Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2015

Internet Law

Institution
Keyword
Publication

Articles 1 - 30 of 62

Full-Text Articles in Law

Reputation And Defamatory Meaning On The Internet: Communications, Contexts And Communities, Gary Kok Yew Chan Dec 2015

Reputation And Defamatory Meaning On The Internet: Communications, Contexts And Communities, Gary Kok Yew Chan

Research Collection Yong Pung How School Of Law

The determination of the appropriate scope of protection of reputation in the tort of defamation is crucially dependent on the construction of defamatory meaning. With the continuing rise of Internet publications, it is important to assess the impact of the various modes of Internet communications such as Internet websites, hyperlinking, blogs, emails, Twitter, Facebook and other forms of social media on defamatory meaning. Such defamatory meaning is being constructed based on the unique contexts and social expectations that have been generated by the various modes of Internet communications. The potential impact on defamatory meaning can also be assessed from the ...


One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr. Oct 2015

One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.

All Faculty Scholarship

The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.

Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground ...


Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies Oct 2015

Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius Oct 2015

The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker Oct 2015

Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long ...


Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas Jul 2015

Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas

Politics Summer Fellows

Contemporary mainstream discussions of the Supreme Court are often qualified with the warning that the nine justices are out of touch with everyday American life, especially when it comes to the newest and most popular technologies. For instance, during oral argument for City of Ontario v. Quon, a 2010 case that dealt with sexting on government-issued devices, Chief Justice John Roberts famously asked what the difference was “between email and a pager,” and Justice Antonin Scalia wondered if the “spicy little conversations” held via text message could be printed and distributed. While these comments have garnered a great deal of ...


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman Jul 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would ...


Regulating Interconnection (Lightly!), Daniel A. Lyons May 2015

Regulating Interconnection (Lightly!), Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry May 2015

The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry

Faculty Publications

The past two decades have seen a great rise in the patenting of e-commerce inventions. Now, those same patents are taking an equally great fall. In a series of four recent cases, the U.S. Supreme Court has shifted the doctrine of patent eligibility and, in the process, raised the bar for e-commerce and software patents - making it more difficult to obtain and enforce those types of patents.


Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues Apr 2015

Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues

Cornell Law School J.D. Student Research Papers

Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.

This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given ...


Future Of Ai And Law, Abby Cessna Apr 2015

Future Of Ai And Law, Abby Cessna

Cornell Law School J.D. Student Research Papers

Technology has already transformed the way that law is practiced. The use of computers and digital legal resources, such as LexisNexis and Westlaw have been around for decades, but these are just some of the major technological advancements that have transformed law. For instance, it was groundbreaking for a law firm as prestigious as Orrick, Herrington & Sutcliffe to have a website in the late 1990's, which was getting around 5000 visits a week. Now law firms not only have websites but also use a variety of social media services to promote their firm and services. In addition to promoting ...


Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato Apr 2015

Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato

GGU Law Review Blog

Whether you’re an overnight sensation like Justin Bieber or you’re uploading a tutorial on how to apply the perfect make up; YouTube has become the go‑to site for watching all the hottest videos. Technologically speaking, the cyber world has significantly changed over the years, especially with the Internet now being easily accessible from mobile devices. But the most alarming and overlooked trend is the ubiquitous use of the Internet by children.

Today, children use iPhones, tablets and computers to access the Internet as early as three years‑old. With the amount of time children spend online, some ...


Beyond Net Neutrality: International Examples Enabling Innovation And Consumer Choice In The Mobile Internet Ecosystem, Daniel A. Lyons Apr 2015

Beyond Net Neutrality: International Examples Enabling Innovation And Consumer Choice In The Mobile Internet Ecosystem, Daniel A. Lyons

Boston College Law School Faculty Papers

The FCC’s new Open Internet rules seek to limit interference by broadband service providers in markets for Internet-based content and applications. But to do so, the rules may significantly reduce the amount of innovation possible in the broadband service market. An aggressive interpretation of the rules suggests that broadband providers are generally required to offer customers access to all lawful Internet traffic, or none at all.

This paper explores the way in which this all-or-nothing homogenization of the American broadband product differs from innovative non-net-neutral practices that are taking root in other countries, particularly in mobile markets. Around the ...


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the ...


The Virtues Of Moderation, James Grimmelmann Apr 2015

The Virtues Of Moderation, James Grimmelmann

Cornell Law Faculty Publications

On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.

The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town ...


A Government Of Laws Not Of Precedents 1776-1876: The Google Challenge To Common Law Myth, James Maxeiner Apr 2015

A Government Of Laws Not Of Precedents 1776-1876: The Google Challenge To Common Law Myth, James Maxeiner

All Faculty Scholarship

The United States, it is said, is a common law country. The genius of American common law, according to American jurists, is its flexibility in adapting to change and in developing new causes of action. Courts make law even as they apply it. This permits them better to do justice and effectuate public policy in individual cases, say American jurists.

Not all Americans are convinced of the virtues of this American common law method. Many in the public protest, we want judges that apply and do not make law. American jurists discount these protests as criticisms of naive laymen. They ...


Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern Apr 2015

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern

Faculty Scholarship at Penn Law

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal ...


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies ...


Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame Mar 2015

Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame

Department of Political Science and Law Faculty Scholarship and Creative Works

The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged ...


At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld Mar 2015

At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld

Articles

On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of ...


Whither The Future Of Internet Streaming And Time-Shifting? Revisiting The Rights Of Reproduction And Communication To The Public In Copyright Law After Aereo, Cheng Lim Saw, Warren B. Chik Mar 2015

Whither The Future Of Internet Streaming And Time-Shifting? Revisiting The Rights Of Reproduction And Communication To The Public In Copyright Law After Aereo, Cheng Lim Saw, Warren B. Chik

Research Collection Yong Pung How School Of Law

New forms of communication technology often pose challenges to the copyright regime and have necessitated the rewriting of the scope of the exclusive rights and exceptions by the legislature, and, in some cases, by the courts in common law countries (as well as the Court of Justice of the European Union). These issues have arisen in different categories of digital technology, albeit with the same objective of streamlining and simplifying the delivery of copyright works to consumers. These categories include file storage and transfer operations offered by Peer-to-Peer technology, the space- and time-shifting functions of the early video and audio ...


Can Sharing Be Taxed?, Diane M. Ring, Shu-Yi Oei Feb 2015

Can Sharing Be Taxed?, Diane M. Ring, Shu-Yi Oei

Boston College Law School Faculty Papers

The past few years have seen the rise of a new model of production and consumption of goods and services, often referred to as the “sharing economy.” Fueled by startups such as Uber and Airbnb, sharing enables individuals to obtain rides, accommodations, and other goods and services from peers via the Internet or mobile application in exchange for payment. The rise of sharing has raised questions about how it should be regulated, including whether existing laws and regulations can and should be enforced in this new sector or whether new ones are needed. In this Article, we explore those questions ...


Title Ii Reclassification Is Rate Regulation, Daniel A. Lyons Feb 2015

Title Ii Reclassification Is Rate Regulation, Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods Jan 2015

Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods

Law Faculty Scholarly Articles

The global nature of today’s Internet services presents a unique challenge to international law enforcement cooperation. On a daily basis, law enforcement agents in one country seek access to data that is beyond their jurisdictional reach; as one industry analyst put it, there has been, “an internationalization of evidence.” In order to gain lawful access to data that is subject to another state’s jurisdiction, law enforcement agents must request mutual legal assistance (MLA) from the country that can legally compel the data’s disclosure. But the MLA regime has not been updated to manage the enormous rise of ...


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher Jan 2015

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

Law Student Publications

This comment considers recent cases interpreting the Digital Millennium Copyright Act ("DMCA") and urges Congress to expand the protection of service providers through the DMCA safe harbors. The comment proceeds in six parts. Part I explains contributory and vicarious liability, the applicable sections of the DMCA to this comment, and the fair use doctrine. Part II provides a brief overview of video-sharing websites. It further observes the impact that video-sharing websites have had on digital media, focusing on the impact on the music industry. Part III looks at the recent cases interpreting the DMCA's red flag exception to safe ...


Privacy And The New Press, Lyrissa Lidsky Jan 2015

Privacy And The New Press, Lyrissa Lidsky

Faculty Publications

In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.


The Virtues Of Moderation, James Grimmelmann Jan 2015

The Virtues Of Moderation, James Grimmelmann

Faculty Scholarship

TL;DR—On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.

The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent ...


Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale Jan 2015

Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Anarchy, Status Updates, And Utopia, James Grimmelmann Jan 2015

Anarchy, Status Updates, And Utopia, James Grimmelmann

Faculty Scholarship

Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; Paypal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.

Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power there is also social power. Whenever people come ...