Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Fourth Amendment (2)
- Privacy (2)
- Surveillance (2)
- Civil Procedure (1)
- Commercial Law (1)
-
- Commercial law (1)
- Constitutional protection (1)
- Contracts (1)
- Copyright in the information society (1)
- Cyberlaw (1)
- Cyberspace (1)
- DRM (1)
- E-mail (1)
- Electronic mail (1)
- Employment Practice (1)
- FISA (1)
- Foreign Intelligence Surveillance Act (1)
- Foreign affairs (1)
- Future of the Internet (1)
- General jurisdiction (1)
- ISP (1)
- Informational privacy (1)
- International shoe (1)
- Internet (1)
- Internet Filtering (1)
- Internet Governance (1)
- Internet Service Provider (1)
- Internet filtering (1)
- Law and Technology (1)
- Levies (1)
- Publication
- File Type
Articles 1 - 14 of 14
Full-Text Articles in Law
Social Distortion: Regulating Privacy In Social Networks, H. Brian Holland
Social Distortion: Regulating Privacy In Social Networks, H. Brian Holland
H. Brian Holland
No abstract provided.
"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin
"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin
Robert J. Condlin
Commentators frequently claim that there is no single, coherent doctrine of extra-territorial personal jurisdiction, and, unfortunately, they are correct. The International Shoe case, commonly (but inaccurately) thought of as the wellspring of the modern form of the doctrine, announced a relatively straightforward, two-factor, four-permutation test that worked well for resolving most cases. In the nearly sixty-year period following Shoe, however, as the Supreme Court expanded and refined the standard, what was once straightforward and uncomplicated became serendipitous and convoluted. Two general, and generally incompatible, versions of the doctrine competed for dominance. The first, what might best be described as a …
Regulating Strategic Data Disclosure On Social Network Sites, H. Brian Holland
Regulating Strategic Data Disclosure On Social Network Sites, H. Brian Holland
H. Brian Holland
No abstract provided.
Regulating Strategic Data Disclosure On Social Network Sites, H. Brian Holland
Regulating Strategic Data Disclosure On Social Network Sites, H. Brian Holland
H. Brian Holland
No abstract provided.
The Right To Compartmentalize? Privacy Expectations And Practices Of Job Applicants On Social Network Sites, H. Brian Holland
The Right To Compartmentalize? Privacy Expectations And Practices Of Job Applicants On Social Network Sites, H. Brian Holland
H. Brian Holland
No abstract provided.
Regulating Strategic Data Disclosure On Social Network Sites, H. Brian Holland
Regulating Strategic Data Disclosure On Social Network Sites, H. Brian Holland
H. Brian Holland
No abstract provided.
Access Denied: The Practice And Policy Of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain
Access Denied: The Practice And Policy Of Global Internet Filtering, Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain
Jonathan Zittrain
Many countries around the world block or filter Internet content, denying access to information—often about politics, but also relating to sexuality, culture, or religion—that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorously conducted study of this accelerating trend. Internet filtering takes place in at least forty states worldwide including many countries in Asia and the Middle East and North Africa. Related Internet content control mechanisms are also in place in Canada, the United States and a cluster of countries in Europe. Drawing on a …
The Future Of The Internet -- And How To Stop It, Jonathan Zittrain
The Future Of The Internet -- And How To Stop It, Jonathan Zittrain
Jonathan Zittrain
No abstract provided.
Cyberspace Law Survey: Introduction, Juliet Moringiello, Michael Fleming
Cyberspace Law Survey: Introduction, Juliet Moringiello, Michael Fleming
Juliet M Moringiello
No abstract provided.
Rethinking Information Privacy In An Age Of Online Transparency, Robert Sprague
Rethinking Information Privacy In An Age Of Online Transparency, Robert Sprague
Robert Sprague
No abstract provided.
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Electronic Surveillance At The Virtual Border, Susan Freiwald
Electronic Surveillance At The Virtual Border, Susan Freiwald
Susan Freiwald
A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …
Private Copy Levies And Technical Protection Of Copyright : The Uneasy Accomodation Of Two Conflicting Logics, Severine Dusollier, Caroline Ker
Private Copy Levies And Technical Protection Of Copyright : The Uneasy Accomodation Of Two Conflicting Logics, Severine Dusollier, Caroline Ker
Severine Dusollier
No abstract provided.
Why Cannot The Unlicensed Internet Cafés Be Completely Banned?(为什么黑网吧屡禁不止?), Henry L. Hu
Why Cannot The Unlicensed Internet Cafés Be Completely Banned?(为什么黑网吧屡禁不止?), Henry L. Hu
Henry L Hu
No abstract provided.