is characterized by its federal structure, the interaction of state laws often with the federal, U.S. Constitution, usage of pretrial discovery, as well as the role of juries in calculating damages. In contrast, Germany, as a civil law system, is characterized by its usage of separate legal actions to acquire information, lack of pretrial discovery, and broader array of available remedies, none of which allow for punitive damages. Through a …


Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton Jun 2018

Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton

Seattle University Law Review

Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …


The Future Of Law And Mobility, Daniel A. Crane Jun 2018

The Future Of Law And Mobility, Daniel A. Crane

Articles

With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.


A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys Apr 2018

A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys

Faculty Publications

No abstract provided.


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Privacy And Outrage, Jordan M. Blanke Jan 2018

Privacy And Outrage, Jordan M. Blanke

Journal of Law, Technology, & the Internet

It is not an understatement that technology has dramatically altered virtually every aspect of our life in recent years. While technology has always driven change, these changes are occurring more rapidly and more extensively than ever before. We are fully entrenched in the world of Big Data, the Internet of Things, and Smart Cities – and we are never going back. As always, society and its laws must evolve, but it is not always an easy process.

The notion of privacy has certainly changed in our data-driven world and continues to change daily. While it has always been difficult to …


When Whispers Enter The Cloud, Heidi H. Liu Jan 2018

When Whispers Enter The Cloud, Heidi H. Liu

All Faculty Scholarship

With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.


Regulation By Database, Nathan Cortez Jan 2018

Regulation By Database, Nathan Cortez

Faculty Journal Articles and Book Chapters

The federal government currently publishes 195,245 searchable databases online, a number of which include information about private parties that is negative or unflattering in some way. Federal agencies increasingly publish adverse data not just to inform the public or promote transparency, but to pursue regulatory ends ⎯ to change the underlying behavior being reported. Such "regulation by database" has become a preferred method of regulation in recent years, despite scant attention from policymakers, courts, or scholars on its appropriate uses and safeguards.

This Article, then, evaluates the aspirations and burdens of regulation by database. Based on case studies of six …


Consumer Click Arbitration: A Review Of Online Consumer Arbitration Agreements, Jeffrey H. Dasteel Aug 2017

Consumer Click Arbitration: A Review Of Online Consumer Arbitration Agreements, Jeffrey H. Dasteel

Arbitration Law Review

No abstract provided.


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble Jan 2017

Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.

A video of the session is available here. Additionally, Professor Trimble's presentation is available here.


Conceptualizing Cryptolaw, Carla L. Reyes Jan 2017

Conceptualizing Cryptolaw, Carla L. Reyes

Faculty Journal Articles and Book Chapters

Sweden transfers its real property recording system to the blockchain, a software protocol that enables public, cryptographically secure transaction verification without reliance upon a trusted third party. Dubai plans to issue blockchain-based government documents. The United States Department of Health and Human Services investigates blockchain-based systems for managing health data. Illinois explores blockchain-based applications for use in the Illinois government. News of governments and public-private partnerships developing blockchain-based legal applications increasingly splash across the headlines; however the law-makers using blockchain and other Distributed Ledger Technology (DLT) systems to implement legal processes do not systematically consider the broader implications of their …


Prosecuting Online Threats After Elonis, Michael Pierce Jun 2016

Prosecuting Online Threats After Elonis, Michael Pierce

Northwestern University Law Review

In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Feb 2016

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Thomas E. Baker

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams Jan 2016

Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams

All Faculty Scholarship

In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage Sep 2015

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold May 2015

Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold

William & Mary Law Review

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 2nd Edition., Patricia Bellia, David Post, Paul Schiff Berman Mar 2015

Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 2nd Edition., Patricia Bellia, David Post, Paul Schiff Berman

Patricia L. Bellia

This innovative casebookwhich has proved extremely popular with students and professors alikestarts from the premise that cyberlaw is not simply a set of legal rules governing online interaction, but a lens through which broader jurisprudential issues can be re-examined. Accordingly, this book goes beyond plugging Internet-related cases into a series of pre-existing doctrinal categoriesFirst Amendment, copyright, trademark, etc.and instead emphasizes the conceptual debates that cut across the areas of doctrine touched by cyberspace. Moreover, the casebook uses the rise of the Internet to encourage readers to reconsider various assumptions in traditional legal doctrine. This dual focus provides readers with broad-based …


Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 3rd Edition., Patricia Bellia, David Post, Paul Schiff Berman Mar 2015

Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 3rd Edition., Patricia Bellia, David Post, Paul Schiff Berman

Patricia L. Bellia

This innovative casebookwhich has proved extremely popular with students and professors alikestarts from the premise that cyberlaw is not simply a set of legal rules governing online interaction, but a lens through which broader jurisprudential issues can be re-examined. Accordingly, this book goes beyond plugging Internet-related cases into a series of pre-existing doctrinal categoriesFirst Amendment, copyright, trademark, etc.and instead emphasizes the conceptual debates that cut across the areas of doctrine touched by cyberspace. Moreover, the casebook uses the rise of the Internet to encourage readers to reconsider various assumptions in traditional legal doctrine. This dual focus provides readers with broad-based …


Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney Jan 2015

Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney

University of Michigan Journal of Law Reform

Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …


Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively Jan 2015

Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively

Jesse D Lively

This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …