Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 50

Full-Text Articles in Law

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Feb 2016

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Thomas E. Baker

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


Employee Electronic Communications In A Boundaryless World, Robert Sprague Dec 2015

Employee Electronic Communications In A Boundaryless World, Robert Sprague

Robert Sprague

In 2007, the National Labor Relations Board decided that an employer could maintain an email communications policy that prohibits nonwork-related messages, even if those messages involved communications otherwise protected under the National Labor Relations Act. In December 2014, the National Labor Relations Board reversed this holding, but in doing so, limited its decision to just workplace email. This article argues that such a prescription is outdated and archaic in light of today’s modern workplace filled with communications devices and systems that blur the distinction between work and personal life. This article explains that such a prescription can cause employees to …


E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Aug 2015

E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …


Toward A New Language Of Legal Drafting, Matthew Roach Jul 2015

Toward A New Language Of Legal Drafting, Matthew Roach

Matthew Roach

Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Mar 2014

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

A. Michael Froomkin

US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …


Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr. Feb 2014

Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.

Watt Lesley Black Jr.

This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …


New Models And Conflicts In The Interconnection And Delivery, Rob Frieden Jan 2014

New Models And Conflicts In The Interconnection And Delivery, Rob Frieden

Rob Frieden

As the Internet has evolved and diversified, interconnection terms and conditions have changed between Internet Service Providers (“ISPs”). These carriers experiment with alternatives to conventional models that classify interconnection as either peering or transiting. The former typically involves interconnection between high capacity carriers whose transoceanic traffic volumes generally match thereby eliminating the need for a transfer of funds. Historically smaller carriers have paid transit fees to larger Tier-1 ISPs for the opportunity to secure upstream links throughout the Internet cloud. With the growing availability of bandwidth intensive, video content carried via the Internet, traffic volume disparities have increased between ISPs. …


Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden Jan 2014

Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner Dec 2013

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

Richard Warner

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall Oct 2013

Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall

Benton C. Martin

This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart Aug 2013

Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart

Allyson Haynes Stuart

This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …


Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor Feb 2013

Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor

Jonathan I. Ezor

No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.