Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet

Discipline
Institution
Publication Year
Publication
File Type

Articles 151 - 180 of 446

Full-Text Articles in Law

Technology And Client Communications: Preparing Law Students And New Lawyers To Make Choices That Comply With The Ethical Duties Of Confidentiality, Competence, And Communication, Kristin J. Hazelwood May 2014

Technology And Client Communications: Preparing Law Students And New Lawyers To Make Choices That Comply With The Ethical Duties Of Confidentiality, Competence, And Communication, Kristin J. Hazelwood

Law Faculty Scholarly Articles

That the use of technology has radically changed the legal profession is beyond dispute. Through technology, lawyers can now represent clients in faraway states and countries, and they can represent even local clients through a “virtual law office.” Gone are the times in which the lawyer’s choices for communicating with clients primarily involve preparing formal business letters to convey advice, holding in-person client meetings in the office, or conducting telephone calls with clients on landlines from the confines of the lawyer’s office. Not only do lawyers have choices about how to communicate with their clients, but they also frequently choose …


Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson Jan 2014

Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll Jan 2014

Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …


Do Objects Dream Of An Internet Of Things?, Teodor Mitew Jan 2014

Do Objects Dream Of An Internet Of Things?, Teodor Mitew

Faculty of Law, Humanities and the Arts - Papers (Archive)

This paper develops the notion of heteroclite sociable objects in the context of the emerging internet of things, and examines their transformative effect for understandings of sociability and agency. The notion of sociable objects attempts to capture the heterogeneous identity-shift occurring when heretofore obscure and mute objects ranging from toasters to thermostats acquire the agencies to leave semantically distinct traces online, and detour their human interlocutors into an object-mediated entanglement. Using a toolkit drawn from actor network theory and object oriented ontology, the paper discusses several examples illustrating the case for new parameters of sociability, better suited to a materiality …


Teenage Crowdfunding, Andrew A. Schwartz Jan 2014

Teenage Crowdfunding, Andrew A. Schwartz

Publications

Teenage startups are in the public interest and should be encouraged, yet the federal CARD Act of 2009 eliminated credit card financing for many such companies, cutting off an important source of early-stage business capital for teenage entrepreneurs. Since then, however, Congress passed the CROWDFUND Act of 2012 which will allow teenagers to raise early-stage financing through Internet crowdfunding. Teens, being masters of the Internet, are well positioned to exploit this new opportunity, with the upshot being that securities crowdfunding may become an important way for youthful entrepreneurs to fund their business dreams.


Reviving Implied Confidentiality, Woodrow Hartzog Jan 2014

Reviving Implied Confidentiality, Woodrow Hartzog

Faculty Scholarship

The law of online relationships has a significant flaw-it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.

Courts' abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen Jan 2014

Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen

Faculty Scholarship

This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.


Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet Jan 2014

Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet

Publications

The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …


Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler Jan 2014

Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane Jan 2014

After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane

Articles

The Federal Trade Commission's (“FTC” or “the commission”) January 3, 2013 decision to close its longstanding investigation of Google1 brings to a close a flurry of discussion over the possibility that Google could become subject to a “search neutrality” principle in the United States. Although the Commission found against Google on several grounds, it rejected petitions from Google's critics to create a search neutrality principle as a matter of antitrust law. This essay briefly analyzes what remains of U.S. antitrust scrutiny of Internet search bias after the Google settlement. In particular, it suggests that a sensible line can be drawn …


Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman Jan 2014

Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman

All Faculty Scholarship

Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …


"The Disorderly Conduct Of Words": Civil Liability For Injuries Caused By The Dissemination Of False Or Inaccurate Information, Richard C. Ausness Oct 2013

"The Disorderly Conduct Of Words": Civil Liability For Injuries Caused By The Dissemination Of False Or Inaccurate Information, Richard C. Ausness

Law Faculty Scholarly Articles

This Article is concerned with the potential liability of those who disseminate false or inaccurate information that causes physical injury or property damage to those who rely upon it. However, this Article will not address the question of whether those who advocate or depict violence or other antisocial activities should also be subject to liability. For the most part, such publications are considered to be a form of constitutionally protected speech, even when they directly cause physical harm to others. Although the issue of liability for the publication of factually inaccurate information is narrower in scope than liability for the …


Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande Sep 2013

Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande

All Faculty Scholarship

This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast …


The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman Jul 2013

The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman

Faculty Publications

In June 2013, the State Attorneys General signaled their intent to ask Congress to amend 47 U.S.C. 230, the federal law that says websites aren't liable for third party content. The State AGs want to exclude state criminal prosecutions from the immunity. This essay explains the problems such an amendment would create for the Internet user-generated content community.


Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park Apr 2013

Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park

Management Faculty Publications and Presentations

No abstract provided.


The Referendum Process In Maryland: Balancing Respect For Representative Government With The Right To Direct Democracy, Steven G. Shapiro Jan 2013

The Referendum Process In Maryland: Balancing Respect For Representative Government With The Right To Direct Democracy, Steven G. Shapiro

Articles in Law Reviews & Other Academic Journals

This article will examine the Maryland referendum petition process to determine whether any changes in the current law should or could be made. This includes whether the legislature should reverse the holding in Whitley, whether it should add additional requirements to and restrictions on the signature gathering process, and whether the percentage of voters needed for a successful challenge should be increased.

First, as a matter of policy, should the law be changed? For example, does it strike the proper balance between respect for the legislative process and allowing for more voices in legislative matters by the public at large? …


Privacy, Antitrust, And Power, Frank Pasquale Jan 2013

Privacy, Antitrust, And Power, Frank Pasquale

Faculty Scholarship

When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.

To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …


The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga Jan 2013

The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga

Law Faculty Publications

Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.


Safe Harbor For The Innocent Infringer In The Digital Age, Tonya M. Evans Jan 2013

Safe Harbor For The Innocent Infringer In The Digital Age, Tonya M. Evans

Law Faculty Scholarship

The primary goal of this Article is three-fold: (1) to explore the role of the innocent infringer archetype historically and in the digital age; (2) to highlight the tension between customary and generally accepted online uses and copyright law that compromise efficient use of technology and progress of the digital technologies, the Internet, and society at large; and (3) to offer a legislative fix in the form of safe harbor for direct innocent infringers. Such an exemption seems not only more efficient but also more just in the online environment where unwitting infringement for the average copyright consumer is far …


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Digital Planning: The Future Of Elder Law, Naomi R. Cahn Jan 2013

Digital Planning: The Future Of Elder Law, Naomi R. Cahn

GW Law Faculty Publications & Other Works

More than half of individuals over the age of 65 use the Internet or e-mail — and they are a fast-growing population on the Internet. Like most people, however, they have probably not considered how to dispose of their digital life if they become incapacitated or when they die, even though they are in the most likely age group to have drafted a will. Indeed, even if they do engage in planning, they cannot be confident that their wishes will be carried out: only a few states have laws covering probate and digital assets, there is no generally accepted method …


Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman Jan 2013

Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman

Articles & Chapters

While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.

I argue that the myth of the online anonym is not only false as a …


An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen Jan 2013

An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen

All Faculty Scholarship

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …


Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky Sep 2012

Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky

2012 Energy Justice Conference and Technology Exposition (September 17-18)

Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado

25 slides


Crowdsourcing Indie Movies, Henry H. Perritt Jr. Sep 2012

Crowdsourcing Indie Movies, Henry H. Perritt Jr.

All Faculty Scholarship

Crowdsourcing Indie Movies Henry H. Perritt, Jr. Abstract Internet-centered technology developments are revolutionizing the ways in which movies can be made. The use of crowdsourcing to make indie movies is a possibility that has not yet been explored fully, although the use of crowdsourcing to raise money for artistic works is growing. Crowdsourcing can be used for every step of making a movie, increasing the range of collaboration available to creators and reducing capital requirements. The article uses a fictional account of a team of young moviemakers to explain how they can use crowdsourcing for each step of making their …


Finding Legal, Factual, And Other Information In A Digital World, Timothy L. Coggins Jul 2012

Finding Legal, Factual, And Other Information In A Digital World, Timothy L. Coggins

Law Faculty Publications

This updated listing of Internet sites for legal, factual, and other research offers a combination of more established sites and newer sites developed since the publication of the previous listing. The article began as a comprehensive bibliography of research and other sites for an Advanced Legal Research course and a series of continuing education sessions for legal assistants and paralegals.1 The current version includes sites for primary authorities, both federal and state, as well as URLs for other types of information, such as sites that assist in finding expert witnesses and biographical and background information about individuals.