Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Braxton Johnson, Alex Dewsnup Apr 2023

Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Braxton Johnson, Alex Dewsnup

Brigham Young University Prelaw Review

During the era of the novel coronavirus SARS-CoV-2, social media sites have justified removing inflammatory opinions pertaining to COVID-19 in attempts to protect and promote public health and safety by automatically categorizing such opinions as misinformation. While the intention of such censorship is noble, it raises the question of whether social media sites and internet service providers in general have too much power when it comes to controlling information. In an age where social media has become intrinsic to the dissemination and formation of opinion, the free exchange of ideas on the Internet is of prime importance, and any threat …


Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Sarah Cheng, Harriet Norcross Apr 2021

Internet Censorship In The Time Of A Global Pandemic: A Proposal For Revisions To Section 230 Of The Communications Decency Act, Sarah Cheng, Harriet Norcross

Brigham Young University Prelaw Review

During the era of the novel coronavirus SARS-CoV-2, social media sites have justified removing inflammatory opinions pertaining to COVID-19 in attempts to protect and promote public health and safety by automatically categorizing such opinions as misinformation. While the intention of such censorship is noble, it raises the question of whether social media sites and internet service providers in general have too much power when it comes to controlling information. In an age where social media has become intrinsic to the dissemination and formation of opinion, the free exchange of ideas on the Internet is of prime importance, and any threat …


'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino Sep 2014

'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino

Laurie B. Serafino

Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …


Chasing Bits Across Borders, Patricia L. Bellia Oct 2013

Chasing Bits Across Borders, Patricia L. Bellia

Patricia L. Bellia

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Oct 2013

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Patricia L. Bellia

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Oct 2013

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Patricia L. Bellia

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino Aug 2013

“Them Feds Don’T Play Fair” : The Fourth Amendment And Cloud-Based Data, Laurie B. Serafino

Laurie B. Serafino

Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …


Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel Oct 2012

Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel

Pepperdine Law Review

No abstract provided.


Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Richmond Journal of Law & Technology

Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).


To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers Jan 2011

To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers

LLM Theses and Essays

This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.


P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento Aug 2009

P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento

Assaf Jacob

This paper explores the legal ramifications of the prevalent Internet Service Provider practice of providing caching services to P2P network users. First, the paper describes the P2P industry, its benefits and drawbacks. Then the paper discusses several caching techniques that can be implemented, and indeed are implemented, by ISPs around the globe. These practices allow ISPs to provide clients with better services but, by the same token, expose them to copyright infringement suits by third parties. The article will discuss how copyright law should consider the costs and benefits to the public of P2P caching practices, especially in the application …


Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden Aug 2009

Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden

Rob Frieden

Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …


Navigating The Safe Harbor Rule: The Need For A Dmca Compass, Tiffany N. Beaty Jan 2009

Navigating The Safe Harbor Rule: The Need For A Dmca Compass, Tiffany N. Beaty

Marquette Intellectual Property Law Review

The internet is a medium for more than just email and web browsing. Today, many internet users utilize the internet to access and share music, movies, and other types of media. Copyright law has attempted to keep up with the dynamic nature of the internet; however, this Comment posits it has only been marginally successful. The author examines whether the Safe Harbor Rule of the Digital Millennium Copyright Act (DCMA) is sufficient in balancing the need to protect copyright owners against the need for Internet Service Providers to be protected from third-party user suits. In doing so, the author concludes …


How “Choruss” Can Turn Into A Cacophony: The Record Industry’S Stranglehold On The Future Of Music Business, Andrey Spektor Jan 2009

How “Choruss” Can Turn Into A Cacophony: The Record Industry’S Stranglehold On The Future Of Music Business, Andrey Spektor

Richmond Journal of Law & Technology

A sixty year-old man is delighted when his son shows him how to use Pandora—an interactive, hip Internet radio site that puts the listener in control. Having grown up a huge Louis Armstrong fan, the man quickly selects the jazz singer as one of his “stations.” When listening to this station, Pandora will only play songs by Armstrong and other similar artists for him. When he hears Armstrong’s classic, “What a Wonderful World,” the man immediately clicks the “Thumbs Up” icon, indicating his approval of Pandora’s recommendation. Pandora’s recommendations are drawn from its “Music Genome Project,” a database of song …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia Dec 2007

Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Jan 2007

The Fourth Amendment Status Of Stored E-Mail: The Law Professors' Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Journal Articles

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia Dec 2006

The Fourth Amendment Status Of Stored E-Mail: The Law Professors’ Brief In Warshak V. United States, Susan Freiwald, Patricia L. Bellia

Susan Freiwald

This paper contains the law professors' brief in the landmark case of Warshak v. United States, the first federal appellate case to recognize a reasonable expectation of privacy in electronic mail stored with an Internet Service Provider (ISP). While the 6th circuit's opinion was subsequently vacated and reheard en banc, the panel decision will remain extremely significant for its requirement that law enforcement agents must generally acquire a warrant before compelling an ISP to disclose its subscriber's stored e-mails. The law professors' brief, co-authored by Susan Freiwald (University of San Francisco) and Patricia L. Bellia (Notre Dame) and signed by …


Twenty-First Century Pillow-Talk: Applicability Of The Marital Communications Privilege To Electronic Mail, Mikah K. Thompson Jan 2006

Twenty-First Century Pillow-Talk: Applicability Of The Marital Communications Privilege To Electronic Mail, Mikah K. Thompson

Faculty Works

The marital privilege has two parts: the testimonial privilege and the communications privilege. Originally, the testimonial privilege prevented one spouse from testifying against another. According to the United States Supreme Court, spousal disqualification sprang from two canons of medieval jurisprudence: first, the rule that an accused was not permitted to testify in his own behalf because of his interest in the proceeding; second, the concept that husband and wife were one, and that since the woman had no recognized separate legal existence, the husband was that one. Thus, if a husband were not permitted to testify, then his wife, as …


Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett Jan 2002

Fbi Internet Surveillance: The Need For A Natural Rights Application Of The Fourth Amendment To Insure Internet Privacy, Catherine M. Barrett

Richmond Journal of Law & Technology

Last year, the Federal Bureau of Investigation (“FBI”) acknowledged that it used an Internet electronic surveillance system called Carnivore to investigate and prosecute criminal suspects in more than two dozen cases. Carnivore is a software program developed by the FBI that can be installed on the network of an Internet Service Provider (“ISP”), such as America Online, to monitor, intercept and collect e-mail messages and other Internet activity made and received by individuals suspected of criminal activity. To date, the full capability of Carnivore remains a secret—the FBI refuses to disclose the source code (computer language) that would reveal how …


Chasing Bits Across Borders, Patricia L. Bellia Jan 2001

Chasing Bits Across Borders, Patricia L. Bellia

Journal Articles

As computer crime becomes more widespread, countries increasingly confront difficulties in securing evidence stored in electronic form outside of their borders. These difficulties have prompted two related responses. Some states have asserted a broad power to conduct remote cross-border searches - that is, to use computers within their territory to access and examine data physically stored outside of their territory. Other states have pressed for recognition of a remote cross-border search power in international fora, arguing that such a power is an essential weapon in efforts to combat computer crime. This Article explores these state responses and develops a framework …


Proactive Legislation And The First Amendment, Stuart Minor Benjamin Nov 2000

Proactive Legislation And The First Amendment, Stuart Minor Benjamin

Michigan Law Review

It is a commonplace that the world is changing rapidly, with whole sectors of the economy being transformed. New forms of communication, like the World Wide Web, e-mail, and satellite television, have risen from obscurity to ubiquity in less than a decade. The speed of these changes has led some to express concern about the ability of governments to respond. The fear is that governments cannot keep up with developments as they occur and thus get hopelessly behind. The solution, according to some, is for the government to act proactively - before a harm has arisen, so that the government …


A Nice Place To Visit But I Wouldn't Want To Litigate There: The Effects Of Cybersell V. Cybersell On The Law Of Personal Jurisdiction, W. David Falcon Jr. Jan 1999

A Nice Place To Visit But I Wouldn't Want To Litigate There: The Effects Of Cybersell V. Cybersell On The Law Of Personal Jurisdiction, W. David Falcon Jr.

Richmond Journal of Law & Technology

In a world divided by barriers of language and culture, the Internet is the nexus that connects the most rural outposts of technology to the global business centers. The Internet's most popular user interface, the World Wide Web, is an interwoven network of computers through which news and information can traverse international barriers in a matter of seconds. Using an Internet Service Provider ("ISP") and a personal computer, the average user can access the World Wide Web and enter the largest repository of public information on the planet. The boundaries are virtually limitless, and the general absence of content restrictions …


Net Law: How Lawyers Use The Internet, G. Wingate Grant Jan 1997

Net Law: How Lawyers Use The Internet, G. Wingate Grant

Richmond Journal of Law & Technology

We have all had experiences where we listened to a preacher or maybe a law professor use a story to illustrate a point. Weeks later, we might not recall the point, but we remember the story. That was my feeling after reading through NET LAW: HOW LAWYERS USE THE INTERNET. This book might be considered a dictionary, a marketing book, or a computer book. Most significantly, it is an anthology of actual accounts of lawyers and their staffs successfully using the Internet to make their practices more efficient and, in some cases, lucrative. Now that I have your attention, let …