04 February 2013

Virtual or Reality: Prosecutorial Practices in Cyber Child Pornography Ring Cases by Michal Gilad University of Richmond Journal of Law and Technology

Introduction: [1] With the rising use of the Internet over the past decade, the boundaries between our physical space and cyberspace are quickly fading. The Internet has become an integral and inseparable part of modern being, and its dominance in our lives is undeniable. Actions taken online are no longer a mere virtual fantasy, but directly relate to our "offline" everyday living. Modern criminal trends also demonstrate the strong link between the virtual and physical worlds.

Read full article

28 January 2013

Is the U.S. Government's Internet Policy Broken?: A Review of Captive Audience by Susan Crawford: Review by Robert W. Hahn & Hal J. Singer [Georgetown McDonough School of Business Research Paper] Social Science Research Network

Abstract: Professor Susan Crawford has just published an exciting new book on the future of high-speed Internet access in America. To hear Crawford tell it in 270 pages (excluding the copious footnotes), Americans should be worried because most of them will not have access to the fastest lane on the information superhighway. Indeed, only the rich will likely purchase high-speed Internet access because it will be too expensive for the rest of us.

Read full article

24 January 2013

Law and the Open Internet by Adam Candeub and Daniel McCartney Federal Communications Law Journal

The FCC has issued a new set of Internet access regulations and policies, which would prohibit broadband service providers like AT&T or Comcast from discriminating against unaffiliated content providers.

Read full article

21 January 2013

Copyright Fraud in the Internet Age: Copyright Management Information for Non-Digital Works Under the Digital Millennium Copyright Act by Russell W. Jacobs Columbia Science and Technology Law Review

Abstract: With the advent of the digital age, authors of creative works enjoy the benefits of quickly and inexpensively distributing their works to global audiences. These developments have unfortunately led to the negative consequence that pirated, unauthorized, or altered copies reach potential users before the creator of the work releases the authentic version according to his or her terms. The Digital Millennium Copyright Act of 1998 sought to address some of these concerns by punishing circumventions of technologies controlling access to copyrighted works and by protecting "copyright management information," i.e. the data identifying the author and the terms of use of a copyrighted work.

Read full article

15 January 2013

Comparative analysis of national cybersecurity strategies - Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies OECD

This report analyses the latest generation of "national cybersecurity strategies" in ten countries and identifies commonalities and differences.

Read full article

12 January 2013

Smartphone Wars by John Atallah Stanford Technology Law Review

Apple sues Samsung for patent infringement. In response, Samsung files international countersuits on patents of its own. Courts around the world grant preliminary injunctions to each company on a number of their claims, while United States and European Union government agencies investigate allegations of antitrust violations. What's going on here? Let's start with the shiny new weapon that Apple added to its arsenal in June of last year: a patent on the original iPhone, the paperwork for which had been in the works since December of 2007. That patent claims, among other things, the finger-gesture-based set of input methods that has become integral to the functionality of today's smartphones. Enter Samsung, now the world's largest manufacturer of smartphones and owner of numerous patents covering globally standardized technological protocols. Samsung's use of those input methods, as well as overlaps in product design, in its line of Android-based devices has put it squarely in Apple's crosshairs.

Read full article

05 January 2013

Privacy Problems in the Online World by Virgilio A.F. Almeida, Federal University of Minas Gerais Internet Computing Magazine

Modern technology's benefits have accelerated our migration to social networking and other online activities. However, the confluence of the online world and life offline is imperfect, immature, and incomplete. People's habits, customs, and relationships are going through profound changes that will have as-yet-unknown effects on them and society as a whole.

Read full article

02 January 2013

Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS by Ingo Take Wiley

Abstract: How to generate legitimate forms of governance beyond the nation state is often considered a central question in contemporary world politics. To proceed in theory-building, scholars need to systematically assign the theory-driven assumptions on legitimate forms of governance beyond the nation state with the various, already observable, forms of global governance.

Read full article

31 December 2012

China's Proposed Personal Information Protection Act by Graham Greenleaf [Privacy Laws & Business International Newsletter] Social Science Research Network

Abstract: From 2005-7 a group of experts led by Professor Zhou Hanhua, the director of the Institute of Law at the Chinese Academy of Social Sciences, were commissioned by the Peoples Republic of China government to draft a national data protection law to be considered by the Informatics Committee of the State Council. However, by 2008 the draft had still not progressed through any of the various Chinese legislative channels.

Read full article

26 December 2012

The Relationship Between the ISP Safe Harbors and Liability for Inducement by R. Anthony Reese Stanford Technology Law Review

The extent to which online service providers can be held liable for copyright infringement committed by users of their services is one of the more complicated and contentious copyright issues of our day. Courts have struggled with how to apply common-law doctrines of secondary liability to online activity.

Read full article

14 December 2012

Google Versus the Law: Google's Legal Adventures and Their Impact to the Evolution of European Information Law by Tatiana Synodinou Social Science Research Network

Abstract: This paper provides an overview of the major legal questions which emerge from Google' dynamic presence in the Web. It is divided in four parts. The first part deals with the privacy implications which are born by Google's various activities, primarily by its main function as a search engine, but also by more sophisticated tools, such as the Google Street View service.

Read full article

09 December 2012

Internet regulation: The need for more transparent Internet filtering systems and improved measurement of public opinion on Internet filtering by Nikolaos Koumartzis & Andreas Veglis First Monday

Abstract: All around the world, the phenomenon of Internet regulation is on the rise as more and more countries implement such policies, from Asian authoritarian regimes to Western democracies. At the same time, the great majority of Internet users are not aware that they access a filtered version of World Wide Web due to the "non-transparent" policy of many governments, something that results to a very dangerous precedent for the future of the Internet.

Read full article

02 December 2012

Patterns of Legalisation in the Internet: Do We Need a Constitutional Theory for Internet Law? by Osvaldo Saldías [Humboldt-Universitat Zu Berlin Internet & Society Working Paper] Social Science Research Network

Abstract: The paper acknowledges a growing web of legal norms that regulate governance aspects of the Internet. Some of these norms are legally binding; others are closer to what some scholars call soft law. In order to take stock of these developments, I propose an explorative typology that can bring some systematic order into the plurality of Internet norms.

Read full article

25 November 2012

Emerging Issues in Internet Regulation: The Unstable Role of Wikileaks and Cyber-Vigilantism by Alison Powell [Research Handbook on Internet Governance] Social Science Research Network

Abstract:This paper outlines the emerging issues in internet regulation introduced by distributed organizations and cyber-vigilantism: notably, the contributions of WikiLeaks and Anonymous to the problematics of internet governance through an uneven disruption of the power held by existing institutions including the state, but also the mass media. Drawing on Christopher Kelty's (2004) observation that persuasive arguments can be made both through language and by technology, it examines how existing definitions of governance, which are often focused on rule-making, engage with this broader set of 'arguments-by-technology' and what the consequences of these new arguments might be.

Read full article

19 November 2012

Empirical Study of Privacy Issues among Social Networking Sites by Joanne Kuzma Journal of International Commercial Law and Technology

Abstract: Social media networks are increasing their types of services and the numbers of users are rapidly growing. However, online consumers have expressed concerns about their personal privacy protection and recent news articles have shown many privacy breaches and unannounced changes to privacy policies.

Read full article

11 November 2012

Building a Better Internet in Latin America and the Caribbean

From the beginning, a key element of the Internet's success has been collaboration between its engineers, researchers, network operators, vendors, and service providers.

Read full article

09 November 2012

It's a Mad, Mad Internet: Globalisation and the Challenges Presented by Internet Censorship by Jessica E. Bauml Federal Communications Law Journal

The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China -- home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws.

Read full article

03 November 2012

Internet traffic exchange: 2 billion users and it's done on a handshake by Rudolf Van der Berg of the OECD's Science, Technology and Industry Directorate OECD

Every day one Exabyte of data is said to travel over the Internet - enough data to fill 300,000 of the world's biggest hard disks or 212 million DVDs. And astonishingly, according to Internet Traffic Exchange: Market Developments and Policy Challenges a new OECD report on Internet traffic exchange, most of the thousands of networks that exchange this traffic do so without a written contract or formal agreement.

Read full article

21 October 2012

The Right to Be Forgotten? by Conrad Coutinho Columbia Science and Technology Law Review

Have you ever Googled your own name? Statistics say that you probably have. Egotism aside, in a world where potential employers, schools and even romantic partners are likely to Google you, it would be irresponsible not to be aware of what pops up when you search your name. Many experts (and this non-expert) even recommend setting up a Google alert in your name.

Read full article

14 October 2012

Fixed and Mobile Networks: Substitution, Complementarity and Convergence OECD

This report examines the convergence of fixed and mobile (wireless) networks and services. It considers these developments against a long standing question of whether they are complementary or competitive. The report concludes that they are both. Mobile providers have garnered a very large share of traditional services, such as telephony, over the past decade.

Read full article

11 October 2012

Don't Be Evil: The Fourth Amendment in the Age of Google, National Security, and Digital Papers and Effects Albany Law Journal

Abstract: This Article offers an overview of current Fourth Amendment law in light of evolving concepts of papers and effects, expectations of privacy online, and the third party and state action doctrines. Scholars have addressed some of these issues individually, but this Article analyzes the legal issues that subsist in the wake of the NSA Terrorist Surveillance Program dilemma and during Congress' current push to update the Electronic Communications Privacy Act.

Read full article

08 October 2012

Personal Jurisdiction, Internet Commerce and Privacy: The Pervasive Legal Consequences of Modern Geolocation Technologies Albany Law Journal

Abstract: Modern geolocation technologies allow Internet sites to automatically and accurately identify a user's geographic location. This capability -- unavailable just a few years ago -- has begun to revolutionize Internet commerce and communication by enabling content localization, customization, and access regulation on a scale previously thought to be impossible. Yet thus far, the law has reacted inadequately to these technologies, or in some cases, failed to react at all.

Read full article

01 October 2012

Freedom of Expression on the Internet: Study of Legal Provisions and Practices Related to Freedom of Expression, the Free Flow of Information and Media Pluralism on the Internet in OSCE Participating States by Yaman Akdeniz [Report of the OSCE Represen... Social Science Research Network

Abstract: Based on the limited effectiveness of state laws and lack of harmonization at international level (despite some efforts at regional level) a number of states, including some in the OSCE region, introduced policies to block access to Internet content, websites deemed illegal, and Web 2.0 based social media platforms which are outside their jurisdiction. In short, the new trend in Internet regulation seems to entail blocking access to content if state authorities are not in a position to reach the perpetrators for prosecution or if their request for removal or take down of such content is rejected or ignored by foreign law enforcement authorities or hosting and content providers.

Read full article

27 September 2012

The French Revolution 2.0: Copyright and the Three Strikes Policy by Eldar Haber Harvard Journal of Sports & Entertainment Law

Abstract: Internet file-sharing of copyrighted materials created a struggle between right holders, Internet Service Providers (ISPs), and file-sharers. After several different attempts to resolve the struggle, many countries began to debate the possibility of a Three Strikes Policy (3SP), which includes, inter alia, providing for the termination of subscriptions and accounts of repeat infringers in appropriate circumstances. This policy has thus far been implemented by way of legislation in Taiwan (2009), South Korea (2009), France (2010), the United Kingdom (2010) and New Zealand (2011), and by means of private ordering in Ireland (2010). It is still under consideration elsewhere. The 3SP is portrayed as a panacea for Internet-related infringements.

Read full article

24 September 2012

A Prehistory of Internet Governance by Malte Ziewitz & Ian Brown [Research Handbook on Governance of the Internet] Social Science Research Network

Abstract: What social, technical, economic and political developments played a role in constituting a field, in which the idea of 'Internet Governance' could thrive? What are the events, stories and ideas that preceded and made possible today's discussions about governance on, of and through the Internet?

Read full article

Registrar Solutions