Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Ships Passing In The Night: The Communications Act And The Convergence On Broadband, Stuart Minor Benjamin Jan 2022

Ships Passing In The Night: The Communications Act And The Convergence On Broadband, Stuart Minor Benjamin

Faculty Scholarship

The Communications Act of 1934 and its amendments (the “Act”), and the regulations implementing them, have been enormously important to traditional telephony, broadcasting, and multichannel video. Meanwhile, the internet is barely mentioned in the Act. It thus might seem reasonable to conclude that the Act stands as a colossus and that the argument for overhauling it has grown much stronger as the Telecommunications Act of 1996 (the “1996 Act”) becomes ever more outdated. In this Article I suggest otherwise. Specifically, I make three claims—one descriptive, one a bit speculative, and one normative. The descriptive claim is that significant portions of …


Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr. Jan 2017

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr. Jan 2017

"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.

Faculty Scholarship

If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?

Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed …


Sharing By Design: Data And Decentralized Commons, Jorge L. Contreras, Jerome H. Reichman Jan 2016

Sharing By Design: Data And Decentralized Commons, Jorge L. Contreras, Jerome H. Reichman

Faculty Scholarship

Ambitious international data-sharing initiatives have existed for years in fields such as genomics, earth science, and astronomy. But to realize the promise of large-scale sharing of scientific data, intellectual property (IP), data privacy, national security, and other legal and policy obstacles must be overcome. While these issues have attracted significant attention in the corporate world, they have been less appreciated in academic and governmental settings, where solving issues of legal interoperability among data pools in different jurisdictions has taken a back seat to addressing technical challenges. Yet failing to account for legal and policy issues at the outset of a …


Aiming At The Wrong Target: The "Audience Targeting" Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington Jan 2012

Aiming At The Wrong Target: The "Audience Targeting" Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington

Faculty Scholarship

In Young v. New Haven Advocate, 315 F.3d 256 (4th Cir. 2002), the Fourth Circuit crafted a jurisdictional test for Internet defamation that requires the plaintiff to show that the defendant specifically targeted an audience in the forum state for the state to exercise jurisdiction. This test relies on the presumption that the Internet — which is accessible everywhere — is targeted nowhere; it strongly protects foreign libel defendants who have published on the Internet from being sued outside of their home states. Other courts, including the North Carolina Court of Appeals, have since adopted or applied the test. The …


Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami Jan 2007

Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami

Faculty Scholarship

This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was still primarily a market-creating organization and data protection in the European Union was aimed at rights abuses by market actors. Since the terrorist attacks of New York, Madrid, and London, however, cooperation on fighting crime has accelerated. Now, the challenge for the European Union is to protect privacy in its emerging system of criminal justice. This paper analyzes the first EU law to address data privacy in crime-fighting—the Data Retention Directive. Based on a detailed examination of the Directive’s legislative history, the …