Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Internet Law

Series

Institution
Keyword
Publication
File Type

Articles 31 - 43 of 43

Full-Text Articles in Law

Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater Jan 2008

Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater

Faculty Scholarship

America's communications infrastructure is stuck at a copper wall. For the vast majority of homes, copper wires remain the principal means of getting broadband services. The deployment of fiber optic connections to the home would enable exponentially faster connections, and few dispute that upgrading to more robust infrastructure is essential to America's economic growth. However, the costs of such an upgrade are daunting for private sector firms and even for governments. These facts add up to a public policy challenge.

Our intuition is that an innovative model holds unrealized promise: household investments in fiber. Consumers may one day purchase and …


Manipulating And Hiding Terrorist Content On The Internet: Legal And Tradecraft Issues, Jack F. Williams Jan 2008

Manipulating And Hiding Terrorist Content On The Internet: Legal And Tradecraft Issues, Jack F. Williams

Faculty Publications By Year

No abstract provided.


Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas Jan 2008

Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas

Articles

No abstract provided.


Government Data Mining: The Need For A Legal Framework, Fred H. Cate Jan 2008

Government Data Mining: The Need For A Legal Framework, Fred H. Cate

Articles by Maurer Faculty

The article examines the government's growing appetite for collecting personal data. Often justified on the basis of protecting national security, government data mining programs sweep up data collected through hundreds of regulatory and administrative programs, and combine them with huge datasets obtained from industry. The result is an aggregation of personal data - the "digital footprints" of individual lives - never before seen. These data warehouses are then used to determine who can work and participate in Social Security programs, who can board airplanes and enter government buildings, and who is likely to pose a threat in the future, even …


Asterisk Revisited: Debating A Right Of Reply On Search Results, Frank Pasquale Jan 2008

Asterisk Revisited: Debating A Right Of Reply On Search Results, Frank Pasquale

Faculty Scholarship

No abstract provided.


Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen Jan 2008

Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of visibility has created two problems. First, focusing on visibility diminishes the salience and obscures the operation of nonvisual mechanisms designed to render individual identity, behavior, and preferences transparent to third parties. The metaphoric mapping to visibility suggests that surveillance is simply passive observation, rather than the active production of categories, narratives, and, norms. Second, even a broader conception of privacy harms as a function …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Jan 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Articles

When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison Jan 2008

Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison

Articles

This essay, prepared as part of a Symposium on intellectual property law and business models, suggests the re-examination of the role of intellectual property law in the persistence of cultural forms of all sorts, including (but not limited to) business models. Some argue that the absence of intellectual property law inhibits the emergence of durable or persistent cultural forms; copyright and patent regimes are justified precisely because they supply foundations for durability. The essay tests that proposition via brief reviews of three persistent but very different cultural models, each of which represents a distinct form of American culture: The Rocky …


The Next Frontier For Network Neutrality, Philip J. Weiser Jan 2008

The Next Frontier For Network Neutrality, Philip J. Weiser

Publications

The challenge for policymakers evaluating calls to institute some form of network neutrality regulation is to bring reasoned analysis to bear on a topic that continues to generate more heat than light and that many telecommunications companies appear to believe will just fade away. Over the fall of 2007, the hopes of broadband providers that broadband networks could escape any form of regulatory oversight were dealt a blow when it was revealed that Comcast had degraded the experience of some users of Bittorent (a peer-to-peer application) and engaged in an undisclosed form of network management. This incident, as well as …


Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher Jan 2008

Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher

Faculty Scholarship

This Essay explores the enforceability and presence of pro-seller contract terms in internet retail contracts. Analyzing case law on internet contract enforceability and a survey of 500 firms'websites, it demonstrates that even the enforceability of many internet contracts is questionable. It then presents new data that suggest that the prevalence of pro-seller contract terms is far less than usually assumed. It suggests that the benefit of making these terms enforceable is outweighed by the loss of user friendliness required for the necessary interface changes. Finally, it uses fresh statistical analyses to determine what relationship, if any, exists between enforceability, pro-seller …


Information Policy For The Library Of Babel, James Grimmelmann Jan 2008

Information Policy For The Library Of Babel, James Grimmelmann

Cornell Law Faculty Publications

The image of Borges's Library of Babel, which contains all possible books, is haunting and suggestive. This essay asks what we would do if we were advising a Federal Library Commission on how to deal with the Library's vast holdings and overwhelming disorganization. This thought exercise provides a set of sensible principles for information policy in an age of extreme informational abundance.


Technological Due Process, Danielle K. Citron Jan 2008

Technological Due Process, Danielle K. Citron

Faculty Scholarship

Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason.

The dichotomy between these procedural regimes has become outmoded. This century's automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …


Open Code Governance, Danielle K. Citron Jan 2008

Open Code Governance, Danielle K. Citron

Faculty Scholarship

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person's eligibility for public benefits. Computer systems store sensitive personal information. These systems' closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program's source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …