Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden Nov 2017

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden

Akron Law Review

In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.


Trademark Boundaries And 3d Printing, Lucas S. Osborn Aug 2017

Trademark Boundaries And 3d Printing, Lucas S. Osborn

Akron Law Review

3D printing technology promises to disrupt trademark law at the same time that trademark law and policy sustain repeated criticism. The controversial growth of trademark law over the last century has yielded amorphous sponsorship and affiliation confusion issues and empirically fragile post-sale and initial-interest confusion theories, among others. Into this melee marches 3D printing technology, which dissociates the process of design from that of manufacturing and democratizes manufacturing. Rather than being embodied only in physical objects, design is embodied in digital CAD files that users can post and sell on the internet. The digitization of physical objects raises fundamental questions …


Redefining The Intended Copyright Infringer, Yvette Joy Liebesman Aug 2017

Redefining The Intended Copyright Infringer, Yvette Joy Liebesman

Akron Law Review

The contemporary copyright infringer is pretty much anyone who can get caught. Yet, who could be caught back when the Copyright Act of 1976 was enacted is just a subset of those who can be caught today—we had very different concepts about who was the intended target of an infringement action than who fits into that mold today. The advent and growth of cyberspace communication now makes it both easier to infringe and for IP owners, with very little effort, to capture infringers. The ability of individuals to both easily infringe and easily be found infringing has altered the IP …


The Right To Be Forgotten, Lisa Owings Apr 2016

The Right To Be Forgotten, Lisa Owings

Akron Intellectual Property Journal

This Article advocates a new test for balancing free speech and privacy interests online. There should be a three-prong test for whether, and under what circumstances, a user may request deletion of online data under the right to be forgotten. First, if the information is the publication of a private fact that is offensive to a reasonable person and not newsworthy, it should never be published unless the individual chooses to do so. Second, if individuals posted the information about themselves or as an expression of their opinion, they should have the right to remove it. This should apply not …


Swift, Modest Proposals, Babies, And Bathwater: Are Hibbitts's Writes Right?, Thomas R. Bruce Jul 2015

Swift, Modest Proposals, Babies, And Bathwater: Are Hibbitts's Writes Right?, Thomas R. Bruce

Akron Law Review

That is one of the reasons I fidget a bit as I read Last Writes?. I think that doing what Hibbitts proposes and more to the point, doing it well will be rather more work than he lets on, and will be anything but immediate. It will be a difficult kind of work, the thorny, self critical kind that law schools generally avoid like the plague. While Hibbitts does an excellent job of outlining the possible objections to his "modest proposal," I think that he underestimates the tenacity of the existing culture. I also think he misses some of the …


Self-Publication On The Internet And The Future Of Law Reviews, Gregory E. Maggs Jul 2015

Self-Publication On The Internet And The Future Of Law Reviews, Gregory E. Maggs

Akron Law Review

This essay presents a different vision of the future. Part I explains why law reviews might continue to exist even after self-publication on the Internet becomes the norm. It suggests that law reviews could still perform many of the functions they currently perform, even it they get out of the business of publishing. Part II then argues that law schools should favor the continued existence of law reviews. It explains that law reviews stimulate and enrich the students who volunteer to serve on them, and that developments on the Internet will make the law review experience even more valuable. Part …


The Future Of Legal Scholarship And Scholarly Communication: Publication In The Age Of Cyberspace, David A. Rier Jul 2015

The Future Of Legal Scholarship And Scholarly Communication: Publication In The Age Of Cyberspace, David A. Rier

Akron Law Review

In Part I of this paper, I will review the essentials of Hibbitts's discussion, and his argument that electronic self-publication of legal scholarship soon willand shouldreplace the edited, printed law review as we know it today. In Part II, I apply sociological analysis to explore some special features of the audience for and functions of legal scholarship. I will build upon this discussion in Part III, which explains why legal scholarship is a poor candidate for electronic self-publication, and why self-publication is a poor use of the Internet's potential for scholarly communication. In the concluding Part IV, I outline some …


Cyberspace: The Final Frontier, For Regulation?, Jay Krasovec Jul 2015

Cyberspace: The Final Frontier, For Regulation?, Jay Krasovec

Akron Law Review

This article will discuss the concept of anonymity on the Internet and argue for its protection. Part II provides background information on the Internet and illustrates the prominence the Internet has in today's global society. Part III discusses the concept of anonymity and its importance in our daily communications and how these principles necessarily extend to online communication. Part IV outlines the purported justifications for regulating Internet content, which is followed by Part V discussing current and attempted regulations of the Internet. This article then argues for the full protection of online anonymous speech as mandated by fundamental principles of …


Www.Obscenity.Com: An Analysis Of Obscenity And Indecency Regulation Of The Internet, Kelly M. Doherty Jul 2015

Www.Obscenity.Com: An Analysis Of Obscenity And Indecency Regulation Of The Internet, Kelly M. Doherty

Akron Law Review

This comment explores the constitutionality of federal regulations as applied to Internet content and alternatives to government regulation. Part II provides background on the Internet, First Amendment obscenity and indecency law as applied to communications media, and past and current legislation enacted to regulate Internet content. Part III analyzes the constitutionality of COPA, and discusses why other alternatives are more effective and preferable to government regulation. Part IV concludes that protecting children from harmful Internet content is the responsibility of parents, and therefore, Internet regulation should begin at home.


Copyright Tensions In A Digital Age, John D. Shuff, Geoffrey T. Holtz Jul 2015

Copyright Tensions In A Digital Age, John D. Shuff, Geoffrey T. Holtz

Akron Law Review

The rapid and exponential expansion of our ability to duplicate and disseminate information by digital means has rejuvenated inherent tensions in the law pertaining to copyright and has created some new ones. Not since the advent of radio in the early 1900s have such tensions come so squarely into focus. Even though courts are rarely, if ever, called upon to address certain of these tensions since the passage of the Copyright Act of 1976, they are being called upon to do so now


Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin Jul 2015

Payment Methods For Consumer-To-Consumer Online Transactions, David E. Sorkin

Akron Law Review

Participants in online auctions use a variety of payment mechanisms, but checks and money orders still represent the most commonly used means of payment. Credit cards afford greater protection to buyers, but until recently payment by credit card was not even an option for person-to-person transactions. However, several online payment services have been established that enable individuals to make credit card payments to one another, generally with the payment service acting as an intermediary. These services are growing rapidly, mainly because of the speed and convenience that they offer. Yet relatively little attention has been paid to the risks and …


The Medium Is The Message: Copyright Law Confronts The Information Age In New York Times V. Tasini, Mark B. Radefeld Jul 2015

The Medium Is The Message: Copyright Law Confronts The Information Age In New York Times V. Tasini, Mark B. Radefeld

Akron Law Review

This Note analyzes the Supreme Court’s recent opinion in New York Times Co. v. Tasini and its implications for the future of copyright law and electronic publishing. Part II of this Note documents the background of copyright law, and details how the default provisions of §201(c) govern the publisher-author relationship. Part III of this Note introduces the parties and circumstances surrounding the Tasini case. Part III continues by outlining the District Court for the Southern District of New York, the Court of Appeals for the Second Circuit, and the Supreme Court decisions in this landmark case. Part IV of this …


United States V. American Library Association: The Choice Between Cash And Constitutional Rights, Barbara A. Sanchez Jul 2015

United States V. American Library Association: The Choice Between Cash And Constitutional Rights, Barbara A. Sanchez

Akron Law Review

This Note discusses the possibility that the Court, in its eagerness to protect children, twisted established First Amendment doctrines to uphold CIPA and declined to address other legal issues that weaken CIPA’s constitutionality. Part II provides a historical background of previous legislation attempting to protect children accessing the Internet, explains what CIPA is and compares it to previous legislation, and also discusses current filtering technology and its limitations. Part III provides a statement of the facts, including the procedural history of the case. Part IV analyzes the Court’s confusing and inconsistent application of firmly established rules dealing with Congress’ spending …