Article | Title | Author |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
11 |
Wait! Don’t fire that blogger! What Limits Does Labor Law Impose on Employer Regulation of Employee Blogs?
abstract
full article
|
Carson Strege-Flora |
12 |
The Fight to Save America’s Inbox: State Legislation and Litigation in the Wake of CAN-SPAM
abstract
full article
|
Emma Scanlan |
9 |
Data Privacy and Breach Reporting: Compliance with Varying State Laws
abstract
full article
|
G. Martin Bingisser |
11 |
Standardization in the European Information and Technology Sector: Official Procedures on the Verge of Being Overhauled
abstract
full article
|
Patrick Van Eecke & Maarten Truyens |
295 |
Internet as a Human Right: A Practical Legal Framework to Address the Unique Nature of the Medium and to Promote Development
abstract
full article
|
Young Joon Lim and Sarah E. Sexton |
133 |
The Internet and the Constitution: A Selective Retrospective
abstract
full article
|
M. Margaret McKeown |
275 |
Robots Welcome? Ethical and Legal Considerations for Web Crawling and Scraping
abstract
full article
|
Zachary Gold and Mark Latonero |
160 |
Harlem Shake Meets the Chevron Two Step: Net Neutrality Following Mozilla v. FCC
abstract
full article
|
Christopher Terry & Scott Memmel |
200 |
Pseudo-Gambling and Whaling: How Loot Boxes Prey on Vulnerable Populations and How to Curtail Future Predatory Behavior
abstract
full article
|
Alexander Mann |
247 |
U.S.-UK Executive Agreement: Case Study of Incidental Collection of Data Under the CLOUD Act
abstract
full article
|
Eddie B. Kim |
227 |
When Is a YouTube Video a "True Threat"?
abstract
full article
|
Pedro Celis |
221 |
The Code-Based Interpretation of Authorization: An Incomplete Picture
abstract
full article
|
Nicholas R. Ulrich |
237 |
Radio Revolution: The Local Community Radio Act’s Expansion of Possibilities for Low-Power FM Stations
abstract
full article
|
Jeffrey M. Echert |
197 |
The Limits of the Freedom Act's Amicus Curiae
abstract
full article
|
Chad Squitieri |
217 |
How Machines Learn: Where do Companies get Data for Machine Learning and What Licenses do They Need?
abstract
full article
|
Rachel Wilka, Rachel Landy, and Scott A. McKinney |
245 |
Fair Use, Fair Play: Video Game Performances and “Let’s Plays” as Transformative Use
abstract
full article
|
Dan Hagen |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
full article
|
Megan Haslach |
63 |
Real-Time Sports Data and the First Amendment
abstract
full article
|
Ryan M. Rodenberg, John T. Holden & Asa D. Brown |
109 |
Bio-property Contracts in a New Ecosystem: Genetic Resources Access and Benefit Sharing
abstract
full article
|
Mariko Kageyama |
201 |
The State Department Can Gun Down 3-D Printed Firearms
abstract
full article
|
Derk Westermeyer |
103 |
Science and Privacy: Data Protection Laws and Their Impact on Research
abstract
full article
|
Mike Hintze |
74 |
Public Performance? How Let's Plays and Livestreams May Be Escaping the Reach of Traditional Copyright Law
abstract
full article
|
Brianna K. Loder |
10 |
MySpace or Yours? The Impact of the MySpace-Attorneys General Agreement on Online Businesses
abstract
full article
|
Chelsea Peters |
143 |
Location Surveillance by GPS: Balancing an Employer’s Business Interest with Employee Privacy
abstract
full article
|
Kendra Rosenberg |
75 |
Ninth Circuit Unmasks Anonymous Internet Users and Lowers the Bar for Disclosure of Online Speakers
abstract
full article
|
Mallory Allen |
93 |
Juror Investigation: Is In-Courtroom Internet Research Going Too Far?
abstract
full article
|
Duncan Stark |
107 |
Social Media Policies for Character and Fitness Evaluations
abstract
full article
|
Jessica Belle |
115 |
Can You Hear Me Now? The Race to Provide America with Universal, High-Speed Wireless Coverage
abstract
full article
|
Dina Neda Rezvani |
1 |
When is a Phone Call Not a Phone Call? Legal Issues Arising From Business Use of VoIP
abstract
full article
|
Paula K. Royalty |
3 |
CAN Law Firms SPAM?
abstract
full article
|
Kevin Michael |
4 |
Don't Send that E-Mail to a Minor!: Compliance with State Child Protection Registry Statutes
abstract
full article
|
Laura Dunlop |
2 |
Don't Bet on it: How Complying with Federal Internet Gambling Law is not Enough
abstract
full article
|
Jennifer W. Chiang |
3 |
De-Identified Data and Third Party Data Mining: The Risk of Re-Identification of Personal Information
abstract
full article
|
C. Christine Porter |
4 |
Whole Foods, Unwholesome Practices: Will Sock Puppeteers be Held Accountable for Pseudonymous Web Postings?
abstract
full article
|
Chelsea Peters |
49 |
Law at the Speed of Dial Up: The Need for a Clear Standard for Employee Use of Employer-Provided Email Systems that Will Withstand Changing Technology
abstract
full article
|
Jeffrey S. Bosley & Taylor Ball |
69 |
Why the Renewable Energy Credit Market Needs Standardization
abstract
full article
|
Lisa Koperski |
1 |
Featurization and the Myth of Data Empowerment
abstract
full article
|
Nur Lalji |
36 |
Censtorshp, Free Speech & Facebook: Applying the First Amendment to Social Media Platforms via the Public Function Exception
abstract
full article
|
Matthew Hooker |
51 |
Spying on Americans: At What Point Does The NSA’s Collection and Searching of Metadata Violate The Fourth Amendment?
abstract
full article
|
Elizabeth Atkins |
61 |
Equitable Recovery for Ashley Madison Hack Victims: The Federal Trade Commission as Executor of a Narrow Right to be Forgotten in the United States
abstract
full article
|
Mackenzie Olson |
77 |
How the Washington State Supreme Court Wrongly Applied the Communications Decency Act in Village Voice, and What it Means for Internet Service Providers
abstract
full article
|
Samuel Daheim |
95 |
Privacy Harmonization and the Developing World: The Impact of the EU’s General Data Protection Regulation on Developing Economies
abstract
full article
|
Tiffany Curtiss |
1 |
Neighborhood Watch 2.0: private Surveillance and the Internet of Things
abstract
full article
|
Daniel Healow |
27 |
The Drone Wars: The Need for Federal Protection of Individual Privacy
abstract
full article
|
Toban Platt |
5 |
Does the U.S. SAFE WEB Act Strike the Proper Balance Between Law Enforcement Interests and Privacy Interests?
abstract
full article
|
Shaobin Zhu |
33 |
Mobile Marketing Derailed: How Curbing Cell-Phone Spam in Satterfield v. Simon & Schuster May Have Banned Text-Message Advertising
abstract
full article
|
Gareth S. Lacy |
83 |
Trusting the Machines: New York State Bar Ethics Opinion Allows Attorneys to Use Gmail
abstract
full article
|
Kevin Raudebaugh |
1 |
Broadcasting Expectations: An Unprotected Wireless Network Takes on Constitutional Dimensions
abstract
full article
|
Duncan Stark |
35 |
Medical Advances, Criminal Disadvantages: The Tension Between Contemporary Antiretroviral Therapy and Criminal HIV Exposure Laws in the Workplace
abstract
full article
|
Chelsey Heindel |
53 |
A First Amendment Defense to the Federal Cyberstalking Statute in the Age of Twitter
abstract
full article
|
Christopher Young |
5 |
The FACT Act of 2003: Securing Personal Information In an Age of Identity Theft
abstract
full article
|
Terrance J. Keenan |
6 |
Liability Under the Americans with Disabilities Act for Private Web Site Operators
abstract
full article
|
Evgenia Fkiaras |
8 |
Proposed Federal Definition of "Internet Job Applicant" Suggests Need for Revised Human Resource Policies
abstract
full article
|
Strege-Flora |
6 |
Age Verification as a Shield for Minors on the Internet: A Quixotic Search?
abstract
full article
|
Francoise Gilbert |
7 |
Federal Tax Consequences of Virtual World Transactions
abstract
full article
|
Martin Bingisser |
8 |
Ethical Duties to Prospective Clients Who Send Unsolicited Emails
abstract
full article
|
Nicole Lindquist |
125 |
Consignment Catastrophes: Lessons from New York’s Art Gallery Fraud
abstract
|