Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

2013

Institution
Keyword
Publication

Articles 1 - 30 of 40

Full-Text Articles in Law

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik Nov 2013

E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik

Research Collection Yong Pung How School Of Law

Existing e-commerce regulations constitute a premature and unnecessary interference in the natural evolution of commercial practices and technologies. I question not just their quality, mainly attributable to the technological ignorance of the regulator, but their very necessity. I observe the practical futility of drafting effective regulatory instruments in areas subject to continuous and unpredictable technological change. I criticize the overly homogenous approach to "everything Internet" (i.e. everything involving the Internet requires new law) as well as the creation of new regulatory spheres and legal categories. Some might claim that it is too early for a critical retrospective of this subject. …


Biometric Id Cybersurveillance, Margaret Hu Oct 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Publications

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Is The Invocation Of Inherent Jurisdiction The Same As The Exercise Of Inherent Powers? Re Nalpon Zero Geraldo Mario [Case Note], Siyuan Chen Oct 2013

Is The Invocation Of Inherent Jurisdiction The Same As The Exercise Of Inherent Powers? Re Nalpon Zero Geraldo Mario [Case Note], Siyuan Chen

Research Collection Yong Pung How School Of Law

In Re McC (A Minor), Lord Bridge of Harwich remarked that few words have been ‘used with so many different shades of meaning in different contexts’ and ‘have so freely acquired new meanings’ as the word ‘jurisdiction’. The definitional conundrum deepens when ‘jurisdiction’ is combined with the adjective ‘inherent,’ yet common law courts around the world routinely claim to invoke inherent jurisdiction for a wide array of purposes in civil and criminal matters, ranging from the reception of evidence to the ensuring of a fair trial, and this necessarily raises questions about the limits of such an exercise.


Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande Sep 2013

Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande

All Faculty Scholarship

This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast …


Privacy, Antitrust, And Power, Frank Pasquale Jul 2013

Privacy, Antitrust, And Power, Frank Pasquale

Faculty Scholarship

No abstract provided.


Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park Apr 2013

Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park

Management Faculty Publications and Presentations

No abstract provided.


A Case For The Public Domain, Clark Asay Feb 2013

A Case For The Public Domain, Clark Asay

Faculty Scholarship

Over the past several decades open license movements have proven highly successful in the software and content worlds. Such movements rely in part on the belief that greater freedom of use triggers innovative activity that is superior to what a restrictive IP approach produces. Ironically, such open license movements also rely on IP rights to promote their vision of freedom and openness. They do so through IP licenses that, while granting significant freedoms, also impose certain conditions on users such as the “copyleft” requirement in the software world. Such movements rely on this IP-based approach due to fears that, without …


Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt Jan 2013

Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt

National Security Law Program

Cyberespionage has received even greater attention in the wake of reports of persistent and brazen cyberexploitation of U.S. and Canadian firms by the Chinese military. But the recent disclosures about NSA surveillance programs have made clear that a national program of cyberdefense of private firms' intellectual property is politically infeasible. Following the lead

of companies like Google, private corporations may increasingly resort to the use of self-defense, hacking back against cross-border incursions on the Internet. Most scholarship, however, has surprisingly viewed such actions as outside the ambit of international law. This Note provides a novel account of how international law …


Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew Jan 2013

Striking A Balance Between Privacy And Online Commerce, Mark Bartholomew

Journal Articles

It is becoming commonplace to note that privacy and online commerce are on a collision course. Corporate entities archive and monetize more and more personal information. Citizens increasingly resent the intrusive nature of such data collection and use. Just noticing this conflict, however, tells us little. In "Informing and Reforming the Marketplace of Ideas: The Public-Private Model for Data Production and the First Amendment" Professor Shubha Ghosh not only notes the tension between the costs and benefits of data commercialization, but suggests three normative perspectives for balancing privacy and commercial speech. This is valuable because without a rich theoretical framework …


News In Cyberspace: The Creation Of The New Ignorance, Ronald Charles Griffin Jan 2013

News In Cyberspace: The Creation Of The New Ignorance, Ronald Charles Griffin

Journal Publications

Computers are dummying us down. Book learning has given way to computer speak. Modern technology overwhelms us. Users are enthralled with gadgets to the point where they have lost themselves in them. We have abandoned, perhaps mislaid, our sense for ignorance; what it means to be illiterate in the 21st century; and working definitions for truth. In this environment a dab of education (enough to make somebody lethal), a sprinkle of bigotry, and fear produce people with ideas that are bad for us. This essay cautions against trucking with those folk; it marks what they do in the media that …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann Jan 2013

The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann

Cornell Law Faculty Publications

This essay is a response to Derek Bambauer's article Orwell's Armchair, which proposes "[a] statute enabling censorship of Internet material." Bambauer's theory is process-oriented: it focuses on the institutions that engage in censorship and the procedures that they follow. Accordingly, the essay examines his arguments through the lens of the canonical Legal Process text: Hart and Sacks' The Legal Process. A series of notes and queries inquire whether his proposed statute would limit censorship, regularize it, or legitimate it.


From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2013

From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jan 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Faculty Scholarship

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna Jan 2013

Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna

Journal Articles

No abstract provided.


The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford Jan 2013

The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford

UIC Law Open Access Faculty Scholarship

"[A]s a general rule," writes Pulitzer Prize-winning journalist Edward Humes, "courts don't do science very well."' Susan Haack, a professor of law and philosophy, elaborates on why this may be true, offering several reasons for "deep tensions" between science and law. The reasons offered by Haack may be less of a concern where the dispute involves litigation against the government on significant questions of public policy. Recent decisions assessing the constitutionality of laws restricting minors' access to violent video games therefore offer an opportunity to examine how well the courts handled scientific evidence in a situation lacking some of the …


The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga Jan 2013

The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga

Law Faculty Publications

Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.


Antitrust, The Internet, And The Economics Of Networks, Christopher S. Yoo, Daniel F. Spulber Jan 2013

Antitrust, The Internet, And The Economics Of Networks, Christopher S. Yoo, Daniel F. Spulber

All Faculty Scholarship

Network industries, including the Internet, have shown significant growth, substantial competition, and rapid innovation. This Chapter examines antitrust policy towards network industries. The discussion considers the policy implications of various concepts in the economics of networks: natural monopoly, network economic effects, vertical exclusion, and dynamic efficiency. Our analysis finds that antitrust policy makers should not presume that network industries are more subject to monopolization than other industries. We find that deregulation and the strength of competition in network industries have removed justifications for structural separation as a remedy. Also, we argue that that deregulation and competition have effectively eliminated support …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Jan 2013

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Crowdfunding Securities, Andrew A. Schwartz Jan 2013

Crowdfunding Securities, Andrew A. Schwartz

Publications

A new federal statute authorizes the online "crowdfunding" of securities, a new idea based on the concept of "reward" crowdfunding practiced on Kickstarter and other websites. This method of selling securities had previously been banned by federal securities law but the new CROWDFUND Act overturns that prohibition.

This Article introduces the CROWDFUND Act and explains that it can be expected to have two primary effects on securities law and capital markets. First, it will liberate startup companies to use peer networks and the Internet to obtain modest amounts of capital at low cost. Second, it will help democratize the market …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian Jan 2013

An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian

Journal Articles

Intellectual property regimes operate in the shadow of the First Amendment. By deeming a particular activity as infringing, the law of copyright, trademark, and the right of publicity all limit communication. As a result, judges and lawmakers must delicately balance intellectual property rights with expressive freedoms. Interestingly, each intellectual property regime strikes the balance between ownership rights and free speech in a dramatically different way. Despite a large volume of scholarship on intellectual property rights and free speech considerations, this Article represents the first systematic effort to detail, analyze, and explain the divergent evolution of expression-based defenses in copyright, trademark, …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Certainty At Last?: A "New" Framework For Electronic Contracting In Singapore, Eliza Mik Jan 2013

Certainty At Last?: A "New" Framework For Electronic Contracting In Singapore, Eliza Mik

Research Collection Yong Pung How School Of Law

Singapore is the first Asian country to accede to the UNCITRAL Convention on the Use of Electronic Communications in International Contracts (“CUECIC” or “Convention”). Upon accession, the Singaporean Electronic Transactions Act (“ETA” or “Act”) was repealed and re-enacted in a modified version, with effect from 1 July 2010. The modified ETA retains the framework of the original ETA but adds or amends certain provisions dealing with electronic contracting to align domestic e-commerce regulations with the Convention. Accordingly, Singapore is not only the first Asian nation to accede to the CUECIC but also the first nation to implement some of its …


Book Review -- William Patry, How To Fix Copyright, Michael J. Madison Jan 2013

Book Review -- William Patry, How To Fix Copyright, Michael J. Madison

Articles

I review William Patry’s book How to Fix Copyright. The book is noteworthy for its ambitious yet measured effort to diagnose where copyright law has gone astray in recent years. It is less successful with respect to proposing possible changes to the law. Most interesting are parallels between How to Fix Copyright and an earlier comprehensive look at copyright law in the digital era: Paul Goldstein’s Copyright’s Highway: From Gutenberg to the Celestial Jukebox. William Patry and Paul Goldstein each have a lot of faith in the power of consumer choice in the cultural marketplace. That faith leads …


Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski Jan 2013

Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski

Publications

The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …


Head In The Clouds, Feet Firmly Grounded In Physical Proof: Emphasis On The Tangible In Actions Against Internet Search Engines And Aggregators, Briehan Moran Jan 2013

Head In The Clouds, Feet Firmly Grounded In Physical Proof: Emphasis On The Tangible In Actions Against Internet Search Engines And Aggregators, Briehan Moran

Student Works

No abstract provided.


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Jan 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Faculty Scholarship

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about how policymakers should structure federal administration of the electromagnetic spectrum. The first argues that the Federal Communications Commission should define spectrum use rights more clearly and give spectrum licensees near fee-simple property rights in frequencies that they can use and sell in secondary markets as they wish. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much if not most of the spectrum to unlicensed use by smartphones and tablets equipped with the …