Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Internet Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 258

Full-Text Articles in Law

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Social Engineering Through Shari’A: Islamic Law And State-Directed Da’Wa In Contemporary Aceh, R. Michael Feener Dec 2013

Social Engineering Through Shari’A: Islamic Law And State-Directed Da’Wa In Contemporary Aceh, R. Michael Feener

Indonesia Law Review

This study of the contemporary Islamic legal system in Aceh, Indonesia argues for new attention to be paid to the ways in which contemporary Muslim agendas for the implementation of Islamic law can be read as projects for future oriented social transformation—rather than as a series of reactive measures to perceived ‘crises of modernity’ and/or the political machinations of rival elites in contesting control of state power. In doing so it highlights the ways in which the ideals of, and institutional formations developed by, proponents of Islamic law are configured in relation to a broad range of non-Muslim modernist projects, …


Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies Dec 2013

Judge Pauley’S Opinion In Clapper: Reset Button For Bulk Collection Debate?, Peter Margulies

Law Faculty Scholarship

This article was originally found in Lawfare, available here: https://www.lawfareblog.com/judge-pauleys-opinion-clapper-reset-button-bulk-collection-debate


Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies Dec 2013

Desperately Seeking Substance (Not Slogans) In Review Group Report On Nsa Surveillance, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks Dec 2013

Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks

Danielle Keats Citron

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg Dec 2013

Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg

Michigan Telecommunications & Technology Law Review

Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.


Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain Dec 2013

Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain

Michigan Telecommunications & Technology Law Review

Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …


The Player-Authors Project, Greg Lastowka Dec 2013

The Player-Authors Project, Greg Lastowka

Greg Lastowka

No abstract provided.


Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin Dec 2013

Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin

Seattle Journal for Social Justice

No abstract provided.


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik Nov 2013

E-Commerce Regulation: Necessity, Futility, Disconnect, Eliza Mik

Research Collection Yong Pung How School Of Law

Existing e-commerce regulations constitute a premature and unnecessary interference in the natural evolution of commercial practices and technologies. I question not just their quality, mainly attributable to the technological ignorance of the regulator, but their very necessity. I observe the practical futility of drafting effective regulatory instruments in areas subject to continuous and unpredictable technological change. I criticize the overly homogenous approach to "everything Internet" (i.e. everything involving the Internet requires new law) as well as the creation of new regulatory spheres and legal categories. Some might claim that it is too early for a critical retrospective of this subject. …


Misplaced Misrepresentations: Why Misrepresentation-Of-Age Statutes Must Be Reinterpreted As They Apply To Children’S Online Contracts, Michelle A. Sargent Nov 2013

Misplaced Misrepresentations: Why Misrepresentation-Of-Age Statutes Must Be Reinterpreted As They Apply To Children’S Online Contracts, Michelle A. Sargent

Michigan Law Review

The information age revolutionized the relationship between individuals and the internet. Today, children are the targets of online advertisements that lure them into accepting terms of service, thus entering into online agreements. While children may feel comfortable navigating websites, they are psychologically predisposed to be unsophisticated and impulsive actors online. Children lack the digital literacy to understand the implications of accepting website terms of service. Meanwhile, several states have misrepresentation-of-age statutes that prevent children from using the infancy doctrine to disaffirm online contracts because, in accepting the terms of service, children often represent that they are old enough to enter …


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Oct 2013

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Patricia L. Bellia

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …


Federalization In Information Privacy Law, Patricia L. Bellia Oct 2013

Federalization In Information Privacy Law, Patricia L. Bellia

Patricia L. Bellia

In Preemption and Privacy, Professor Paul Schwartz argues that it would be unwise for Congress to adopt a unitary federal information privacy statute that both eliminates the sector-specific distinctions in federal information privacy law and blocks the development of stronger state regulation. That conclusion, though narrow, rests on descriptive and normative claims with broad implications for the state-federal balance in information privacy law. Descriptively, Professor Schwartz sees the current information privacy law landscape as the product of successful experimentation at the state level. That account, in turn, fuels his normative claims, and in particular his sympathy with theories of competitive …


Defending Cyberproperty, Patricia L. Bellia Oct 2013

Defending Cyberproperty, Patricia L. Bellia

Patricia L. Bellia

This Article explores how the law should treat legal claims by owners of Internet-connected computer systems to enjoin unwanted uses of their systems. Over the last few years, this question has become increasingly urgent and controversial, as system owners have sought protection from unsolicited commercial e-mail and from robots that extract data from Web servers for competitive purposes. In the late 1990s and early 2000s, courts utilizing a wide range of legal doctrines upheld claims by network resource owners to prevent unwanted access to their computer networks. The vast weight of legal scholarship has voiced strong opposition to these cyberproperty …


The Memory Gap In Surveillance Law, Patricia L. Bellia Oct 2013

The Memory Gap In Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Spyware And The Limits Of Surveillance Law, Patricia L. Bellia Oct 2013

Spyware And The Limits Of Surveillance Law, Patricia L. Bellia

Patricia L. Bellia

For policymakers, litigants, and commentators seeking to address the threats digital technology poses for privacy, electronic surveillance law remains a weapon of choice. The debate over how best to respond to the spyware problem provides only the most recent illustration of that fact. Although there is much controversy over how to define spyware, that label encompasses at least some software that monitors a computer user's electronic communications. Federal surveillance statutes thus present an intuitive fit for responding to the regulatory challenges of spyware, because those statutes bar the unauthorized acquisition of electronic communications and related data in some circumstances. Indeed, …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Oct 2013

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Patricia L. Bellia

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Oct 2013

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Patricia L. Bellia

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Oct 2013

Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.


Undermining Parental Authority, Unethical Advertising And The Accountability Of Self-Regulation: Thomascook.Ca As A Fable, Nachshon Goltz, Peter Neufeld Oct 2013

Undermining Parental Authority, Unethical Advertising And The Accountability Of Self-Regulation: Thomascook.Ca As A Fable, Nachshon Goltz, Peter Neufeld

Nachshon Goltz

This paper demonstrates the shortcomings of Advertising Standards Canada, the Canadian self-regulatory body overseeing advertising to children. It uses a case study initiated by a complaint regarding a parental undermining advertisement. Advertising Standards Canada failure to address this complaint illustrate the greater need for Canada to move away from self-regulation in children advertising to a less de-centralized regulatory regime. This move is increasingly important due to the unprecedented rise in electronic marketing and its ability to use stealth advertising and collect information from its child consumers.


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Rape Shield Laws And The Social Media Revolution: Discoverability Of Social Media--It's Not Private, Seth I. Koslow Oct 2013

Rape Shield Laws And The Social Media Revolution: Discoverability Of Social Media--It's Not Private, Seth I. Koslow

Touro Law Review

No abstract provided.


Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler Oct 2013

Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler

Amy A. Hinkler

No abstract provided.


Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik Oct 2013

Identity Theft On Social Networking Sites: Developing Issues Of Internet Impersonation, Maksim Reznik

Touro Law Review

This Comment focuses on the dangers of social media sites when a person gains access to another's online account through two different methods: (1) stealing the third party's password, or (2) creating a completely fake profile and subsequently impersonating that person.


Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland Oct 2013

Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland

Steven I. Friedland

State and federal courts are split over whether cell phone searches incident to a lawful arrest are permissible under the Fourth Amendment. The Supreme Court has the opportunity to create uniformity by accepting a certiorari petition in a cell phone search incident to arrest case, either United States v. Wurie or Riley v. California. The Court should do so to create an analysis that incorporates sensory enhancing technology, not avoids it, as it has done to date.

The split in case law evidences a central contradiction. Fourth Amendment rules need to be predictable and based on clear guidelines for effective …


Now Playing At A Youtube Near You: "Innocence Of [Internet Service Providers]", Brian A. Oliver Oct 2013

Now Playing At A Youtube Near You: "Innocence Of [Internet Service Providers]", Brian A. Oliver

University of Miami International and Comparative Law Review

No abstract provided.


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins Oct 2013

Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins

Indiana Law Journal

Scholarship on assisted reproductive technologies (ART) has emphasized the commercial nature of the interaction between fertility patients and their physicians, but little attention has been paid to precisely how clinics persuade patients to choose their clinics over their competitors’. This Article offers evidence about how clinics sell ART based on clinics’ advertising on their websites. To assess clinics’ marketing efforts, I coded advertising information on 372 fertility clinics’ websites. The results from the study confirm some suspicions of prior ART scholarship while contradicting others. For instance, in line with scholars who are concerned that racial minorities face barriers to accessing …