Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

Facebook's Speech Code And Policies: How They Suppress Speech And Distort Democratic Deliberation, Joseph T. Thai Jan 2020

Facebook's Speech Code And Policies: How They Suppress Speech And Distort Democratic Deliberation, Joseph T. Thai

American University Law Review

No abstract provided.


Two-Sided Internet Markets And The Need To Assess Both Upstream And Downstream Impacts, Rob Frieden Jan 2019

Two-Sided Internet Markets And The Need To Assess Both Upstream And Downstream Impacts, Rob Frieden

American University Law Review

No abstract provided.


The Dark Data Quandary, Daniel J. Grimm Jan 2019

The Dark Data Quandary, Daniel J. Grimm

American University Law Review

No abstract provided.


Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas Jan 2019

Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas

American University Law Review

No abstract provided.


Crypto Securities: On The Risks Of Investments In Blockchain-Based Assets And The Dilemmas Of Securities Regulation, Schlomit Azgad-Tromer Jan 2018

Crypto Securities: On The Risks Of Investments In Blockchain-Based Assets And The Dilemmas Of Securities Regulation, Schlomit Azgad-Tromer

American University Law Review

No abstract provided.


Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod Jan 2017

Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod

American University Law Review

On September 22, 2016, Yahoo! Inc. ("Yahoo") announced that a data breach and theft of information from over 500 million user accounts had taken place during 2014, marking the largest data breach ever at the time. The information stolen likely included names, birthdays, telephone numbers, email addresses, hashed passwords, and, in some cases, encrypted or unencrypted security questions and answers. Yahoo further disclosed its belief that the stolen data "did not include unprotected passwords, payment card data, or bank account information." Just two months before Yahoo disclosed its 2014 data breach, it announced a proposed sale of the company's core …


Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy Jan 2017

Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy

American University Law Review

Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.

Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …


Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar Jan 2017

Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar

American University Law Review

The internet is a marvel of human accomplishment and a feat of technological engineering, which allows nearly instantaneous communication across the globe-an act once considered the stuff of science fiction. It has been lauded for its environmental benefits, such as reducing paper production and waste, but, as with any great accomplishment, there are unintended consequences. The increased proliferation of electronic devices to access the internet and the exponential advancement of those devices results in large amounts of electronic waste-a problem in its own right. Compounding the issue, for all of those internet-enabled devices to work, they must rely on the …


Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh Jan 2017

Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh

American University Law Review

No abstract provided.


Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones Jan 2017

Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones

American University Law Review

The Internet of Things (loT), the wireless connection of devices to ourselves, each other, and the Internet, has transformed our lives and our society in unimaginable ways. Today, billions of electronic devices and sensors collect, store, and analyze personal information from how fast we drive, to how fast our hearts beat, to how much and what we watch on TV. Even children provide billions of bits of personal information to the cloud through "smart" toys that capture images, recognize voices, and more. The unprecedented and unbridled new information flow generated from the little things of the loT is creating big …


A Vague Law In A Smartphone World: Limiting The Scope Of Unauthorized Access Under The Computer Fraud And Abuse Act, Andrew Hernacki Jan 2012

A Vague Law In A Smartphone World: Limiting The Scope Of Unauthorized Access Under The Computer Fraud And Abuse Act, Andrew Hernacki

American University Law Review

No abstract provided.


Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites In The Evolving Internet , Xuan-Thao N. Nguyen Aug 2000

Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites In The Evolving Internet , Xuan-Thao N. Nguyen

American University Law Review

No abstract provided.


The Uses Of New Capital Markets: Electronic Commerce And The Rules Of The Game In An International Marketplace , Andrea M. Corcoran Feb 2000

The Uses Of New Capital Markets: Electronic Commerce And The Rules Of The Game In An International Marketplace , Andrea M. Corcoran

American University Law Review

No abstract provided.


Renov. Aclu: Insulating The Internet, The First Amendment, And The Marketplaceof Ideas , Stephen C. Jacques Aug 1997

Renov. Aclu: Insulating The Internet, The First Amendment, And The Marketplaceof Ideas , Stephen C. Jacques

American University Law Review

No abstract provided.


Why Regulate Cybermoney? , David G. Oedel Apr 1997

Why Regulate Cybermoney? , David G. Oedel

American University Law Review

No abstract provided.


Electronic Stored Value Payment Systems, Market Position, And Regulatory Issues , Gary W. Lorenz Apr 1997

Electronic Stored Value Payment Systems, Market Position, And Regulatory Issues , Gary W. Lorenz

American University Law Review

No abstract provided.


Piracy,Privacy, And Privatization: Fictional And Legal Approaches To The Electronic Future Of Cash , Walter A. Effross Apr 1997

Piracy,Privacy, And Privatization: Fictional And Legal Approaches To The Electronic Future Of Cash , Walter A. Effross

American University Law Review

No abstract provided.


How To Regulate Electronic Cash: An Overview Of Regulatory Issues And Strategies , Simon L. Lelieveldt Apr 1997

How To Regulate Electronic Cash: An Overview Of Regulatory Issues And Strategies , Simon L. Lelieveldt

American University Law Review

No abstract provided.


How To Make A Mint: The Cryptography Of Anonymous Electronic Cash , Laurie Law, Susan Sabett, Jerry Solinas Apr 1997

How To Make A Mint: The Cryptography Of Anonymous Electronic Cash , Laurie Law, Susan Sabett, Jerry Solinas

American University Law Review

No abstract provided.


How Best To Guide The Evolution Of Electronic Currency Law , Brian W. Smith, Ramsey J. Wilson Apr 1997

How Best To Guide The Evolution Of Electronic Currency Law , Brian W. Smith, Ramsey J. Wilson

American University Law Review

No abstract provided.


1996: Survey Of The Year's Developments In Electronic Cash Law And The Laws Affecting Electronic Banking In The United States, Richard L. Field Apr 1997

1996: Survey Of The Year's Developments In Electronic Cash Law And The Laws Affecting Electronic Banking In The United States, Richard L. Field

American University Law Review

No abstract provided.


International Harmonization In Electronic Commerce And Electronic Data Interchange: A Proposed First Step Toward Signing On The Digital Dotted Line , Randy V. Sabett Dec 1996

International Harmonization In Electronic Commerce And Electronic Data Interchange: A Proposed First Step Toward Signing On The Digital Dotted Line , Randy V. Sabett

American University Law Review

No abstract provided.


Technology Update: Attorneys' Use Of Computers In The Nation's 500 Largest Law Firms, Rosemary Shiels Dec 1996

Technology Update: Attorneys' Use Of Computers In The Nation's 500 Largest Law Firms, Rosemary Shiels

American University Law Review

No abstract provided.


The Development And Practice Of Law In The Age Of The Internet, Nabil R. Adam, Mark H. Hellmann, Peter Martin, James B. Altman, Ethan Katsh, Cantwell F. Muckenfuss, Clifford L. Brody, Eleanor Kerlow, Daniel Nyhart, Thomas R. Bruce, Jon E. Klemens, Ira H. Parker, Mary J. Culnan, John M. Kuttler, Ronald Plesser, Robert Gellman, Ronald D. Lee, Randy V. Sabett, Claudio Grossman, Rosemary Shiels Dec 1996

The Development And Practice Of Law In The Age Of The Internet, Nabil R. Adam, Mark H. Hellmann, Peter Martin, James B. Altman, Ethan Katsh, Cantwell F. Muckenfuss, Clifford L. Brody, Eleanor Kerlow, Daniel Nyhart, Thomas R. Bruce, Jon E. Klemens, Ira H. Parker, Mary J. Culnan, John M. Kuttler, Ronald Plesser, Robert Gellman, Ronald D. Lee, Randy V. Sabett, Claudio Grossman, Rosemary Shiels

American University Law Review

No abstract provided.