Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

2017

Institution
Keyword
Publication

Articles 1 - 30 of 65

Full-Text Articles in Law

Piracy, Policy, And Pandora: Outdated Copyright In A Digital World, Stephanie Caress Dec 2017

Piracy, Policy, And Pandora: Outdated Copyright In A Digital World, Stephanie Caress

Student Scholar Symposium Abstracts and Posters

This project examines how current copyright laws and digital distribution practices in music can be improved for both the creator and the consumer. The laws that govern our digital atmosphere, and thus a large portion of music distribution, are outdated and cause a wide variety of problems for both artists and fans. To create a comprehensive picture and establish the scope of this problem, I start by outlining the process a song goes through from when it is written to when it is in the hands, or rather ears, of listeners. From there, copyright laws are entwined with this process. …


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo Nov 2017

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

All Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …


The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann Nov 2017

The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann

Popular Media

No abstract provided.


The Technology Requirements Of The First Electronic Monitoring Agreement In Us For Zappers, Phantomware, And Other Sales Suppression Devices, Richard Thompson Ainsworth, Robert Chicoine Oct 2017

The Technology Requirements Of The First Electronic Monitoring Agreement In Us For Zappers, Phantomware, And Other Sales Suppression Devices, Richard Thompson Ainsworth, Robert Chicoine

Faculty Scholarship

On August 30, 2017, a plea was entered in the case of case of State of Washington v. Wong, Wash. Super. Ct., No. 16-1-00179-0, and as a result the first electronic monitoring agreement of sales transactions in the US (the “Monitoring Agreement”) was legislatively imposed on a retail business.

The Monitoring Agreement was negotiated between the State of Washington Department of Revenue (the “WA DOR”) and the taxpayer over a period of several months and is comprised of two parts: the basic agreement, which covered the obligations and rights of the parties, and an appendix, which defines the scope of …


Three Strikes For Copyright, Jessica Silbey Oct 2017

Three Strikes For Copyright, Jessica Silbey

Faculty Scholarship

How should copyright law change to take account of the internet? Should copyright expand to plug the internet’s leakiness and protect content that the internet would otherwise make more freely available? Or, should copyright relax its strict liability regime given diverse and productive reuses in the internet age and the benefits networked diffusion provides users and second-generation creators? Answering these questions depends on what we think copyright is for and how it is used and confronted by creators and audiences. In a new article studying these questions in the very focused setting of Wikipedia articles about baseball and baseball players …


Smart Contracts: Terminology, Technical Limitations And Real World Complexity, Eliza Mik Oct 2017

Smart Contracts: Terminology, Technical Limitations And Real World Complexity, Eliza Mik

Research Collection Yong Pung How School Of Law

If one is to believe the popular press and many “technical writings,” blockchains create not only a perfect transactional environment but also obviate the need for banks, lawyers and courts. The latter will soon be replaced by smart contracts: unbiased and infallible computer programs that form, perform and enforce agreements. Predictions of future revolutions must, however, be distinguished from the harsh reality of the commercial marketplace and the technical limitations of blockchains. The fact that a technological solution is innovative and elegant need not imply that it is commercially useful or legally viable. Apart from attempting a terminological “clean-up” surrounding …


Data Collection And The Regulatory State, Ahmed Ghappour Sep 2017

Data Collection And The Regulatory State, Ahmed Ghappour

Faculty Scholarship

The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


The Internet Will Not Break: Denying Bad Samaritans Section 230 Immunity, Danielle K. Citron, Benjamin Wittes Jul 2017

The Internet Will Not Break: Denying Bad Samaritans Section 230 Immunity, Danielle K. Citron, Benjamin Wittes

Faculty Scholarship

What do a revenge pornographer, gossip-site curator, and platform pairing predators with young people in one-on-one chats have in common? Blanket immunity from liability, thanks to lower courts’ interpretation of section 230 of the Communications Decency Act (CDA) beyond what the text, context, and purpose support. The CDA was part of a campaign — rather ironically in retrospect — to restrict access to sexually explicit material online. Lawmakers thought they were devising a safe harbor for online providers engaged in self-regulation. The CDA’s origins in the censorship of “offensive” material are inconsistent with outlandishly broad interpretations that have served to …


Interpretation Catalysts In Cyberspace, Rebecca Ingber Jun 2017

Interpretation Catalysts In Cyberspace, Rebecca Ingber

Faculty Scholarship

The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …


Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang Jun 2017

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Computing and Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by economic …


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Defining Biometrics: Toward A Transnational Ethic Of Personal Information, Nicola Morrow Apr 2017

Defining Biometrics: Toward A Transnational Ethic Of Personal Information, Nicola Morrow

International Studies Honors Projects

Innovations in biotechnology, computer science, and engineering throughout the late 20th and early 21st centuries dramatically expanded possible modes of data-based surveillance and personal identification. More specifically, new technologies facilitated enormous growth in the biometrics sector. The response to the explosion of biometric technologies was two-fold. While intelligence agencies, militaries, and multinational corporations embraced new opportunities to fortify and expand security measures, many individuals objected to what they perceived as serious threats to privacy and bodily autonomy. These reactions spurred both further technological innovation, and a simultaneous proliferation of hastily drafted policies, laws, and regulations governing the collection, …


Payroll Tax & The Blockchain, Richard Thompson Ainsworth, Ville Viitasaari Mar 2017

Payroll Tax & The Blockchain, Richard Thompson Ainsworth, Ville Viitasaari

Faculty Scholarship

Bitcoin is an application that runs on blockchain technology. Blockchain is a foundational technology that is bringing in the second era of the Internet – the era where value can be transferred, rather than just information.

Blockchain is developing along a four-stage path similar to that which TCP/IP took. Both are foundational technologies. TCP/IP brought the Internet, and eventually brought significant (transformational) technological changes in business like Amazon.com and Skype. These are changes that could not have been forecast at the beginning of the Internet age.

Blockchain is an immutable distributed ledger. It replaces the inefficient use of multiple centralized …


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies Feb 2017

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell Jan 2017

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids app …


Scientists & Librarians Turn To “End Of Presidential Term” Web Archive To Safeguard Climate Change Data, Alyssa S. Rosen Jan 2017

Scientists & Librarians Turn To “End Of Presidential Term” Web Archive To Safeguard Climate Change Data, Alyssa S. Rosen

Elisabeth Haub School of Law Faculty Publications

In anticipation of president-elect Donald Trump’s taking office, scientists have been working round the clock to safeguard federal government climate change data. Many academics and librarians share the concern that federal .gov climate data and information, for example from the EPA and NOAA websites, will be lost or become unavailable with the transition to the new administration. Fact is, a large percentage of information on federal government servers, including digital federal records, reports, and research, is not protected by any law or agency mandate, and can vanish within days of the arrival of a new president.


Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy Jan 2017

Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy

Articles & Chapters

Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag Jan 2017

Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag

Faculty Articles

This Article explores the potential displacement of substantive copyright law in the increasingly important online environment. In 1998, Congress enacted a system of intermediary safe harbors as part of the Digital Millennium Copyright Act (DMCA). The internet safe harbors and the associated system of notice-and-takedown fundamentally changed the incentives of platforms, users, and rightsholders in relation to claims of copyright infringement. These different incentives interact to yield a functional balance of copyright online that diverges markedly from the experience of copyright law in traditional media environments. More recently, private agreements between rightsholders and large commercial internet platforms have been made …


The Territorialization Of The Internet Domain Name System, Marketa Trimble Jan 2017

The Territorialization Of The Internet Domain Name System, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble presented her paper, “The Territorialization of the Internet Domain Name System" at the 17th Annual Intellectual Property Scholars Conference held at Cardozo School of Law in New York, New York, on August 11, 2017. The presentation was one of four in a session devoted to International Trademark & Design Protection.

Abstracts and information about other sessions at the conference are available on the Intellectual Property Scholars Conference website.


Consumer Internet Standard Form Contracts In India: A Proposal, Robert A. Hillman Jan 2017

Consumer Internet Standard Form Contracts In India: A Proposal, Robert A. Hillman

Cornell Law Faculty Publications

India's burgeoning Internet commerce sector has made consumers susceptible to standard-form contracts. Due to the slim likelihood of consumers reading the terms, vendors may often draft heavy-handed terms in the contracts, thereby adversely impacting consumer interests. The Indian legal framework in this regard is inadequate. This article evaluates the existing suggestions on standard-form contracts and argues that none of them safeguard consumer interests sufficiently. Instead, based on the American Law Institutes' Principles of the Law of Software Contracts, the article proposes a disclosure approach that would benefit the interests of Indian consumers engaged in commerce on the Internet.


Rules For Digital Radicals, Scott Skinner-Thompson Jan 2017

Rules For Digital Radicals, Scott Skinner-Thompson

Publications

No abstract provided.


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison Jan 2017

Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison

Book Chapters

Governing Medical Knowledge Commons makes three claims: first, evidence matters to innovation policymaking; second, evidence shows that self-governing knowledge commons support effective innovation without prioritizing traditional intellectual property rights; and third, knowledge commons can succeed in the critical fields of medicine and health. The editors' knowledge commons framework adapts Elinor Ostrom's groundbreaking research on natural resource commons to the distinctive attributes of knowledge and information, providing a systematic means for accumulating evidence about how knowledge commons succeed. The editors' previous volume, Governing Knowledge Commons, demonstrated the framework's power through case studies in a diverse range of areas. Governing Medical Knowledge …


Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale Jan 2017

Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Automated Public Sphere, Frank A. Pasquale Jan 2017

The Automated Public Sphere, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Middleman - Intermediary Liability: United States, Marketa Trimble Jan 2017

The Middleman - Intermediary Liability: United States, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble appeared on a panel at the 120th International Association for the Protection of Intellectual Property World Conference hosted in Sydney, Australia on October 16, 2017. This panel session discussed intermediary liability in the digital world in key jurisdictions, including the availability of site blocking injunctions and address the practical effects and inherent limitations of such injunctions in the digital era.


Právní Otázky Geoblokingu ("Legal Issues Of Geoblocking"), Marketa Trimble Jan 2017

Právní Otázky Geoblokingu ("Legal Issues Of Geoblocking"), Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble presented on the topic of geoblocking and related legal issues for The International Literary and Artistic Association (ALAI) on June 9, 2017 in Prague, Czech Republic.


Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble Jan 2017

Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.

A video of the session is available here. Additionally, Professor Trimble's presentation is available here.