Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (11)
- Intellectual Property Law (11)
- Internet Law (11)
- Privacy Law (8)
- Science and Technology Law (8)
-
- Criminal Law (5)
- Law and Society (3)
- Legal Ethics and Professional Responsibility (3)
- Legislation (3)
- Consumer Protection Law (2)
- Courts (2)
- First Amendment (2)
- Property Law and Real Estate (2)
- Agency (1)
- Anthropology (1)
- Antitrust and Trade Regulation (1)
- Comparative and Foreign Law (1)
- Computer Sciences (1)
- Contracts (1)
- Databases and Information Systems (1)
- Economics (1)
- Estates and Trusts (1)
- European Law (1)
- Fourth Amendment (1)
- Human Rights Law (1)
- Information Security (1)
- International Law (1)
- Jurisprudence (1)
- Law and Economics (1)
- Institution
-
- Schulich School of Law, Dalhousie University (4)
- Touro University Jacob D. Fuchsberg Law Center (4)
- University of Richmond (4)
- American University Washington College of Law (2)
- Fordham Law School (2)
-
- Marquette University Law School (2)
- Pepperdine University (2)
- Selected Works (2)
- SelectedWorks (2)
- University of Pittsburgh School of Law (2)
- Cornell University Law School (1)
- Maurer School of Law: Indiana University (1)
- Saint Louis University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Denver (1)
- University of Georgia School of Law (1)
- University of Oklahoma College of Law (1)
- University of San Diego (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- Articles, Book Chapters, & Popular Press (4)
- Richmond Journal of Law & Technology (4)
- Touro Law Review (4)
- Articles (2)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
-
- American University Business Law Review (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Catholic University Law Review (1)
- Cornell Law Faculty Publications (1)
- Georgia Journal of International & Comparative Law (1)
- Indiana Law Journal (1)
- John M Ivancie Jr. (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Marquette Intellectual Property & Innovation Law Review (1)
- Marquette Intellectual Property Law Review (1)
- Michael J. Madison (1)
- Oklahoma Journal of Law and Technology (1)
- Saint Louis University Law Journal (1)
- San Diego Law Review (1)
- Sean L Harrington (1)
- Sturm College of Law: Faculty Scholarship (1)
- The Journal of Business, Entrepreneurship & the Law (1)
- Timothy D Martin (1)
- William & Mary Law Review (1)
- Publication Type
Articles 31 - 35 of 35
Full-Text Articles in Law
Causing Damage Without Authorization: The Limitations Of Current Judicial Interpretations Of Employee Authorization Under The Computer Fraud And Abuse Act, Garrett D. Urban
Causing Damage Without Authorization: The Limitations Of Current Judicial Interpretations Of Employee Authorization Under The Computer Fraud And Abuse Act, Garrett D. Urban
William & Mary Law Review
No abstract provided.
The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie
John M Ivancie Jr.
This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …
Rights Of Access And The Shape Of The Internet , Michael J. Madison
Rights Of Access And The Shape Of The Internet , Michael J. Madison
Michael J. Madison
This Article reviews recent developments in the law of "access" to "information," that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …
Rights Of Access And The Shape Of The Internet, Michael J. Madison
Rights Of Access And The Shape Of The Internet, Michael J. Madison
Articles
This Article reviews recent developments in the law of access to information, that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …
The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky
The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky
Richmond Journal of Law & Technology
The "interruption of computer services to authorized users," involves a violation of a series of federal and state computer-related crime laws which are designed to protect the authorized users of computer systems.Because most of these laws have only recently been legislated, and since few people have ever actually been charged with such violations, there is very little history or case law in this area. However, as computer-related crimes continue to escalate, these statutes could prove to be a positive force in efforts to catch the electronic criminals of the future. "Although there has never been accurate nationwide reporting of computer …