Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Case Western Reserve University School of Law (3)
- Fordham Law School (3)
- Schulich School of Law, Dalhousie University (3)
- UC Law SF (3)
- UIC School of Law (3)
-
- American University Washington College of Law (2)
- Northwestern Pritzker School of Law (2)
- Santa Clara Law (2)
- University of Michigan Law School (2)
- Chicago-Kent College of Law (1)
- Loyola University Chicago, School of Law (1)
- Marquette University Law School (1)
- University at Buffalo School of Law (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- Keyword
-
- Privacy (2)
- Access to justice (1)
- Anonymity (1)
- Apca (1)
- Applicability of human rights law (1)
-
- Arthur Andersen (1)
- COSO (1)
- Caremark (1)
- Caremark International Inc. Derivative Litigation (1)
- Censorship (1)
- China (1)
- Committee of Sponsoring Organizations (1)
- Contributory (1)
- Copryight enforcement (1)
- Copyright Alert System (1)
- Copyright infringement (1)
- Copyright law (1)
- Cybersquatting (1)
- Digital Millennium Copyright Act (1)
- Eastern District of Texas (1)
- Eircom (1)
- Enron (1)
- Facebook (1)
- File sharing (1)
- Finding Hidden RIO (1)
- Forum shopping (1)
- Freedom of Expression (1)
- Freedom of expression (1)
- Geographic locations (1)
- Geolocations (1)
- Publication
-
- Canadian Journal of Law and Technology (3)
- Fordham Intellectual Property, Media and Entertainment Law Journal (3)
- Journal of Law, Technology, & the Internet (3)
- UC Law SF Communications and Entertainment Journal (3)
- UIC Review of Intellectual Property Law (3)
-
- Intellectual Property Brief (2)
- Northwestern Journal of Technology and Intellectual Property (2)
- Santa Clara High Technology Law Journal (2)
- Buffalo Intellectual Property Law Journal (1)
- Chicago-Kent Journal of Intellectual Property (1)
- Loyola University Chicago Law Journal (1)
- Marquette Intellectual Property Law Review (1)
- Michigan Journal of International Law (1)
- Michigan Telecommunications & Technology Law Review (1)
- Richmond Journal of Law & Technology (1)
- Washington Journal of Law, Technology & Arts (1)
Articles 1 - 29 of 29
Full-Text Articles in Entire DC Network
Pretending Without A License: Intellectual Property And Gender Implications In Online Games, Casey Fiesler
Pretending Without A License: Intellectual Property And Gender Implications In Online Games, Casey Fiesler
Buffalo Intellectual Property Law Journal
No abstract provided.
Hero With A Thousand Copyright Violations: Modern Myth And An Argument For Universally Transformative Fan Fiction, Natalie H. Montano
Hero With A Thousand Copyright Violations: Modern Myth And An Argument For Universally Transformative Fan Fiction, Natalie H. Montano
Northwestern Journal of Technology and Intellectual Property
Copyright law is designed to protect the ownership and financial rights of the original author of a literary work. However, the internet has created new opportunities for amateur writers to create their own fan fiction based on such literary works. Borrowing from the ideas and characters of a work, fan fiction authors build upon and re-imagine these stories. Such fan works should be protected under the Fair Use Defense, but the power imbalance between amateur fan fiction authors and successful published authors often leads to the eradication of fan stories from the public domain.
This Comment argues that fan fiction …
Heavyweight Bots In The Clouds: The Wrong Incentives And Poorly Crafted Balances That Lead To The Blocking Of Information Online, Anjanette H. Raymond
Heavyweight Bots In The Clouds: The Wrong Incentives And Poorly Crafted Balances That Lead To The Blocking Of Information Online, Anjanette H. Raymond
Northwestern Journal of Technology and Intellectual Property
The United States and the European Union have long recognized the need to protect ISPs from potential liability from customers using their services to infringe intellectual property rights. These protections arise from a long-standing belief that intellectual property right holders should bear the burden of protecting their property, even in the quick moving Internet environment. However, a recent series of cases has called into question the ISPs’ liability protections as their technology is often the only real means to prevent wide scale infringing activity. This series has caused courts to revisit ISPs’ liability and to impose a ‘cooperative burden’ requiring …
Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie
Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie
Canadian Journal of Law and Technology
It is a challenge to simply state the law about social media, because there is no such thing as “social media law.” Rather, the law bumps up against social media in many ways. In some cases, existing law can be seamlessly applied to new technologies and means of interaction. In other cases, entirely new paradigms will likely need to be adopted to handle new challenges. Many other cases will fall somewhere in between.
Our goal in this Law Simply Stated is to provide some background on the nature of social media themselves, and then to state the basic law in …
Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell
Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell
Canadian Journal of Law and Technology
Despite the many technological advances that could benefit the court system, the use of computers and network technology to facilitate court procedures is still in its infancy, and court procedures largely remain attached to paper documents and to the physical presence of the parties at all stages. More and more research is focusing on the use of technology to make the legal system more efficient and to reduce excessive legal costs and delays. The goal of this exploratory research project is to examine the experience of justice sector technology implementation from the perspective of individuals involved first-hand in the implementation …
A Dual Track Approach To Challenging Chinese Censorship In The Wto: The (Future) Case Of Google And Facebook, Anonymous
Michigan Journal of International Law
As economic and trade policies continue to affect more facets of society, the World Trade Organization’s (WTO) impact on government policy and citizens’ lives has grown. Since its creation on January 1, 1995, the WTO has fostered trade liberalization negotiations and served as a forum where member countries can discuss economic concerns with one another. The WTO is perhaps best known for its dispute settlement mechanism. When countries cannot reach a mutual resolution to a conflict governed by a trade agreement, they can initiate formal legal proceedings against one another by asking for a panel to be appointed. The panel …
Signs And Portents In Cyberspace: The Rise Of Jus Internet As New Order In International Law, Roy Balleste, Joanna Kulesza
Signs And Portents In Cyberspace: The Rise Of Jus Internet As New Order In International Law, Roy Balleste, Joanna Kulesza
Fordham Intellectual Property, Media and Entertainment Law Journal
Today, having sufficient access to the Internet's information has arguably become a prerequisite for the enjoyment of human life. The Internet has become a center for human literacy and has the potential to offer numerous kinds of instruction at lower costs and with higher quality than previous media could offer. This Article will argue that the concept of a "cybered Westphalian age," as a cure to all threats in the Internet, has the potential to do more harm than good. The international community is now faced with a possible policy shift from the current state of the Internet, which is …
Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski
Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski
Fordham Intellectual Property, Media and Entertainment Law Journal
The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …
Shopping For Reversals: How Accuracy Differs Across Patent Litigation Forums, Teresa Lii
Shopping For Reversals: How Accuracy Differs Across Patent Litigation Forums, Teresa Lii
Chicago-Kent Journal of Intellectual Property
This study analyzes the rate of reversal on appeal of each district court for the most popular patent litigation forums in the United States. Alarmingly, this study finds that district courts which have been shopped for by litigants may also be the courts that are most often applying patent law erroneously. Among these districts is the notoriously patentee-friendly Eastern District of Texas, which has attracted huge volumes of litigants to its dockets in recent years.
Although forum shopping has always antagonized the fairness of civil proceedings, it is of special problem in the context of patent litigation. Where billions of …
Icann’S New Generic Top-Level Domain Programand Appication Results, Amer Raja
Icann’S New Generic Top-Level Domain Programand Appication Results, Amer Raja
Intellectual Property Brief
No abstract provided.
Ultramercial And Prometheus: How Transformation Analysis After Bilski Is Changing To Accommodate Modern Technologies, Sarah Beth Smith
Ultramercial And Prometheus: How Transformation Analysis After Bilski Is Changing To Accommodate Modern Technologies, Sarah Beth Smith
Intellectual Property Brief
No abstract provided.
Unchanging E-Discovery In The Patent Courts, Daniel B. Garrie, Yoav M. Griver
Unchanging E-Discovery In The Patent Courts, Daniel B. Garrie, Yoav M. Griver
Washington Journal of Law, Technology & Arts
This Article analyzes the Federal Circuit’s Model Order Regarding E-Discovery in Patent Cases (the “Model Order”). The Article briefly describes the purpose behind the Model Order, describes its key provisions, analyzes the Model Order to identify some areas of continuing concern, and defines predictive coding to examine the impact, or lack thereof, on the Model Order. The Author concludes that, while it is beyond refute that the Model Order is an appropriate step toward controlling and managing e-discovery, the Model Order is only the first step. In this regard, several problems, as set forth below, can potentially arise when counsel …
Graduated Response American Style: “Six Strikes” Measured Against Five Norms, Annemarie Bridy
Graduated Response American Style: “Six Strikes” Measured Against Five Norms, Annemarie Bridy
Fordham Intellectual Property, Media and Entertainment Law Journal
In 2008, in recognition of the DMCA’s inadequacy in the face of P2P file sharing, and with the high-profile case of Arista Records v. Lime Group pending in federal district court in New York, then New York State Attorney General Andrew Cuomo began pressuring broadband providers to agree voluntarily to play a greater role in fighting online infringement. Subsequently, the Obama administration, represented nationally by the Office of the Intellectual Property Enforcement Coordinator (IPEC) and internationally by the Office of the United States Trade Representative (USTR), expressly endorsed the concept of privately negotiated anti-piracy collaborations between corporate rights owners and …
Litigation Following A Cyber Attack: Possible Outcomes And Mitigation Strategies Utilizing The Safety Act, Brian E. Finch, Leslie H. Spiegel
Litigation Following A Cyber Attack: Possible Outcomes And Mitigation Strategies Utilizing The Safety Act, Brian E. Finch, Leslie H. Spiegel
Santa Clara High Technology Law Journal
Liability for a cyber attack is not limited to the attackers. An attack may be foreseeable in some circumstances, and the failure of the target or the other entities to take steps to prevent the attack can constitute a breach of duty to injured victims. In the absence of the protections provided by the Support Anti-Terrorism By Fostering Effective Technologies (SAFETY) Act, a cyber attack on a chemical facility could give rise to a number of common-law tort and contract claims against the target of the attack and other entities, potentially including the target’s cyber security vendors. This article discusses …
Information Governance: It’S A Duty And It’S Smart Business, Charles R. Ragan
Information Governance: It’S A Duty And It’S Smart Business, Charles R. Ragan
Richmond Journal of Law & Technology
A scant generation ago (twenty-five years), the World Wide Web—“an internet-based hypermedia initiative for global information sharing” —was largely a laboratory phenomenon. In 1994, the Clinton Administration urged world leaders to develop a global information superhighway, and the Information Age raced upon us. Now, Facebook has more than one billion accounts and most of us are constantly deluged by volumes of electronic information through e-mail, texts, social media, the Internet, cable systems, and others.
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett
Michigan Telecommunications & Technology Law Review
A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …
Smashing The Copyright Act To Make Room For The Mashup Artist: How A Four-Tiered Matrix Better Accommodates Evolving Technology And Needs Of The Entertainment Industry, Caroline Kinsey
UC Law SF Communications and Entertainment Journal
With the rise of online blogging, social networking platforms, and videosharing sites such as YouTube and Yahoo Video, it is now possible for one individual to rival the span of entire media empires from one's basement computer. Commonly known as the Web 2.0 phenomenon, the combination of these technological advancements with video platforms that encourage users to "engage, create, and share content online" has fundamentally transformed the music industry. No longer are fans passive listeners, but instead, with the click of a mouse and access to the Internet, they become "publisher[s], TV network[s], radio station[s], movie studio[s], record label[s], and …
Internet Freedom And Computer Abuse, Lothar Determann
Internet Freedom And Computer Abuse, Lothar Determann
UC Law SF Communications and Entertainment Journal
The Computer Fraud and Abuse Act ("CFAA") has a bad reputation. It is associated with constitutional law challenges and community outrage. It played a role in the tragic suicide of Aaron Swartz, computer programmer, Internet activist and CFAA defendant. It has been decried as a basis for abuse of justice, which is ironic, given its title and focus on punishing abuse. It has been called "the worst law in technology" and "the most outrageous criminal law you've never heard of." It is loathed and feared as a threat to Internet freedom.
A particular concern is that the law could criminalize …
The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray
UIC Review of Intellectual Property Law
The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …
Internet Outlaws: Knowingly Placing Ads On Parked Domain Names Invokes Contributory Trademark Liability, Ariane C. Strombom
Internet Outlaws: Knowingly Placing Ads On Parked Domain Names Invokes Contributory Trademark Liability, Ariane C. Strombom
Marquette Intellectual Property Law Review
None.
Volume 4 Issue 2 (2013), Case Western Reserve Journal Of Law, Technology And The Internet
Volume 4 Issue 2 (2013), Case Western Reserve Journal Of Law, Technology And The Internet
Journal of Law, Technology, & the Internet
No abstract provided.
Crowdfunding: Fleecing The American Masses, Zachary J. Griffin
Crowdfunding: Fleecing The American Masses, Zachary J. Griffin
Journal of Law, Technology, & the Internet
No abstract provided.
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey Thomas Biller
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey Thomas Biller
Journal of Law, Technology, & the Internet
No abstract provided.
Imposing A Duty In An Online World: Holding The Webhost Liable For Cyberbullying, Elizabeth M. Jaffe
Imposing A Duty In An Online World: Holding The Webhost Liable For Cyberbullying, Elizabeth M. Jaffe
UC Law SF Communications and Entertainment Journal
In light of fettle attempts by state legislatures to subdue the growing cyberbullying epidemic, the time has come to create a civil duty upon those who can control the problem-web hosts and webservers. While the general "foreseeable plaintiff' duty set forth by then-Chief Judge Cardozo in PaIsgraf v. Long Island Railroad Co. has controlled the duty of care owed to the person of another for the last century, Judge Andrews' dissent may hold the key to unlock this new societal problem: "Every one owes to the world at large the duty of refraining from those acts that may unreasonably threaten …
Cyberattacks On Medical Devices And Hospital Networks: Legal Gaps And Regulatory Solutions, Katherine Booth Wellington
Cyberattacks On Medical Devices And Hospital Networks: Legal Gaps And Regulatory Solutions, Katherine Booth Wellington
Santa Clara High Technology Law Journal
Cyberattacks on medical devices and hospital networks are a real and growing threat. Malicious actors have the capability to hack pacemakers and insulin pumps, shut down hospital networks, and steal personal health information. This Article analyzes the laws and regulations that apply to cyberattacks on medical devices and hospital networks and argues that the existing legal structure is insufficient to prevent these attacks. While the Computer Fraud and Abuse Act and the Federal Anti-Tampering Act impose stiff penalties for cyberattacks, it is often impossible to identify the actor behind a cyberattack—greatly decreasing the deterrent power of these laws. Few laws …
Corporate Cyber-Censorship: The Problems With Freedom Of Expression Online, Max Rothschild
Corporate Cyber-Censorship: The Problems With Freedom Of Expression Online, Max Rothschild
Canadian Journal of Law and Technology
This article will explore the problem of the applicability of human rights law to the corporate entities that own and enable the operation of the Internet. The focus will be the status of the right to freedom of expression online, and the different possibilities that have been suggested in order to ensure that users have and are able to exercise this right. As the Internet is a communicative tool that allows for an unprecedented global discourse, freedom of expression is naturally of primary importance in the online context.
Patent Law Is, At Best, Not Worth Keeping, Richard Stallman
Patent Law Is, At Best, Not Worth Keeping, Richard Stallman
Loyola University Chicago Law Journal
No abstract provided.
“Cyberanarchy” In The Digital Age: Developing A System Of Human (Copy)Rights, 12 J. Marshall Rev. Intell. Prop. L. 424 (2013), Michael L. Boyle
“Cyberanarchy” In The Digital Age: Developing A System Of Human (Copy)Rights, 12 J. Marshall Rev. Intell. Prop. L. 424 (2013), Michael L. Boyle
UIC Review of Intellectual Property Law
“Cyberanarchy,” broadly refers to the idea that legal regulation of the Internet is an infeasible objective. One prime example is current online enforcement mechanisms’ inability to quell copyright infringement. These mechanisms do little more than perpetuate a technological arms race between copyright holders and infringers. Moreover, with notable public relations failures, such as the RIAA lawsuits and digital rights management schemes, society has taken on a nonchalant attitude towards online infringement. Examining traditional justifications behind obedience to the law, this blasé attitude takes root in societal feelings of inadequacy both in “normative” and “instrumental” perspectives of justice. Normatively, there lacks …
Outspoken: Social Media And The Modern College Athlete, 12 J. Marshall Rev. Intell. Prop. L. 509 (2013), Meg Penrose
Outspoken: Social Media And The Modern College Athlete, 12 J. Marshall Rev. Intell. Prop. L. 509 (2013), Meg Penrose
UIC Review of Intellectual Property Law
The First Amendment to the United States Constitution grants American citizens the right to free speech. However, in the case of college athletes, this right is not without limitation. In exchange for the privilege of participating in college level athletics, college athletes voluntarily agree to terms that restrict their abilities to speak freely, specifically in the context of social media platforms. This article details situations in which college athletes have made offensive statements via social media for which they later needed to delete, explain, and apologize. These examples support the notion that restrictions on college athletes’ speech are not only …