Article | Title | Author |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |
11 |
A Few Degrees off the Mark: Miniature Missteps that Can Render the Safe Harbors of the DMCA Inaccessible
abstract
full article
|
Nicole J. Nyman |
12 |
Pop Goes The Trademark? Competitive Advertising on the Internet
abstract
full article
|
Kendall Bodden |
10 |
When Small Technology is a Big Deal: Legal Issues Arising From Business Use of RFID
abstract
full article
|
D. Zachary Hostetter |
14 |
American and French Perspectives on Trademark Keying: The Courts Leave Businesses Searching for Answers
abstract
full article
|
Terrance J. Keenan |
185 |
Standardizing Warhol: Antitrust Liability for Denying the Authenticity of Artwork
abstract
full article
|
Gareth S. Lacy |
8 |
Follow that Car! Legal issues arising from installation of tracking devices in leased consumer goods and equipment
abstract
full article
|
Leah Altaras |
11 |
Enforcement of Contractual Terms in Clickwrap Agreements: Courts Refusing to Enforce Forum Selection and Binding Arbitration Clauses
abstract
full article
|
Rachel Cormier Anderson |
12 |
E-Contract Formation: U.S. and EU Perspective
abstract
full article
|
Sylvia Mercado Kierkegaard |
10 |
Applying the Americans with Disabilities Act to Private Websites after National Federation of the Blind v. Target
abstract
full article
|
Jeffrey Bashaw |
12 |
Electronic Pitfalls: The Online Modification of Ongoing Consumer Service Agreements
abstract
full article
|
Ben Casady |
13 |
The European Union's Data Retention Directive and the United States's Data Preservation Laws: Finding the Better Model
abstract
full article
|
Kristina Ringland |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
2 |
Oops! The Legal Consequences Of and Solutions To Online Pricing Errors
abstract
full article
|
Benjamin Groebner |
4 |
Not Child's Play: Compliance with the Children's Online Privacy Protection Rule
abstract
full article
|
Kristin Bryant |
1 |
Defining Spyware: Necessary or Dangerous
abstract
full article
|
Andrew T. Braff |
4 |
Bigger Fish, Deeper Pockets: Business Blogs, Defamation and the Communications Decency Act
abstract
full article
|
Emma Scanlan |
2 |
The Union Workplace Meets Big Brother: Advising clients on employer conduct with regard to hidden surveillance
abstract
full article
|
Jamila Asha Johnson |
1 |
Employee Internet Misuse: How Failing to Investigate Pornography May Lead To Tort Liability
abstract
full article
|
Jamila Johnson |
34 |
Everyone Wants to See the Entire History of You
abstract
full article
|
Caesar Kalinowski IV |
49 |
Blame it on the Machine: A Socio-Legal Analysis of Liability in an AI World
abstract
full article
|
Michael Callier and Harly Callier |
1 |
Repairing the Antibiotic Pipeline: Can the GAIN Act Do It?
abstract
full article
|
Caitlin Forsyth |
1 |
The Evolving Landscape of TCPA Consent Standards and Ways to Minimize Risk
abstract
full article
|
Misa K. Bretschneider |
1 |
Can Law Students Disrupt the Market for High-Priced Textbooks?
abstract
full article
|
Jane K. Winn |
13 |
Open Legal Educational Materials: The Frequently Asked Questions
abstract
full article
|
James Boyle & Jennifer Jenkins |
31 |
The Idea of the Casebook: Pedagogy, Prestige, and Trusty Platforms
abstract
full article
|
Joseph Scott Miller & Lydia Pallas Loren |
49 |
Self-Publishing an Electronic Casebook Benefited Our Readers—And Us
abstract
full article
|
Eric Goldman & Rebecca Tushnet |
3 |
Reach Out and Text Someone: How Text Message Spam May Be a Call Under the TCPA
abstract
full article
|
Daniel L. Hadjinian |
49 |
Communications Decency Act Provides No Safe Harbor Against Antifraud Liability or Hyperlinks to Third-Party Content Under the Securities and Exchange Act
abstract
full article
|
Sheri Wardwell |
67 |
Stevens v. Publicis: The Rise of "No E-Mail Modification" Clauses?
abstract
full article
|
Stephanie Holmes |
59 |
Fair Notice: Providing for Electronic Document Transmissions to Shareholders in Washington State
abstract
full article
|
James L. Proctor, Jr. |
1 |
Finding Safe Harbor: Navigating Washington's New Unfair Competition Law
abstract
full article
|
Daniel Shickich |
43 |
Technology, Travel Companies & Taxation: Should Expedia Be Required to Collect and Remit State Occupancy Taxes on Profits from Facilitating Hotel Room Rentals?
abstract
full article
|
Kerra J. Melvin |
5 |
Tax Implications of Using Out-of-State Computer Servers
abstract
full article
|
Paula K. Royalty |
6 |
Tangible Cash for an Intangible Loss? Insurance Coverage for Damage or Loss of Third-Party Data
abstract
full article
|
Kendall Bodden |
7 |
Risky Business: What Must Employers Do to Shield Against Liability for Employee Wrongdoings in the Internet Age?
abstract
full article
|
Nicole J. Nyman |
8 |
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
abstract
full article
|
Jembaa Cole |
7 |
Streamlined Sales and Use Tax Agreement: Is Your Business Ready for Compliance?
abstract
full article
|
Anthony D. Milewski Jr. |
5 |
Clicking Away the Competition: The Legal Ramifications of Click Fraud for Companies that Offer Pay Per Click Advertising Services
abstract
full article
|
Daniel L. Hadjinian |
5 |
"Can I See Some ID?" Age Verification Requirements for the Online Liquor Store
abstract
full article
|
Boris Reznikov |
9 |
Border Searches of Laptop Computers after United States v. Arnold: Implications for Traveling Professionals
abstract
full article
|
Cooper Offenbecher |
111 |
Outsider Hacking and Insider Trading: The Expansion of Liability Absent a Fiduciary Duty
abstract
full article
|
James A. Jones II |
77 |
Animal Healthcare Robots: The Case for Privacy Regulation
abstract
full article
|
Sulaf Al-Saif |
138 |
Transformative Variations: The Uses and Abuses of the Transformative Use Doctrine in Right of Publicity Law
abstract
full article
|
Matthew D. Bunker and Emily Erickson |
120 |
Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance
abstract
full article
|
Jonathan McGruer |
9 |
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
abstract
full article
|
Anita Ramasastry, Jane K. Winn and Peter Winn |
10 |
Safe Harbor Agreement - Boon or Bane?
abstract
full article
|
Sylvia Mercado Kierkegaard |