Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2013

Internet Law

Institution
Keyword
Publication

Articles 1 - 30 of 42

Full-Text Articles in Law

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Restoring Limits On The Fcc's Ancillary Authority, Daniel A. Lyons Dec 2013

Restoring Limits On The Fcc's Ancillary Authority, Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik Nov 2013

E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik

Research Collection School Of Law

Existing e-commerce regulations constitute a premature and unnecessary interference in the natural evolution of commercial practices and technologies. I question not just their quality, mainly attributable to the technological ignorance of the regulator, but their very necessity. I observe the practical futility of drafting effective regulatory instruments in areas subject to continuous and unpredictable technological change. I criticize the overly homogenous approach to "everything Internet" (i.e. everything involving the Internet requires new law) as well as the creation of new regulatory spheres and legal categories. Some might claim that it is too early for a critical retrospective of this ...


Is The Invocation Of Inherent Jurisdiction The Same As The Exercise Of Inherent Powers? Re Nalpon Zero Geraldo Mario [Case Note], Siyuan Chen Oct 2013

Is The Invocation Of Inherent Jurisdiction The Same As The Exercise Of Inherent Powers? Re Nalpon Zero Geraldo Mario [Case Note], Siyuan Chen

Research Collection School Of Law

In Re McC (A Minor), Lord Bridge of Harwich remarked that few words have been ‘used with so many different shades of meaning in different contexts’ and ‘have so freely acquired new meanings’ as the word ‘jurisdiction’. The definitional conundrum deepens when ‘jurisdiction’ is combined with the adjective ‘inherent,’ yet common law courts around the world routinely claim to invoke inherent jurisdiction for a wide array of purposes in civil and criminal matters, ranging from the reception of evidence to the ensuring of a fair trial, and this necessarily raises questions about the limits of such an exercise.


Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande Sep 2013

Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande

All Faculty Scholarship

This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast ...


Privacy, Antitrust, And Power, Frank Pasquale Jul 2013

Privacy, Antitrust, And Power, Frank Pasquale

Faculty Scholarship

No abstract provided.


The Challenge Of Voip To Legacy Federal And State Regulatory Regimes, Daniel A. Lyons Apr 2013

The Challenge Of Voip To Legacy Federal And State Regulatory Regimes, Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park Apr 2013

Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park

Management Faculty Publications and Presentations

No abstract provided.


Internet Policy’S Next Frontier: Data Caps, Tiered Service Plans, And Usage-Based Broadband Pricing, Daniel A. Lyons Mar 2013

Internet Policy’S Next Frontier: Data Caps, Tiered Service Plans, And Usage-Based Broadband Pricing, Daniel A. Lyons

Boston College Law School Faculty Papers

Usage-based pricing has rapidly become one of the most controversial topics in Internet policy. Both wired and wireless broadband providers are migrating from flat-rate pricing to a variety of consumption-based pricing models. Some consumer groups have viewed the change to usage-based pricing with skepticism, fearing it will usher in an era of higher prices, deteriorating service, and increasingly anticompetitive conduct.

This article evaluates the merits of data caps, tiered-service plans, and other usage-based pricing strategies. It finds that usage-based broadband pricing is not inherently anti-consumer or anti-competitive. Rather, it reflects a cluster of pricing strategies through which a broadband company ...


A Case For The Public Domain, Clark Asay Feb 2013

A Case For The Public Domain, Clark Asay

Faculty Scholarship

Over the past several decades open license movements have proven highly successful in the software and content worlds. Such movements rely in part on the belief that greater freedom of use triggers innovative activity that is superior to what a restrictive IP approach produces. Ironically, such open license movements also rely on IP rights to promote their vision of freedom and openness. They do so through IP licenses that, while granting significant freedoms, also impose certain conditions on users such as the “copyleft” requirement in the software world. Such movements rely on this IP-based approach due to fears that, without ...


The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga Jan 2013

The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga

Law Faculty Publications

Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.


From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2013

From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract ...


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jan 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Faculty Scholarship

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate ...


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission ...


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus ...


The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford Jan 2013

The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford

UIC Law Open Access Faculty Scholarship

"[A]s a general rule," writes Pulitzer Prize-winning journalist Edward Humes, "courts don't do science very well."' Susan Haack, a professor of law and philosophy, elaborates on why this may be true, offering several reasons for "deep tensions" between science and law. The reasons offered by Haack may be less of a concern where the dispute involves litigation against the government on significant questions of public policy. Recent decisions assessing the constitutionality of laws restricting minors' access to violent video games therefore offer an opportunity to examine how well the courts handled scientific evidence in a situation lacking some ...


Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor Jan 2013

Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor

Scholarly Works

Educators are constantly seeking new sources of relevant material to illustrate doctrinal and practice topics. With the growing understanding of students’ different learning styles, as well as the expansion of high-speed network connections and large displays in the classroom, streaming video has begun gaining popularity as an educational tool. Films, television programs, and real-time and archived legislative and court sessions may provide examples (both positive and negative) to enhance pedagogy. One increasingly common source for streaming content is a commercial video provider such as Netflix, Amazon, and Hulu. Even where such providers do not offer educational or institutional services, educators ...


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale ...


Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna Jan 2013

Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna

Journal Articles

No abstract provided.


Head In The Clouds, Feet Firmly Grounded In Physical Proof: Emphasis On The Tangible In Actions Against Internet Search Engines And Aggregators, Briehan Moran Jan 2013

Head In The Clouds, Feet Firmly Grounded In Physical Proof: Emphasis On The Tangible In Actions Against Internet Search Engines And Aggregators, Briehan Moran

Law School Student Scholarship

No abstract provided.


The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann Jan 2013

The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann

Cornell Law Faculty Publications

This essay is a response to Derek Bambauer's article Orwell's Armchair, which proposes "[a] statute enabling censorship of Internet material." Bambauer's theory is process-oriented: it focuses on the institutions that engage in censorship and the procedures that they follow. Accordingly, the essay examines his arguments through the lens of the canonical Legal Process text: Hart and Sacks' The Legal Process. A series of notes and queries inquire whether his proposed statute would limit censorship, regularize it, or legitimate it.


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Jan 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Faculty Scholarship

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about how policymakers should structure federal administration of the electromagnetic spectrum. The first argues that the Federal Communications Commission should define spectrum use rights more clearly and give spectrum licensees near fee-simple property rights in frequencies that they can use and sell in secondary markets as they wish. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much if not most of the spectrum to unlicensed use by smartphones and tablets equipped with the ...


Is There A Role For Common Carriage In An Internet-Based World?, Christopher S. Yoo Jan 2013

Is There A Role For Common Carriage In An Internet-Based World?, Christopher S. Yoo

Faculty Scholarship at Penn Law

During the course of the network neutrality debate, advocates have proposed extending common carriage regulation to broadband Internet access services. Others have endorsed extending common carriage to a wide range of other Internet-based services, including search engines, cloud computing, Apple devices, online maps, and social networks. All too often, however, those who focus exclusively on the Internet era pay too little attention to the lessons of the legacy of regulated industries, which has long struggled to develop a coherent rationale for determining which industries should be subject to common carriage. Of the four rationales for determining the scope of common ...


Antitrust, The Internet, And The Economics Of Networks, Christopher S. Yoo, Daniel F. Spulber Jan 2013

Antitrust, The Internet, And The Economics Of Networks, Christopher S. Yoo, Daniel F. Spulber

Faculty Scholarship at Penn Law

Network industries, including the Internet, have shown significant growth, substantial competition, and rapid innovation. This Chapter examines antitrust policy towards network industries. The discussion considers the policy implications of various concepts in the economics of networks: natural monopoly, network economic effects, vertical exclusion, and dynamic efficiency. Our analysis finds that antitrust policy makers should not presume that network industries are more subject to monopolization than other industries. We find that deregulation and the strength of competition in network industries have removed justifications for structural separation as a remedy. Also, we argue that that deregulation and competition have effectively eliminated support ...


An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian Jan 2013

An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian

Journal Articles

Intellectual property regimes operate in the shadow of the First Amendment. By deeming a particular activity as infringing, the law of copyright, trademark, and the right of publicity all limit communication. As a result, judges and lawmakers must delicately balance intellectual property rights with expressive freedoms. Interestingly, each intellectual property regime strikes the balance between ownership rights and free speech in a dramatically different way. Despite a large volume of scholarship on intellectual property rights and free speech considerations, this Article represents the first systematic effort to detail, analyze, and explain the divergent evolution of expression-based defenses in copyright, trademark ...


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first ...


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Jan 2013

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done ...


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over ...


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a ...