Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2019

Internet

Discipline
Institution
Publication

Articles 1 - 30 of 34

Full-Text Articles in Law

Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes Nov 2019

Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Internet Of Bodies, Andrea M. Matwyshyn Oct 2019

The Internet Of Bodies, Andrea M. Matwyshyn

William & Mary Law Review

This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …


Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran Oct 2019

Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran

IP Theory

How can Internet research be used properly and reliably in law? This paper analyzes several key and very different issues affecting judges, jurors, and lawyers. With respect to judges, this paper discusses the rules of judicial conduct and how they guide the appropriate use of the Internet for research; the standards for judicial notice; and whether judges can consider a third category of non-adversarially presented, non-judicially noticed factual evidence. With respect to jurors, this paper discusses causes of and deterrents to jurors conducting Internet research during trials; and the recourse available to parties who are adversely impacted by such behavior. …


When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin Oct 2019

When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin

South Carolina Law Review

No abstract provided.


Barlow's Legacy, Cory Doctorow Aug 2019

Barlow's Legacy, Cory Doctorow

Duke Law & Technology Review

No abstract provided.


Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder Aug 2019

Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle

Duke Law & Technology Review

No abstract provided.


Is The Internet Over?! (Again?), James Boyle Aug 2019

Is The Internet Over?! (Again?), James Boyle

Duke Law & Technology Review

No abstract provided.


Inventing The Future: Barlow And Beyond, Cindy Cohn Aug 2019

Inventing The Future: Barlow And Beyond, Cindy Cohn

Duke Law & Technology Review

No abstract provided.


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson Aug 2019

A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson

Duke Law & Technology Review

No abstract provided.


Revisiting Barlow's Misplaced Optimism, Benjamin Edelman Aug 2019

Revisiting Barlow's Misplaced Optimism, Benjamin Edelman

Duke Law & Technology Review

No abstract provided.


Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen Aug 2019

Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen

Duke Law & Technology Review

No abstract provided.


John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain Aug 2019

John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain

Duke Law & Technology Review

No abstract provided.


What Didn’T Happen: An Essay In Speculation, Peter Jaszi Aug 2019

What Didn’T Happen: An Essay In Speculation, Peter Jaszi

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell Jun 2019

Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell

Journal of the National Association of Administrative Law Judiciary

This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …


Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir May 2019

Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir

William & Mary Bill of Rights Journal

In this Article we argue that the digital revolution requires a reshaping of the Doctrine of Prior Restraint, which prohibits the implementation of any regulations that prevent the publication of speech prior to its distribution. We describe the prohibition on prior restraint of speech, its rationales and its exceptions; present the characteristics of the media in the digital age; suggest that the traditional design of the Doctrine does not fit these characteristics; and describe the reshaping that we propose in order to adapt the Doctrine to the age of the Internet and social networking.


Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom May 2019

Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom

St. John's Law Review

(Excerpt)

This Note argues that current law is inadequate to protect consumers in light of the prevalence and severity of data breaches in recent years, and that a unifying federal legislation combining portions of state law and the DSBNA should be enacted. Part I of this Note analyzes the DSBNA for notification requirements when data breaches occur, the requirements for the implementation of security policies, regulatory mechanisms for monitoring compliance with these requirements, and criminal penalties for failing to comply. Part II summarizes the various state laws that exist for notification of data breaches. Part III proposes a model federal …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano Apr 2019

The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano

Pace Law Review

The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …


The Airwaves Meet The Highways, David Redl Apr 2019

The Airwaves Meet The Highways, David Redl

Journal of Law and Mobility

I applaud and congratulate the University of Michigan for launching the Journal of Law and Mobility. The timing is perfect. The information superhighway is no longer just a clever metaphor. We are living in an era where internet connectivity is a critical part of making transportation safer and more convenient. Internet connectivity has powered the U.S. and global economies for years now. In the early stages, dial-up connections enabled users to access a vast store of digital information. As the internet and its usage grew, so did the demand for faster broadband speeds. Finally, wireless networks untethered the power of …


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman Jan 2019

When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman

Pepperdine Law Review

In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …


#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel Jan 2019

#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel

Indiana Law Journal

This Article explores the complicated relationship between minimum contacts and the modern internet. Part I traces the development of modern personal jurisdiction analyses in the areas of both specific and general jurisdiction. Interesting in this historical overview is the increased reliance on predictability, even as courts have recognized that advanced technologies and infrastructure have made the maintenance of lawsuits infinitely easier than in the days before International Shoe.7 Part II then explores the intersection between personal jurisdiction and the internet as well as the rise of the so-called Zippo “interactivity” test for jurisdiction in cases involving websites. Although Zippo has …


The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman Jan 2019

The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman

Catholic University Journal of Law and Technology

More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …


Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish Jan 2019

Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish

Journal of Law, Technology, & the Internet

The data subject’s (or the individual to whom the data relates) right to erasure under the new EU’s data protection law is likely to cause tensions with the right to freedom of expression. Using Article 17(1)(d)-(e) of the General Data Protection Regulation as a nexus to trigger and apply the right to privacy in EU law to the right to erasure, this Note presents a balancing test of four factors that can be used to consistently determine whether individual cases that request a right to erasure for published material are entitled to privacy protections. The proposed balancing test “Elements of …


"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar Jan 2019

"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar

Journal of Law, Technology, & the Internet

President Donald Trump’s affinity for Twitter has raised novel issues of constitutional law, tested the norms for presidential etiquette, and opened up a dialogue about whether tweets are considered the actual directives of the President. This note explores four subject areas that the President has tweeted about: judicial legitimacy, executive orders, removal of appointees, and entering into armed conflicts. Then, these topics will be considered in terms of whether presidential speech on social media should be regulated to protect against the risks of posting on the Internet and to ensure the preservation of the principles of democracy embedded in the …


The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney Jan 2019

The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney

Fordham Intellectual Property, Media and Entertainment Law Journal

The boundaries of the schoolyard were once clearly delineated by the physical grounds of the school. In those days, it was relatively easy to determine what sort of student behavior fell within an educator’s purview, and what lay beyond the school’s control. Technological developments have all but erased these confines and extended the boundaries of the school environment somewhat infinitely, as the internet and social media allow students to interact seemingly everywhere and at all times. As these physical boundaries of the schoolyard have disappeared, so too has the certainty with which an educator might supervise a student’s behavior.

Because …