Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (14)
- Criminal Law (6)
- Fourth Amendment (6)
- Intellectual Property Law (4)
- Science and Technology Law (4)
-
- Constitutional Law (3)
- Civil Rights and Discrimination (2)
- Communications Law (2)
- Computer Law (2)
- Entertainment, Arts, and Sports Law (2)
- International Law (2)
- Civil Procedure (1)
- Commercial Law (1)
- Criminal Procedure (1)
- First Amendment (1)
- Jurisdiction (1)
- Legislation (1)
- Privacy Law (1)
- Supreme Court of the United States (1)
- Institution
- Publication Year
- Publication
- Publication Type
- File Type
Articles 1 - 24 of 24
Full-Text Articles in Law
Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Braxton Johnson, Alex Dewsnup
Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Braxton Johnson, Alex Dewsnup
Brigham Young University Prelaw Review
During the era of the novel coronavirus SARS-CoV-2, social media sites have justified removing inflammatory opinions pertaining to COVID-19 in attempts to protect and promote public health and safety by automatically categorizing such opinions as misinformation. While the intention of such censorship is noble, it raises the question of whether social media sites and internet service providers in general have too much power when it comes to controlling information. In an age where social media has become intrinsic to the dissemination and formation of opinion, the free exchange of ideas on the Internet is of prime importance, and any threat …
Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Sarah Cheng, Harriet Norcross
Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Sarah Cheng, Harriet Norcross
Brigham Young University Prelaw Review
During the era of the novel coronavirus SARS-CoV-2, social media sites have justified removing inflammatory opinions pertaining to COVID-19 in attempts to protect and promote public health and safety by automatically categorizing such opinions as misinformation. While the intention of such censorship is noble, it raises the question of whether social media sites and internet service providers in general have too much power when it comes to controlling information. In an age where social media has become intrinsic to the dissemination and formation of opinion, the free exchange of ideas on the Internet is of prime importance, and any threat …
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
Laurie B. Serafino
Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Patricia L. Bellia
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Patricia L. Bellia
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Patricia L. Bellia
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino
“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino
Laurie B. Serafino
Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Pepperdine Law Review
No abstract provided.
Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor
Richmond Journal of Law & Technology
Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).
To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers
LLM Theses and Essays
This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.
P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento
P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento
Assaf Jacob
This paper explores the legal ramifications of the prevalent Internet Service Provider practice of providing caching services to P2P network users. First, the paper describes the P2P industry, its benefits and drawbacks. Then the paper discusses several caching techniques that can be implemented, and indeed are implemented, by ISPs around the globe. These practices allow ISPs to provide clients with better services but, by the same token, expose them to copyright infringement suits by third parties. The article will discuss how copyright law should consider the costs and benefits to the public of P2P caching practices, especially in the application …
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Rob Frieden
Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …
Navigating The Safe Harbor Rule: The Need For A Dmca Compass, Tiffany N. Beaty
Navigating The Safe Harbor Rule: The Need For A Dmca Compass, Tiffany N. Beaty
Marquette Intellectual Property Law Review
The internet is a medium for more than just email and web browsing. Today, many internet users utilize the internet to access and share music, movies, and other types of media. Copyright law has attempted to keep up with the dynamic nature of the internet; however, this Comment posits it has only been marginally successful. The author examines whether the Safe Harbor Rule of the Digital Millennium Copyright Act (DCMA) is sufficient in balancing the need to protect copyright owners against the need for Internet Service Providers to be protected from third-party user suits. In doing so, the author concludes …
How “Choruss” Can Turn Into A Cacophony: The Record Industry’S Stranglehold On The Future Of Music Business, Andrey Spektor
How “Choruss” Can Turn Into A Cacophony: The Record Industry’S Stranglehold On The Future Of Music Business, Andrey Spektor
Richmond Journal of Law & Technology
A sixty year-old man is delighted when his son shows him how to use Pandora—an interactive, hip Internet radio site that puts the listener in control. Having grown up a huge Louis Armstrong fan, the man quickly selects the jazz singer as one of his “stations.” When listening to this station, Pandora will only play songs by Armstrong and other similar artists for him. When he hears Armstrong’s classic, “What a Wonderful World,” the man immediately clicks the “Thumbs Up” icon, indicating his approval of Pandora’s recommendation. Pandora’s recommendations are drawn from its “Music Genome Project,” a database of song …
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald
Journal Articles
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Journal Articles
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …
Twenty-First Century Pillow-Talk: Applicability Of The Marital Communications Privilege To Electronic Mail, Mikah K. Thompson
Twenty-First Century Pillow-Talk: Applicability Of The Marital Communications Privilege To Electronic Mail, Mikah K. Thompson
Faculty Works
The marital privilege has two parts: the testimonial privilege and the communications privilege. Originally, the testimonial privilege prevented one spouse from testifying against another. According to the United States Supreme Court, spousal disqualification sprang from two canons of medieval jurisprudence: first, the rule that an accused was not permitted to testify in his own behalf because of his interest in the proceeding; second, the concept that husband and wife were one, and that since the woman had no recognized separate legal existence, the husband was that one. Thus, if a husband were not permitted to testify, then his wife, as …
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett
Richmond Journal of Law & Technology
Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …
Chasing Bits Across Borders, Patricia L. Bellia
Chasing Bits Across Borders, Patricia L. Bellia
Journal Articles
As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …
Proactive Legislation And The First Amendment, Stuart Minor Benjamin
Proactive Legislation And The First Amendment, Stuart Minor Benjamin
Michigan Law Review
It is a commonplace that the world is changing rapidly, with whole sectors of the economy being transformed. New forms of communication, like the World Wide Web, e-mail, and satellite television, have risen from obscurity to ubiquity in less than a decade. The speed of these changes has led some to express concern about the ability of governments to respond. The fear is that governments cannot keep up with developments as they occur and thus get hopelessly behind. The solution, according to some, is for the government to act proactively - before a harm has arisen, so that the government …
A Nice Place To Visit But I Wouldn't Want To Litigate There: The Effects Of Cybersell V. Cybersell On The Law Of Personal Jurisdiction, W. David Falcon Jr.
A Nice Place To Visit But I Wouldn't Want To Litigate There: The Effects Of Cybersell V. Cybersell On The Law Of Personal Jurisdiction, W. David Falcon Jr.
Richmond Journal of Law & Technology
In a world divided by barriers of language and culture, the Internet is the nexus that connects the most rural outposts of technology to the global business centers. The Internet's most popular user interface, the World Wide Web, is an interwoven network of computers through which news and information can traverse international barriers in a matter of seconds. Using an Internet Service Provider ("ISP") and a personal computer, the average user can access the World Wide Web and enter the largest repository of public information on the planet. The boundaries are virtually limitless, and the general absence of content restrictions …
Net Law: How Lawyers Use The Internet, G. Wingate Grant
Net Law: How Lawyers Use The Internet, G. Wingate Grant
Richmond Journal of Law & Technology
We have all had experiences where we listened to a preacher or maybe a law professor use a story to illustrate a point. Weeks later, we might not recall the point, but we remember the story. That was my feeling after reading through NET LAW: HOW LAWYERS USE THE INTERNET. This book might be considered a dictionary, a marketing book, or a computer book. Most significantly, it is an anthology of actual accounts of lawyers and their staffs successfully using the Internet to make their practices more efficient and, in some cases, lucrative. Now that I have your attention, let …