Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet

Discipline
Institution
Publication Year
Publication
File Type

Articles 31 - 60 of 442

Full-Text Articles in Law

A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog Jan 2021

A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

Data privacy law fails to stop companies from engaging in self-serving, opportunistic behavior at the expense of those who trust them with their data. This is a problem. Modern tech companies are so entrenched in our lives and have so much control over what we see and click that the self-dealing exploitation of people has become a major element of the internet’s business model.

Academics and policymakers have recently proposed a possible solution: require those entrusted with people’s data and online experiences to be loyal to those who trust them. But many have concerns about a duty of loyalty. What, …


The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson Jan 2021

The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson

Faculty Scholarship

Industry and government tried to use information technologies to respond to the COVID-19 pandemic, but using the internet as a tool for disease surveillance, public health messaging, and testing logistics turned out to be a disappointment. Why weren’t these efforts more effective? This Essay argues that industry and government efforts to leverage technology were doomed to fail because tech platforms have failed over the past few decades to make their tools trustworthy, and lawmakers have done little to hold these companies accountable. People cannot trust the interfaces they interact with, the devices they use, and the systems that power tech …


Inescapable Surveillance, Matthew Tokson Nov 2020

Inescapable Surveillance, Matthew Tokson

Utah Law Faculty Scholarship

Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.

In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …


Rescuing Our Democracy By Rethinking New York Times Co. V. Sullivan, David A. Logan Jan 2020

Rescuing Our Democracy By Rethinking New York Times Co. V. Sullivan, David A. Logan

Law Faculty Scholarship

No abstract provided.


Making Open Access Viable Economically, Andrew Hyde, Russell A. Miller, Emanuel V. Towfigh Jan 2020

Making Open Access Viable Economically, Andrew Hyde, Russell A. Miller, Emanuel V. Towfigh

Scholarly Articles

The Editors-in-Chief have decided that we will provide our much-cherished readers with an editorial every so often as a way of sharing insights from the “machine room” where so much of the thinking and work is done to publish the German Law Journal. We want to let you in on the ideas that are on our minds, share with you our observations, and include you in the conversations we are having that might be of interest to you. We begin this tradition with this issue, Volume 21 – Number 6. Andrew Hyde, a member of the editorial team with which …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …


Illuminating Regulatory Guidance, Cary Coglianese Jan 2020

Illuminating Regulatory Guidance, Cary Coglianese

All Faculty Scholarship

Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …


The Problems With Decision-Making, Joanna K. Sax Jan 2020

The Problems With Decision-Making, Joanna K. Sax

Faculty Scholarship

Our society faces major challenges in numerous areas, including climate change and healthcare. Addressing these problems with technological advances are of great importance. Increasingly, however, consumers are resisting or rejecting such technological interventions based on inappropriate assignment of risk. In other words, the consumer assessment of risk is not in line with evidence-based assessment of risk. This article focuses on two controversial areas, vaccines and genetically engineered food, as examples in which consumers assign a high risk despite an evidence-based assessment of low risk. This article describes how empirically tested decision-making theories explain why consumers inappropriately assign risk. While these …


Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden Nov 2019

Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford Nov 2019

Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford

Scholarly Publications

No abstract provided.


Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh Jul 2019

Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh

Law Faculty Briefs and Court Documents

The brief argues that the Third District Court of Appeals, in violation of the First Amendment, erred in upholding an injunction that barred defendant from any online postings regarding plaintiff, whether or not those postings were to plaintiff or to third parties.


Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher May 2019

Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher

Technical Services Faculty Presentations

Slides from a presentation, "Reuse, Remix, and Create with Creative Commons Licenses," presented at the Rhode Island Library Association Annual Conference 2019, Get Informed!, on May 23, 2019 in North Smithfield, Rhode Island.

An openly-shared Google Slides version of this presentation is also available at https://bit.ly/2w6maqH.

=====

REUSE, REMIX, AND CREATE WITH CREATIVE COMMONS LICENSES | ROOM 2A

What are Creative Commons (CC) licenses and how do they work? What is the difference between something that is free online and something that is truly “open”? Did you know that it is often a Creative Commons license that puts …


The Internet Adopts Two-Way Radio, Henry Perritt Apr 2019

The Internet Adopts Two-Way Radio, Henry Perritt

All Faculty Scholarship

The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …


Law Library Blog (February 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law Feb 2019

Law Library Blog (February 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright Feb 2019

Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright

Articles

Best known for their role in the creation of cryptocurrencies like bitcoin, blockchains are revolutionizing the way technology entrepreneurs finance their business enterprises. In 2017 alone, tech entrepreneurs raised over $6 billion through the sale of blockchain-based digital tokens, with some sales lasting mere seconds before selling out. In a token sale, also referred to as an “initial coin offering” or “ICO,” organizers of a project sell digital tokens to members of the public to finance the development of new technological platforms and services. After the initial sale, cryptocurrency exchanges scattered across the globe list tokens for trading and facilitate …


Speech Across Borders, Jennifer Daskal Jan 2019

Speech Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …


Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan Jan 2019

Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan

Articles in Law Reviews & Other Academic Journals

You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.

Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …


Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis Jan 2019

Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis

Faculty Publications & Other Works

The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …


#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel Jan 2019

#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel

Faculty Articles

No abstract provided.


Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2019

Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

The “server rule” holds that online displays or performances of copyrighted content accomplished through “in-line” or “framing” hyperlinks do not trigger the exclusive rights of public display or performance unless the linker also possesses a copy of the underlying work. As a result, the rule shields a vast array of online activities from claims of direct copyright infringement, effectively exempting those activities from the reach of the Copyright Act. While the server rule has enjoyed relatively consistent adherence since its adoption in 2007, some courts have recently suggested a departure from that precedent, noting the doctrinal and statutory inconsistencies underlying …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Babashook: The Babadook, Gay Iconography And Internet Cultures, Renee Middlemost Jan 2019

Babashook: The Babadook, Gay Iconography And Internet Cultures, Renee Middlemost

Faculty of Law, Humanities and the Arts - Papers (Archive)

Upon its 2014 release, Australian film The Babadook (Kent, 2014), gained critical acclaim worldwide. While the film gathered high praise, its domestic release was impeded by a lack of marketing support and ongoing debate about the quality of Australian horror films. By 2015, The Babadook was available to stream on Netflix in the United States, and one would imagine, to gradually fade from view. Yet a seemingly innocent categorization error on Netflix in 2016, which listed The Babadook as an LGBT interest film, resulted in a revival of the film's popularity as a cult film and the emergence of the …


Poverty, Privacy, And Living Out Of Reach [Reviews], Wendy A. Bach Jan 2019

Poverty, Privacy, And Living Out Of Reach [Reviews], Wendy A. Bach

Scholarly Works

No abstract provided.


Coding For Cultural Competency: Expanding Access To Justice With Technology, Sherley Cruz Jan 2019

Coding For Cultural Competency: Expanding Access To Justice With Technology, Sherley Cruz

Scholarly Works

Innovations in legal technology are revolutionizing access to justice for individuals who previously had little or no ability to obtain legal assistance. This Article explores how the lack of culturally competent designs within legal technology negatively impacts diverse communities, thereby hindering the ability to expand access to justice. An examination of the underlying theories of access to justice and cultural competency illustrates why it is necessary for legal professionals and technology designers to incorporate culturally competent designs when developing legal technology. In light of ongoing changes in United States’ demographics, and the heightened need to provide access to justice given …


Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey Jan 2019

Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey

Faculty Scholarship

Professional photographers who make photographs of people negotiate a tense relationship between their own creative freedoms and the right of their subjects to control their images. This negotiation formally takes place over the terrain of copyright, right of publicity, and the First Amendment. Informally, photographers describe implied understandings and practice norms guiding their relationship with subjects, infrequently memorialized in short, boilerplate contractual releases. This short essay explores these formal and informal practices described by contemporary professional photographers. Although the evidence for this essay comes from professional photographic practice culled from interviews with contemporary photographers, the analysis of the evidence speaks …


Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green Jan 2019

Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green

Faculty Scholarship

The Supreme Court’s Brandenburg v. Ohio test provides an exception to the First Amendment’s broad guarantee of freedom of speech. Where speech is (1) directed to inciting or producing imminent lawless action, and (2) is likely to incite or produce such action, the First Amendment withdraws its promise of protection. Thus, where the “imminence” of lawless action cannot be shown, free speech cannot be restricted. Since Brandenburg, Courts have applied a test for imminence that turns on proximity in space and in time — that is, the test evaluates how spatiotemporally imminent lawless activity is. In this Article, I argue …


Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem Nov 2018

Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem

Library Philosophy and Practice (e-journal)

In this paper, we explore the socio-economic effects of internet use at the community information centres (CICs) on livelihoods in three regions of Ghana. Sustainable livelihood framework was used as a lens to understand the phenomena being studied. Primary and secondary data collection methods were used. Three CICs in three regions were purposively selected and qualitative research method was adopted for the study. The data were analysed using Nvivo. The findings showed that sending email information was largely the reason why people used the Internet. We found that through the Internet, people learn, develop new business ideas and expand the …


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …