Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Incendiary Speech And Social Media, Lyrissa Barnett Lidsky Dec 2014

Incendiary Speech And Social Media, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky Dec 2014

Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons-some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat these suits …


Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe Dec 2014

Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe

Elizabeth A Rowe

This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …


Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Dec 2014

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

Elizabeth A Rowe

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Dec 2014

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

Elizabeth A Rowe

When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino Sep 2014

'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino

Laurie B. Serafino

Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …


Countering Hate On The Internet, Raphael Cohen-Almagor Sep 2014

Countering Hate On The Internet, Raphael Cohen-Almagor

raphael cohen-almagor

Hate speech is designed to threaten certain groups publicly and act as propaganda for offline organizations. Hate groups use websites to share ideology and propaganda, to link to similar sites and to recruit new converts, advocate violence and to threat others. The aim of this paper is to analyse the ways hate mongers are utilizing the Internet, and to ask what can be done to counter their activities. The paper discusses the targets of hate on the Internet and offers practical proposals to address this increasing problem and fight against it.


Fcc Commenting Workshop, Laura Quilter Jul 2014

Fcc Commenting Workshop, Laura Quilter

Laura Quilter

No abstract provided.


Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall Mar 2014

Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall

Adam A Marshall

In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …


Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania Mar 2014

Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania

Tejas N. Narechania

For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.

Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

William L. Reynolds

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Aereo's Errors, Ira Steven Nathenson Jan 2014

Aereo's Errors, Ira Steven Nathenson

Ira Steven Nathenson

This article scrutinizes the many troubling errors made by the United States Supreme Court in its decision in American Broadcasting Companies, Inc. v. Aereo, Inc. Aereo’s streaming television service allowed subscribers to watch broadcast television on a computer, tablet, or smartphone without requiring them to be directly connected to cable, satellite, or a local antenna. Aereo’s system was designed to comply with existing copyright law by using thousands of antennas, each of which was designated for only one subscriber at a time. Aereo was sued for copyright infringement by a number of leading television broadcasters. The United States Supreme Court, …


Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan Jan 2014

Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan

Conor Francis Linehan

The legislatures in New York and Illinois have attempted to regulate the speech of individuals on the Internet and threaten to void their anonymity. The legislatures are trying to reach the actionable or harmful speech that often shows up on websites like Reddit.com. However, the bills have reached too far, and encompass much speech that is absolutely protected. This note argues that the right of anonymous speech on the Internet should be protected from government encroachment, and the proper way to protect the interests of individuals who are the subject of libelous or damaging speech should be through a re-working …


Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer Jan 2014

Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer

David Barnhizer

None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …


A Methodological Proposal For A National Survey Of Data Protection In E-Government In Mexico, Teresa M. G. Da Cunha Lopes Dec 2013

A Methodological Proposal For A National Survey Of Data Protection In E-Government In Mexico, Teresa M. G. Da Cunha Lopes

Teresa M. G. Da Cunha Lopes

The present research paper is an attempt to study the aspects related to e-government and data protection in Mexico, and at the same time, in view of the lack of empirical data presents a methodological proposal for the urgent implementation of a national survey. We focus in the protection of personal data used by public administrators to provide public services.


Internet Transforms Finance - Understanding Regulation Of Online Insurance Business In China, Tao (Tim) Liang Dec 2013

Internet Transforms Finance - Understanding Regulation Of Online Insurance Business In China, Tao (Tim) Liang

Tao LIANG

China’s internet population grew to 591 million by this June, with an internet penetration rate increasing from 20% in 2008 to 44% in June 2013. The last five years have also witnessed an explosion in the growth of electronic commerce transactions in China whose trading volume increases from 3.1 trillion RMB in 2008 to 7.9 trillion RMB in 2012. More specifically, the internet and related technology developments are significantly changing the characteristics and landscapes of the financial service industries of China.


"¿Qué Información Hay Que Facilitar Al Consumidor Cuando Adquiere Productos Alimenticios Por Internet O Mediante Otros Sistemas De Comunicación A Distancia?", Luis González Vaqué Dec 2013

"¿Qué Información Hay Que Facilitar Al Consumidor Cuando Adquiere Productos Alimenticios Por Internet O Mediante Otros Sistemas De Comunicación A Distancia?", Luis González Vaqué

Luis González Vaqué

Para garantizar la información alimentaria, es necesario tener en cuenta todas las formas de suministrar alimentos a los consumidores, como la venta de alimentos mediante técnicas de comunicación a distancia. Es evidente que cualquier alimento suministrado a través de la venta a distancia debe cumplir los mismos requisitos de información que los alimentos vendidos en los comercios; por lo tanto, el art. 14 del Reglamento nº 1169/2011 establece la información alimentaria obligatoria pertinente en tales casos y que también debe estar disponible antes de realizar la compra.