Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 1364

Full-Text Articles in Law

Online Disinhibited Contracts, Wayne R. Barnes Feb 2024

Online Disinhibited Contracts, Wayne R. Barnes

Faculty Scholarship

There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …


Digital Terror Crimes, Cody Corliss Jan 2024

Digital Terror Crimes, Cody Corliss

Law Faculty Scholarship

Terror actors operating within armed conflict have weaponized social media by using these platforms to threaten and spread images of brutality in order to taunt, terrify, and intimidate civilians. These acts or threats of violence are terror, a prohibited war crime in which acts or threats of violence are made with the primary purpose of spreading terror among the civilian population. The weaponization of terror content through social media is a digital terror crime.

This article is the first to argue that the war crime of terror applies to digital terror crimes perpetrated through social media platforms. It situates digital …


Uncommon Carriage, Blake Reid Jan 2024

Uncommon Carriage, Blake Reid

Publications

As states have begun regulating the carriage of speech by “Big Tech” internet platforms, scholars, advocates, and policymakers have increasingly focused their attention on the law of common carriage. Legislators have invoked common carriage to defend social media regulations against First Amendment challenges, making arguments set to take center stage in the Supreme Court’s impending consideration of the NetChoice saga.

This Article challenges the coherence of common carriage as a field and its utility for assessing the constitutionality and policy wisdom of internet regulation. Evaluating the post-Civil War history of common carriage regimes in telecommunications law, this Article illustrates that …


Introduction To The Symposium On Digital Evidence, Melinda (M.J.) Durkee, Megiddo Tamar Jan 2024

Introduction To The Symposium On Digital Evidence, Melinda (M.J.) Durkee, Megiddo Tamar

Scholarship@WashULaw

The past few decades have seen radical advances in the availability and use of digital evidence in multiple areas of international law. Witnesses snap cellphone photos of unfolding atrocities and post them online, while others share updates in real time through messaging apps. Immigration officers search cell phones. Private citizens launch open-source online investigations. Investigators scrape social media posts. Digital experts verify authenticity with satellite geolocation. These new types of evidence and digitally facilitated methods and patterns of evidence gathering and analysis are revolutionizing the everyday practice of international law, drawing in an ever-wider circle of actors who can contribute …


A Public Technology Option, Hannah Bloch-Wehba Dec 2023

A Public Technology Option, Hannah Bloch-Wehba

Faculty Scholarship

Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.

Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …


After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge Dec 2023

After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge

Faculty Scholarship

Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …


Either The Law Will Govern Ai, Or Ai Will Govern The Law, Margaret Hu Nov 2023

Either The Law Will Govern Ai, Or Ai Will Govern The Law, Margaret Hu

Popular Media

No abstract provided.


Leveraging Technology To Promote Access To Justice, Amy Emerson Oct 2023

Leveraging Technology To Promote Access To Justice, Amy Emerson

Faculty Publications

No abstract provided.


Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Trusted Framework For Cross-Border Data Flows, Alex Joel Sep 2023

A Trusted Framework For Cross-Border Data Flows, Alex Joel

Joint PIJIP/TLS Research Paper Series

The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …


All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous Aug 2023

All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous

Scholarly Works

Roughly half of Americans get some of their news from social media, and nearly two-thirds get some of their news from search engines. As our modern information gatekeepers, these internet companies bear a special responsibility to consider the impact of their platform and site policies on users’ access to high-quality news sources. They should adopt policies that clear the digital pathway between the public and press by facilitating such access. To that end, the companies must first, address the threshold issue of how best to identify high-quality news sources. This article examines factors that would be useful, drawing from legal …


Confidentiality Clauses In Settlement Agreements After The Consumer Review Fairness Act, Wayne Barnes Jul 2023

Confidentiality Clauses In Settlement Agreements After The Consumer Review Fairness Act, Wayne Barnes

Faculty Scholarship

Online commerce has skyrocketed in recent years, and shoppers are purchasing goods or services online in greater numbers every year. The COVID-19 pandemic has only hastened the trend. One significant aspect of online shopping is the presence of consumer reviews posted by prior purchasers of goods or services, describing their experience with the products, the services and/or the selling merchant. A vast majority of online shoppers say that they rely on these reviews to help inform their purchasing decisions. Positive reviews can be tremendously beneficial to a business’ profitability, whereas negative reviews can be equally detrimental. Users of the internet …


Internet Jurisdiction And The 21st Century: Zippo, Calder, And The Metaverse, Gretchen Yelmini Jun 2023

Internet Jurisdiction And The 21st Century: Zippo, Calder, And The Metaverse, Gretchen Yelmini

Connecticut Law Review

Internet use in the United States continues to increase at a rate that outpaces the legal system. From reliance on outdated precedent, differing long-arm statutes, and emergent technologies, there are unanswered questions of whether existing precedent is sufficient to handle our increasingly borderless society.

Many courts still rely on the Zippo test despite the exponential advancements in how we use the internet in the twenty-five years since the Western District of Pennsylvania developed a framework for this issue. The Supreme Court has continued to avoid directly addressing the issue. In 2014, the Court left decisions on virtual presence to “another …


Opaque Notification: A Country-By-Country Review, Lauren Mantel Jun 2023

Opaque Notification: A Country-By-Country Review, Lauren Mantel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


On The Danger Of Not Understanding Technology, Fredric I. Lederer May 2023

On The Danger Of Not Understanding Technology, Fredric I. Lederer

Popular Media

No abstract provided.


Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin May 2023

Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin

Faculty Scholarship

Over the past decade, the immigration and criminal legal systems have increasingly relied on electronic monitoring as a bail condition; hundreds of thousands of people live under this monitoring on any given day. Decisionmakers purport to impose these conditions to release more individuals from detention and to maintain control over individuals they perceive to pose some risk of flight or to public safety. But the data do not show that electronic monitoring successfully mitigates these risks or that it leads to fewer individuals in detention. Electronic monitoring also comes with severe restrictions on individual liberty and leads to harmful effects …


Aclp - Comments To Ntia Re Digital Equity Act Grants Programs - May 2023, New York Law School May 2023

Aclp - Comments To Ntia Re Digital Equity Act Grants Programs - May 2023, New York Law School

Reports and Resources

No abstract provided.


Out Of Sight, Out Of Mind? Remote Work And Contractual Distancing, Nicola Countouris, Valerio De Stefano May 2023

Out Of Sight, Out Of Mind? Remote Work And Contractual Distancing, Nicola Countouris, Valerio De Stefano

Articles & Book Chapters

Since the Covid-19 pandemic, remote work has acquired quasi-Marmite status. It has become difficult, if not impossible, to approach the issue in a measured and dispassionate way, which is one of the reasons books such as the present one are being published. Remote work is often seen as anathema by some who associate it with laziness, low productivity and the degradation of the social fabric of firms and of their creative and collaborative potential. The notorious views of CEOs such as Tesla and Twitter’s Elon Musk or JP Morgan’s Jamie Dimon come to mind, indicative – in the view of …


Introduction To The Future Of Remote Work, Nicola Countouris, Valerio De Stefano, Agnieszka Piasna, Silvia Rainone May 2023

Introduction To The Future Of Remote Work, Nicola Countouris, Valerio De Stefano, Agnieszka Piasna, Silvia Rainone

Articles & Book Chapters

Debates on the future of work have taken a more fundamental turn in the wake of the Covid-19 pandemic. Early in 2020, when large sections of the workforce were prevented from coming to their usual places of work, remote work became the only way for many to continue to perform their professions. What had been a piecemeal, at times truly sluggish, evolution towards a multilocation approach to work suddenly turned into an abrupt, radical and universal shift. It quickly became clear that the consequences of this shift were far more significant and far-reaching than simply changing the workplace’s address. They …


Between Risk Mitigation And Labour Rights Enforcement: Assessing The Transatlantic Race To Govern Ai-Driven Decision-Making Through A Comparative Lens, Valerio De Stefano, Antonio Aloisi Apr 2023

Between Risk Mitigation And Labour Rights Enforcement: Assessing The Transatlantic Race To Govern Ai-Driven Decision-Making Through A Comparative Lens, Valerio De Stefano, Antonio Aloisi

Articles & Book Chapters

In this article, we provide an overview of efforts to regulate the various phases of the artificial intelligence (AI) life cycle. In doing so, we examine whether—and, if so, to what extent—highly fragmented legal frameworks are able to provide safeguards capable of preventing the dangers that stem from AI- and algorithm-driven organisational practices. We critically analyse related developments at the European Union (EU) level, namely the General Data Protection Regulation, the draft AI Regulation, and the proposal for a Directive on improving working conditions in platform work. We also consider bills and regulations proposed or adopted in the United States …


Regulating Ai At Work: Labour Relations, Automation, And Algorithmic Management, Valerio De Stefano, Virginia Doellgast Apr 2023

Regulating Ai At Work: Labour Relations, Automation, And Algorithmic Management, Valerio De Stefano, Virginia Doellgast

Articles & Book Chapters

Recent innovations in artificial intelligence (AI) have been at the core of massive technological changes that are transforming work. AI is now widely used to automate business processes and replace labour-intensive tasks while changing the skill demands for those that remain. AI-based tools are also deployed to invasively monitor worker conduct and to automate HR management processes.

Through the dual lens of comparative labour law and employment relations research, the articles in this special issue of Transfer investigate the role of collective bargaining and government policy in shaping strategies to deploy new digital and AI-based technologies at work. Together, they …


Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang Apr 2023

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang

Articles

Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …


Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang Apr 2023

Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang

Articles

In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …


Platform Accountability: Gonzalez And Reform, Eric Schnapper Mar 2023

Platform Accountability: Gonzalez And Reform, Eric Schnapper

Presentations

Section 230(c)(1) was adopted for the purpose of distinguishing between conduct of third parties and conduct of internet companies themselves. Its familiar language provides that “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” The last four words are central to the limitation on the defense created by the statute; it is only regarding information created by “another” that the defense may be available. Section 230(e)(3) makes clear that even a partial role played by an internet company in the creation of harmful …


Defamation 2.0, Cortelyou C. Kenney Mar 2023

Defamation 2.0, Cortelyou C. Kenney

Cornell Law Faculty Publications

There is a literal prohibition in the media bar that media lawyers cannot represent plaintiffs in suits for defamation. The stated principle behind this rule—a rule that can result in excommunication from the premier media law organization if it is violated—is that playing both sides of the defamation game is disloyal to traditional media actors because any chance of victory could inadvertently distort the law of defamation to increase the risk of frivolous suits against media outlets or other innocent third parties. But has the maxim finally gone too far?

Fueled by a new model where media profits are driven …


Falsehoods, Foreign Interference, And Compelled Speech In Singapore, Kenny Chng Mar 2023

Falsehoods, Foreign Interference, And Compelled Speech In Singapore, Kenny Chng

Research Collection Yong Pung How School Of Law

Online misinformation endangers the infrastructure of fact essential to public discourse and presents an even greater threat where it is being utilised as a weapon by hostile state actors. In recognition of these dangers, Singapore has implemented legal measures to combat online misinformation, enacting in quick succession the Protection from Online Falsehoods and Manipulation Act (POFMA) and the Foreign Interference (Countermeasures) Act (FICA). These statutes open up novel frontiers of development for Singapore's free speech jurisprudence. Indeed, these statutes confer upon government authorities the power to compel the authors of certain material to display notices stating that the material contains …


Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel Mar 2023

Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel

Joint PIJIP/TLS Research Paper Series

The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.


Fair Warnings From Ofac’S Settlements With Cryptocurrency Service Providers: Compliance Should Include Lifetime-Of-The-Relationship, In-Process Geolocational Checks, Sarah Jane Hughes Feb 2023

Fair Warnings From Ofac’S Settlements With Cryptocurrency Service Providers: Compliance Should Include Lifetime-Of-The-Relationship, In-Process Geolocational Checks, Sarah Jane Hughes

Articles by Maurer Faculty

In 2022, the Office of Foreign Assets Control (OFAC) announced numerous settlements with cryptocurrency exchanges. These settlements serve as “fair warnings” to all cryptocurrency service providers who are “U.S. persons” or who offer services to U.S. persons. The term “U.S. persons” is defined in 31 C.F.R. §560.314 as “any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.”

This article focuses on these “fair warnings” as they have accumulated from prior settlements and from OFAC’s published guidance …


Reply Brief For Petitioners, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman Feb 2023

Reply Brief For Petitioners, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman

Court Briefs

QUESTION PRESENTED: Section 203(c)(1) of the Communications Decency Act immunizes an “interactive computer service” (such as YouTube, Google, Facebook and Twitter) for “publish[ ing] ... information provided by another” “information content provider” (such as someone who posts a video on YouTube or a statement on Facebook). This is the most recent of three court of appeals’ decisions regarding whether section 230(c)(1) immunizes an interactive computer service when it makes targeted recommendations of information provided by such another party. Five courts of appeals judges have concluded that section 230(c)(1) creates such immunity. Three court of appeals judges have rejected such immunity. …


"You Always Have To Be Careful About Censorship", Gabrielle Nadler, Margaret Hu Jan 2023

"You Always Have To Be Careful About Censorship", Gabrielle Nadler, Margaret Hu

Popular Media

No abstract provided.