Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (8)
- National Security (4)
- Social Media (4)
- All Other Telecommunications (3)
- Bitcoin (3)
-
- Computers (3)
- Cybersecurity (3)
- Jurisdiction (3)
- Personal Jurisdiction (3)
- Technology (3)
- ART (2)
- Assisted Reproductive Technology (2)
- Copyright Infringement (2)
- Copyright Law (2)
- Democracy (2)
- FCC (2)
- Facebook (2)
- Federal Communications Commission (2)
- Fertility Clinics (2)
- Fertility clinics (2)
- File Sharing (2)
- Intellectual Property (2)
- Internet advertising (2)
- Other telecommunications (2)
- Personal information management (2)
- Privacy (2)
- Right of privacy (2)
- Supreme Court (2)
- Websites (2)
- Wired Telecommunications Carriers (2)
Articles 1 - 30 of 47
Full-Text Articles in Law
Tinder Love And Care: Proposing An Industry Self-Regulation Policy Implementing Safety Procedures For Dating App Companies, Marissa Meredith
Tinder Love And Care: Proposing An Industry Self-Regulation Policy Implementing Safety Procedures For Dating App Companies, Marissa Meredith
Indiana Law Journal
Online dating companies have monetized and capitalized on the idea of finding love, creating a billion-dollar industry matching individuals with their “soul mates.” With its perks and benefits, the online love industry is not without risk. Despite some dating companies limiting user eligibility in their terms and conditions to those without felony and sexual offense convictions, there is no actual screening process established by these companies. Furthermore, there are no uniform safety protocols among dating app companies. This lack of uniformity coupled with access to all, including violent offenders, allows repeat offenders to engage in “delightful” conversations with unsuspecting strangers …
The Policy Origins Of Wi-Fi, John Blevins
The Policy Origins Of Wi-Fi, John Blevins
Indiana Law Journal
Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Indiana Law Journal
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells
Indiana Law Journal
This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …
Measuring Trademark Dilution By Tarnishment, Suneal Bedi, David Reibstein
Measuring Trademark Dilution By Tarnishment, Suneal Bedi, David Reibstein
Indiana Law Journal
The law of trademark tarnishment—a type of trademark dilution—is in disarray. The
basic definition is deceptively simple. Trademark tarnishment occurs when a junior
mark harms the reputation of a substantially similar existing senior trademark by
associating itself with something perverse or deviant. However, it turns out that
Congress and the courts disagree over the prima facie evidence necessary to prove
its existence. The problem is that federal law and related legal principles are simply
ill-equipped to adequately analyze this unique market-driven doctrine. To make
matters worse, legal scholars cannot even agree on whether trademark tarnishment
can empirically exist in the …
Internet Architecture And Disability, Blake Reid
Internet Architecture And Disability, Blake Reid
Indiana Law Journal
The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …
Upskirting, Bitcoin, And Crime, Oh My: Judicial Resistance To Applying Old Laws To New Crimes – What Is A Legislature To Do?, Michael Whiteman
Upskirting, Bitcoin, And Crime, Oh My: Judicial Resistance To Applying Old Laws To New Crimes – What Is A Legislature To Do?, Michael Whiteman
Indiana Law Journal
As technology continues to advance at a break-neck speed, legislatures often find themselves scrambling to write laws to keep up with these advances. Prosecutors are frequently faced with the prospect of charging a defendant with a crime based on an existing law that does not quite fit the circumstances of the defendant’s actions. Judges, cognizant of the fact that legislatures, and not the judiciary, have the primary responsibility for creating crimes, have pushed back. Judges routinely refuse to convict a defendant if the statute does not fairly criminalize the defendant’s actions. To determine if a defendant’s actions fit within a …
A Coffee Break For Bitcoin, Margaret Ryznar
A Coffee Break For Bitcoin, Margaret Ryznar
Indiana Law Journal
For many, the appeal of bitcoin is in its detachment from government regulation. However, the Coffee bonding theory, which initially arose in the context of foreign stocks, suggests certain benefits of regulation for bitcoin, including increased legitimacy. By invoking the Coffee bonding theory, this Article offers another perspective on the regulation of bitcoin.
#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel
#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel
Indiana Law Journal
This Article explores the complicated relationship between minimum contacts and the modern internet. Part I traces the development of modern personal jurisdiction analyses in the areas of both specific and general jurisdiction. Interesting in this historical overview is the increased reliance on predictability, even as courts have recognized that advanced technologies and infrastructure have made the maintenance of lawsuits infinitely easier than in the days before International Shoe.7 Part II then explores the intersection between personal jurisdiction and the internet as well as the rise of the so-called Zippo “interactivity” test for jurisdiction in cases involving websites. Although Zippo has …
Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii
Data Protection In An Increasingly Globalized World, Nicholas F. Palmieri Iii
Indiana Law Journal
With the rise of the internet in recent decades, it has become increasingly easy for various enterprises—including retailers, advertising agencies, and service providers—to acquire, use, and even share the personal details of their users. Such a trend is unlikely to decrease in the coming years; in fact, internet usage is only likely to increase as more and more people gain access to the internet. In the wakeof recent data breaches, including the now infamous breach of Equifax as well as the scandal involving Facebook and Cambridge Analytica, people are even more aware of the need for (and the risk of …
The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim
Indiana Law Journal
On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …
Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia
Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia
Indiana Law Journal
Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. …
Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin
Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin
Indiana Law Journal
The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about Too-Big-To-Fail …
Cybersecurity And Tax Reform, Michael Hatfield
Cybersecurity And Tax Reform, Michael Hatfield
Indiana Law Journal
INTRODUCTION
I. THE PAST AND FUTURE OF THE IRS AS A CYBERATTACK TARGET
A. IRS AS A CYBERATTACK TARGET
B. THE FUTURE OF THE IRS AS A CYBERATTACK TARGET1. INFORMATION TECHNOLOGY
2. TAX INFORMATION
3. TYPES OF FUTURE ATTACKS
II. THE IRSWILL FAIL TO IMPLEMENT ADEQUATE CYBERSECURITY
A. VERY POOR HISTORY OF IMPROVING TECHNOLOGY
B. INADEQUATE FUNDING
C. INABILITY TO RECRUIT AND RETAIN EXPERTS
D. TOOMANY USERS
E. CYBERSECURITY IS DIFFICULT
III. BETTER DIGITAL TECHNOLOGY IS NOT THE GOAL
A. SLOWING THE USE OF DIGITAL TECHNOLOGY
B. CYBERSECURITY AND TAX REFORM
1. PAY-AS-YOU-EARN (PAYE)
2. SIMPLIFIED INCOME TAX
3. PURIFIED …
User-Friendly Taxpaying, Kathleen Delaney Thomas
User-Friendly Taxpaying, Kathleen Delaney Thomas
Indiana Law Journal
Technology is revolutionizing our lives. With the touch of a button or a simple voice command, we can instantly order groceries, get directions, or find the nearest sushi restaurant. Sensibly, the private sector has capitalized on these recent innovations to drive up profits. To sell more laundry detergent, Amazon now enables consumers to order refills by simply pressing the “dash button” mounted above their laundry machines. Starbucks lures more customers by allowing them to pre-order online and have their drink waiting when they arrive at the store. The theory behind this approach is simple: if you want someone to use …
"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin
"To Hell In A Handbasket": Teachers, Free Speech, And Matters Of Public Concern In The Social Media World, Jessica O. Laurin
Indiana Law Journal
This Note argues that courts should narrow the scope of examined speech and place little weight on the amount of media attention that the speech received. Although courts sometimes reject First Amendment protection on the Pickering balancing test instead of the public concern issue, the public concern requirement is a threshold issue that plays a critical role in successful First Amendment claims. Accordingly, courts need to revisit the public concern doctrine to ensure that its analysis is sound and yields the correct outcome.
Part I provides background concerning retaliation claims, criticism of the public concern requirement, and special issues that …
Regulating Fantasy Sports: A Practical Guide To State Gambling Laws, And A Proposed Framework For Future State Legislation, Marc Edelman
Regulating Fantasy Sports: A Practical Guide To State Gambling Laws, And A Proposed Framework For Future State Legislation, Marc Edelman
Indiana Law Journal
In recent months, the legal status of fantasy sports has undergone intense scrutiny, with the attorneys general of many states contending that certain formats of daily fantasy sports violate state gambling laws. In an effort to save the burgeoning daily fantasy sports industry, legislators in these states have proposed bills to affirmatively legalize and regulate daily fantasy sports. However, these bills often fail to adequately address the underlying consumer protection concerns pertaining to the industry.
This Article analyzes how U.S. states currently regulate the fantasy sports marketplace and proposes a framework for future state laws to effectively regulate both traditional …
The Right To Attention, Jasper L. Tran
The Right To Attention, Jasper L. Tran
Indiana Law Journal
What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective.
This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet advertisement companies and scam artists freely …
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir
Indiana Law Journal
Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.
Our survey is the first comprehensive examination of the intersection of …
Beyond Transparency: The Semantics Of Rulemaking For An Open Internet, Reza Rajabiun
Beyond Transparency: The Semantics Of Rulemaking For An Open Internet, Reza Rajabiun
Indiana Law Journal
In trying to promote the development of an open Internet, the U.S. Federal Communications Commission (FCC) has primarily tried to encourage network providers to be transparent about their traffic management practices and quality of service prioritization policies. Dominant network operators have successfully challenged this minimalist approach to addressing end-user concerns about the rise of a two-tiered Internet, motivating the FCC to engage in yet another public consultation process to assess its future approach to the problem. This article maps the debate using Natural Language Processing (NLP) tools that allow us to build a systematic picture of the positions of the …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
Removing Disfavored Faces From Facebook: The Freedom Of Speech Implications Of Banning Sex Offenders From Social Media, John Hitz
Indiana Law Journal
This Note scrutinizes the constitutionality of statutes that ban sex offenders who are no longer under any form of probation, parole, or supervised release from using social media. This Note argues that the incarnations of three of the social media ban statutes that have been examined by the federal judiciary were properly found unconstitutional because they violate the free speech rights of the sex offenders that they ban from social media. This Note goes on to argue that states can secure the interests they were seeking to protect in adopting these statutes through other means.
ng what groups of individuals …
Learning From Copyright's Failure To Build Its Future, Ken Burleson
Learning From Copyright's Failure To Build Its Future, Ken Burleson
Indiana Law Journal
Since file sharing emerged in the late 1990s, copyright infringement has been widespread and virtually impervious to legal sanctions. Despite the best efforts of industry representatives and the lawmakers acting at their behest, attempts to scare and shame copyright infringers into compliance with the law have fallen flat. Part I of this Note discusses the ongoing conflict between modern copyright law and socially acceptable behavior, specifically copyright infringement through digital means. Part II explores the various attempts, and subsequent failures, to curb infringement through deterrence measures. Part III explains why deterrence has been ineffective by exploring psychological models of law-abiding …
Reviving Implied Confidentiality, Woodrow Hartzog
Reviving Implied Confidentiality, Woodrow Hartzog
Indiana Law Journal
The law of online relationships has a significant flaw—it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.
Courts’ abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …
Bitcoin And Money Laundering: Mining For An Effective Solution, Danton Bryans
Bitcoin And Money Laundering: Mining For An Effective Solution, Danton Bryans
Indiana Law Journal
No abstract provided.
Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira
Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira
Indiana Law Journal
Roundtable on Regulating Assisted Reproductive Technology 2012
Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins
Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins
Indiana Law Journal
Scholarship on assisted reproductive technologies (ART) has emphasized the commercial nature of the interaction between fertility patients and their physicians, but little attention has been paid to precisely how clinics persuade patients to choose their clinics over their competitors’. This Article offers evidence about how clinics sell ART based on clinics’ advertising on their websites. To assess clinics’ marketing efforts, I coded advertising information on 372 fertility clinics’ websites. The results from the study confirm some suspicions of prior ART scholarship while contradicting others. For instance, in line with scholars who are concerned that racial minorities face barriers to accessing …
Biometric Id Cybersurveillance, Margaret Hum
Biometric Id Cybersurveillance, Margaret Hum
Indiana Law Journal
The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
Gmonopoly: Does Search Bias Warrant Antitrust Or Regulatory Intervention?, Andrew Langford
Gmonopoly: Does Search Bias Warrant Antitrust Or Regulatory Intervention?, Andrew Langford
Indiana Law Journal
No abstract provided.