Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Law

Public Forum 2.0, Lyrissa Barnett Lidsky Apr 2016

Public Forum 2.0, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Mar 2016

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Gary C. Kessler

This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Feb 2016

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Thomas E. Baker

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman Jul 2015

Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman

Shlomit Yanisky-Ravid Professor of Law

Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …


Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot Dec 2014

Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot

Catherine J. Lanctot

This Article provides a roadmap for rebooting the legal ethics curriculum. It describes how to revise a traditional legal ethics class to respond to twenty-first century law practice, and provides a detailed overview of the landscape of technological issues currently affecting the practice of law, including many cautionary tales of lawyers who ignored their ethical responsibilities.

We have finally hit the tipping point with respect to the use of technology within the legal profession, as bar regulators have begun to warn attorneys that they may no longer plead ignorance of technological advances if such ignorance harms the interests of their …


Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati Apr 2014

Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati

Rodolfo C. Rivas

The authors provide a brief rundown of strategies to protect a wide range of IP rights in cyberspace. The strategies tackle practical advice and suggest a series of progressive actions in order to ensure maximum protection with an efficient use of resources.//////////////////////////////// Los autores proporcionan un breve resumen de las estrategias para proteger una amplia gama de derechos de propiedad intelectual en el ciberespacio. Las estrategias abordan consejos prácticos y sugieren una serie de acciones en orden progresivo con la finalidad de garantizar la máxima protección manteniendo un uso eficiente de los recursos.


Notice, Assent, And Form In A 140 Character World, Juliet Moringiello Dec 2013

Notice, Assent, And Form In A 140 Character World, Juliet Moringiello

Juliet M Moringiello

This essay is a contribution to a symposium on Professor Nancy Kim’s terrific book, Wrap Contracts: Foundations and Ramifications. In the book, Prof. Kim examines this explosion in volume of online contract terms and offers some suggestions for improving the judicial approach to these terms. Despite the ease of presenting online terms in a visually appealing format, today’s electronically presented terms are even less comprehensible than those of fifteen years ago. At the same time that individuals have become accustomed to receiving information in small doses due to the proliferation of social media platforms such as Twitter, Instagram, Facebook and …


Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo Apr 2012

Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo

Tony Guo

As the Egyptian government took the country offline—in an effort to squelch public dissent—the U.S. Senate considers a bill that would give the President the same emergency powers to shut off “critical” Internet infrastructure in the event of a “cyber emergency.” This bill, along with others like it, has been introduced in light of recent political rhetoric on “cyber war.” The proponents of “cyber war” evoke images of large explosions, poison gas clouds, and a high degree of mortality. In reality, cyber warfare is a misleading metaphor, and has long been confused with crime and espionage. "Cyber war" is not …


Uses And Abuses Of Cyberspace, Andrew D. Murray Apr 2012

Uses And Abuses Of Cyberspace, Andrew D. Murray

Professor Andrew D Murray

No abstract provided.


Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik Jan 2012

Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik

Warren Bartholomew Chik

The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …


Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik Jan 2012

Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik

Warren Bartholomew Chik

The cyber world is an extension of the real world. It is another dimension where we can work, study and play. But people also tend to lose their inhibitions on the Internet, often while keeping their anonymity. Because of the perceived and real freedoms in the digital environment, people are emboldened to act in ways that they may not normally do in the real world. One recent phenomenon that is steadily becoming a problem in every country with a high level of electronic connectivity is the act of cyberstalking. The electronic medium is an important factor due to its very …


'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik Jan 2012

'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik

Warren Bartholomew CHIK

The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …


La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano Aug 2010

La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano

Germán M. Teruel Lozano

Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.


Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello Oct 2009

Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello

Juliet M Moringiello

No abstract provided.


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds Apr 2009

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds

William L. Reynolds

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Apr 2009

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Dec 2008

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …


Pornography, Coercion, And Copyright Law 2.0, Ann Bartow Dec 2007

Pornography, Coercion, And Copyright Law 2.0, Ann Bartow

Ann Bartow

The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their …


Electronic Surveillance At The Virtual Border, Susan Freiwald Dec 2007

Electronic Surveillance At The Virtual Border, Susan Freiwald

Susan Freiwald

A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds Dec 2007

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds

Juliet M. Moringiello

In this survey, we discuss electronic contracting cases decided between July 1, 2007 and June 30, 2008. In addition to cases adding to the literature on the enforceability of online contracts, this survey includes cases discussing modification of online contracts, incorporation by reference, and unconscionability. We conclude that our common law is developing nicely to address the issues presented by internet contracting.


Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Dec 2006

Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Ann Bartow

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds Dec 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds

Juliet M. Moringiello

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Contracts, Payments And What To Do With All That Data: Introduction To The 2006 Cyberspace Survey, Juliet Moringiello Dec 2005

Contracts, Payments And What To Do With All That Data: Introduction To The 2006 Cyberspace Survey, Juliet Moringiello

Juliet M Moringiello

No abstract provided.


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii Dec 2005

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii

Juliet M. Moringiello

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow Feb 2005

Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow

Ann Bartow

This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are "gendered" in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem …


Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello Dec 2004

Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello

Juliet M. Moringiello

This article reviews recent developments in the United States and the European Union involving Internet transactions. It describes those developments and analyzes both from a normative and practical perspective.


Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald Dec 2003

Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald

Susan Freiwald

This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …


Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald Dec 2000

Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald

Susan Freiwald

Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.

Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …


Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow Apr 2000

Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow

Ann Bartow

This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …


Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow Dec 1999

Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow

Ann Bartow

This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …