Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Internet Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 241 - 258 of 258

Full-Text Articles in Law

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Jan 2013

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …


Certainty At Last?: A "New" Framework For Electronic Contracting In Singapore, Eliza Mik Jan 2013

Certainty At Last?: A "New" Framework For Electronic Contracting In Singapore, Eliza Mik

Research Collection Yong Pung How School Of Law

Singapore is the first Asian country to accede to the UNCITRAL Convention on the Use of Electronic Communications in International Contracts (“CUECIC” or “Convention”). Upon accession, the Singaporean Electronic Transactions Act (“ETA” or “Act”) was repealed and re-enacted in a modified version, with effect from 1 July 2010. The modified ETA retains the framework of the original ETA but adds or amends certain provisions dealing with electronic contracting to align domestic e-commerce regulations with the Convention. Accordingly, Singapore is not only the first Asian nation to accede to the CUECIC but also the first nation to implement some of its …


Copyright 1992-2012: The Most Significant Development?, Jane C. Ginsburg Jan 2013

Copyright 1992-2012: The Most Significant Development?, Jane C. Ginsburg

Faculty Scholarship

On the occasion of the twentieth anniversary of the Fordham Intellectual Property Law & Policy Conference, its organizer, Professor Hugh Hansen, planned a session on “U.S. Copyright Law: Where Has It Been? Where Is It Going?” and asked me to look back over the twenty years since the conference’s inception in order to identify the most important development in copyright during that period. Of course, the obvious answer is “the Internet,” or “digital media,” whose effect on copyright law has been pervasive. I want to propose a less obvious response, but first acknowledge that digital media and communications have presented …


An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian Jan 2013

An Intersystemic View Of Intellectual Property And Free Speech, Mark Bartholomew, John Tehranian

Journal Articles

Intellectual property regimes operate in the shadow of the First Amendment. By deeming a particular activity as infringing, the law of copyright, trademark, and the right of publicity all limit communication. As a result, judges and lawmakers must delicately balance intellectual property rights with expressive freedoms. Interestingly, each intellectual property regime strikes the balance between ownership rights and free speech in a dramatically different way. Despite a large volume of scholarship on intellectual property rights and free speech considerations, this Article represents the first systematic effort to detail, analyze, and explain the divergent evolution of expression-based defenses in copyright, trademark, …


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Why The Right To Data Portability Likely Reduces Consumer Welfare: Antitrust And Privacy Critique, Peter Swire, Yianni Lagos Jan 2013

Why The Right To Data Portability Likely Reduces Consumer Welfare: Antitrust And Privacy Critique, Peter Swire, Yianni Lagos

Maryland Law Review

No abstract provided.


A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs Jan 2013

A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs

Faculty Scholarship

This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.

Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …


The Right To Quantitative Privacy, David Gray, Danielle Citron Dec 2012

The Right To Quantitative Privacy, David Gray, Danielle Citron

David C. Gray

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


The Fight For The Future: How People Defeated Hollywood And Saved The Internet—For Now, Edward Lee Dec 2012

The Fight For The Future: How People Defeated Hollywood And Saved The Internet—For Now, Edward Lee

Edward Lee

No abstract provided.


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron Dec 2012

The Right To Quantitative Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

We are at the cusp of a historic shift in our conceptions of the Fourth Amendment driven by dramatic advances in surveillance technology. Governments and their private sector agents continue to invest billions of dollars in massive data-mining projects, advanced analytics, fusion centers, and aerial drones, all without serious consideration of the constitutional issues that these technologies raise. In United States v. Jones, the Supreme Court signaled an end to its silent acquiescence in this expanding surveillance state. In that case, five justices signed concurring opinions defending a revolutionary proposition: that citizens have Fourth Amendment interests in substantial quantities of …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


The Four Factor Test, Susan Freiwald Dec 2012

The Four Factor Test, Susan Freiwald

Susan Freiwald

No abstract provided.


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson Dec 2012

What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson

Stephen E Henderson

This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …


Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq. Dec 2012

Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author provides a brief overview of the World Trade Organization (WTO), the International Monetary Fund (IMF) and the World Bank (WB) by explaining the context of their interrelationship. Afterwards, the author delves into a brief analysis of Mexico’s role in the International Trade arena and concludes by describing the paths through which the private sector can benefit from the WTO.///////////////////////////////////////////////////////////////////////////////////////El autor pone en contexto la interrelación entre la Organización Mundial del Comercio (OMC) el Banco Mundial (BM) y el Fondo Monetario Internacional (FMI). Posteriormente, el autor describe brevemente el rol de México dentro de las instituciones de Comercio Internacional …