Could Democratic Control of the House Bring Back Net Neutrality?
February 15, 2019
The mismatch of localized electricity regulations with interstate electricity generation and transmission creates large inefficiencies. It is possible to solve this problem without overturning the entire existing regime by affording federal, state, and local regulatory bodies more power to implement battery technology without traditional regulatory hindrances. Given the limited number of regulatory bodies responsible for
Rich Pepper, Batteries and State Law: A Glimpse of the Future in the Lone Star State, 16 N.C. J.L. & Tech. On. 269 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Pepper_Final.pdf.
According to federal regulations, all students have a right to a free appropriate public education in the most integrated, least restrictive environment appropriate. Discrimination based upon disabilities is a violation of civil rights. An estimated 10.2 million children in the United States have special healthcare needs, accounting for 13.9% of all children. Some students who
Cameron Neal, When Five Hours Equals Five Days: Bringing Section 504 Education Plans Into the 21st Century, 16 N.C. J.L. & Tech. On. 235 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Neal_Final-1.pdf.
Under the Supreme Court’s Fourth Amendment jurisprudence, the constitutional privacy protections that many Americans take for granted are non-existent in cyberspace because of the third-party doctrine, which was born decades before the popular adoption of cyberspace social networks and data storage services. When someone in America posts a picture on Instagram or updates a status
Adam Maas, Instasearch: Fixing Fourth Amendment Jurisprudence as Applied to Instagram and Other Cyber Storage Providers, 16 N.C. J.L. & Tech. On. 202 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Maas_Final.pdf.
The United States government was granted a wide berth of surveillance powers post 9/11. At a time when Americans felt vulnerable to foreign attack, the executive branch passed the USA PATRIOT Act that balanced a reduction of privacy rights with a promise of increased national security. Twelve years later, Edward Snowden released documents showing exactly
Jason Green, Railing Against Cyber Imperialism: Discussing the Issues Surrounding the Pending Appeal of United States v. Microsoft Corp. 16 N.C. J.L. & Tech. On. 172 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Green_Final.pdf.
If the legal profession had been able to foresee in the late 1990s and early 2000s, prior to the meteoric rise and ensuing cultural ubiquity of social media, that every tagged spring break photo, 2:00 a.m. status update, and furious wall post would one day be vulnerable to potential exposure in the cold, unforgiving light
Peter Segrist, How the Rise of Big Data and Predictive Analytics are Changing the Attorney's Duty of Competence, 16 N.C. J.L. & Tech. 527 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Segrist_Final.pdf.
This article re-examines and revises observations made in the author’s 2009 article, Googlestroika: Privatizing Privacy. 1 Specifically, it looks to the contractual obligations and practical considerations that define how users interact not only with Google, but also with social network websites and other online service providers. Consideration is given to how an individual leaves a
Karl T. Muth, Googlestroika: Five Years Later, 16 N.C. J.L & Tech. 487 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Muth_Final.pdf.
Designing and implementing a cybersecurity legal policy is an ambitious endeavor. This Article offers primary guidelines focusing on the national level, and uses Israel’s newly created National Cyber Bureau as a case in point. Additionally, this Article offers a cross-section comparison between the national cybersecurity policies of the United States, the United Kingdom, Canada, Japan,
Daniel Benoliel, Towards a Cybersecurity Policy Model: Israel National Cyber Bureau Case Study, 16 N.C. J.L. & Tech. 435 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Benoliel_Final.pdf.
In an age when people’s lives are constantly tracked, recorded, analyzed, and shared by private parties, the Third-Party Doctrine, which holds that “information knowingly exposed to private parties is unprotected by the Fourth Amendment,” now threatens to swallow whole the privacy guaranteed by the Fourth Amendment. This Article suggests courts adopt the Klayman v. Obama
Brad Turner, When Big Data Meets Big Brother: Why Courts Should Apply United States v. Jones to Protect People's Data 16 N.C. J.L. & Tech. 377 (2015), available at http://ncjolt.org/wp-content/uploads/2015/01/Turner_Final.pdf
This Article examines the legal status of the right to communicate political and social ideas and criticism anonymously online. As an inherently borderless platform for communication, the Internet has generated new methods for sharing information on issues of public importance among citizens who may be thousands of miles apart. Yet governments around the world continue
Jason A. Martin and Anthony L. Fargo, Anonymity as a Legal Right: Where and Why It Matters 16 N.C. J.L. & Tech. 311 (2015), available at http://ncjolt.org/wp-content/uploads/2015/01/Martin-_-Fargo_Final.pdf
“Till death do us part”—is a phrase that probably represents the wish of most married couples. However, statistically speaking, almost half of all marriages end in divorce. A sizable number of divorces involve the parameter of violence. Behind the figures, there are always human beings, the victims of violence, who endure suffering, fear, and palpable
Dafni Lavi, Till Death Do Us Part?!: Online Mediation as an Answer to Divorce Cases Involving Violence 16 N.C. J.L. & Tech. 253 (2015), available at http://ncjolt.org/wp-content/uploads/2015/01/Lavi_Final.pdf
The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at eic.ncjolt@gmail.com with permissions inquiries.