Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

PDF

Journal

2007

Institution
Keyword
Publication

Articles 1 - 30 of 71

Full-Text Articles in Law

Back Matter Dec 2007

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2007

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2007

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker Dec 2007

Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker

The University of New Hampshire Law Review

[Excerpt] “Here’s a hypo. Living in Asia, I purchased a shameful amount of music and movies, all legit purchases through reputable stores, HMV and Tower Records, but little of which will get reissued. I wanted to preserve my collection but software in the discs prevented me from ripping backup copies to my computer. Lacking the technological savvy to get around this software myself, I purchased and used a product to help me circumvent these controls. Discuss.

Courts agree that copying the music and movies here is infringement but that fair use may provide a defense. However, courts do not agree …


A Primer On Electronic Contracting And Transactions In North Carolina, Richard A. Lord Oct 2007

A Primer On Electronic Contracting And Transactions In North Carolina, Richard A. Lord

Campbell Law Review

No abstract provided.


Back Matter Sep 2007

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Sep 2007

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2007

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Electronic Records As Documentary Evidence, Ken Chasse Aug 2007

Electronic Records As Documentary Evidence, Ken Chasse

Canadian Journal of Law and Technology

The new electronic record provisions that are now part of almost all of the Evidence Acts in Canada are as important as any statutory law or common law concerning the use of records as evidence. They bring six important improvements to the evidentiary law of business records. It is argued, however, that their most serious defects are that they: (1) perpetuate the best evidence rule — a rule rendered redundant by electronic records and information management (RIM); (2) do not deal with hearsay issues; (3) do not cure the defects of the business record provisions in regard to electronic records; …


The Adverse Economic Effects Of Spectrum Set-Asides, Robert W. Crandall, Allan T. Ingrahm Aug 2007

The Adverse Economic Effects Of Spectrum Set-Asides, Robert W. Crandall, Allan T. Ingrahm

Canadian Journal of Law and Technology

In February 2007, Industry Canada released a consultation that outlined a proposed auction design for spectrum Ifor Advanced Wireless Services. As part of its consultation, Industry Canada contemplated a spectrum set-aside in the AWS auction to facilitate the entry of a new wireless service provider in Canada; however, it noted that a potential drawback of a spectrum set-aside is that it can induce uneconomic entry into the market. In this paper, we show that a set-aside for AWS spectrum in Canada is more likely to result in uneconomic entry than in a viable domestic entrant into the Canadian wireless industry. …


You Must Remember This: The Copyright Conundrum Of "Translation Memory" Databases, Francie Gow Aug 2007

You Must Remember This: The Copyright Conundrum Of "Translation Memory" Databases, Francie Gow

Canadian Journal of Law and Technology

Translation memory databases (compilations of texts linked with their translations) can be valuable resources in the process of translating subsequent texts. This article explores the circumstances under which such compilations might be considered sufficiently original to attract copyright protection that is independent of any copyright already subsisting in the underlying translations and source texts. Various characteristics of the tools and the translation industry in general make the analysis highly fact-specific; whether particular translation memory databases attract protection, and, if so, who can claim to be their ‘‘authors’’, must be evaluated on a case-by-case basis. Any protection that is granted may …


Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple Aug 2007

Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple

Canadian Journal of Law and Technology

This paper proposes a bright line test to guide the Canadian Radio-television and Telecommunications Commission (‘‘CRTC’’) in regulating ‘‘network neutrality’’. When Internet service providers seek to discriminate between uses and users in administering their networks, the CRTC should ask whether the proposed discrimination is a reasonable effort to make the price paid by each user commensurate to the demands which his or her use places on the network. Discrimination which meets this description should be tolerated if not actively encouraged, because it encourages the economically efficient allocation of scarce bandwidth. All other forms of ISP discrimination — including discrimination based …


Masthead Jun 2007

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Jun 2007

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2007

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Authorizing Copyright Infringement And The Control Requirement: A Look At P2p File-Sharing And Distribution Of New Technology In The U.K., Australia, Canada, And Singapore, Jeffrey C.J. Lee Apr 2007

Authorizing Copyright Infringement And The Control Requirement: A Look At P2p File-Sharing And Distribution Of New Technology In The U.K., Australia, Canada, And Singapore, Jeffrey C.J. Lee

Canadian Journal of Law and Technology

The doctrine of authorizing copyright infringement has been used to deal with the marketing of new Ttechnology that might be employed by a user to infringe copyright, from the distribution of blank cassette tapes and double-cassette tape recorders to photocopiers. It is being tested yet again with the distribution of peer-to-peer file-sharing software that enables the online exchange of MP3 music and other copyrighted files. This article looks at the different positions adopted in several Commonwealth jurisdictions, and examines the policy considerations behind these positions. It looks at, in particular, the recent Australian case of Universal Music Australia Pty Ltd. …


Virtual Property, Real Law: The Regulation Of Property In Video Games, Susan H. Abramovitch, David L. Cummings Apr 2007

Virtual Property, Real Law: The Regulation Of Property In Video Games, Susan H. Abramovitch, David L. Cummings

Canadian Journal of Law and Technology

This article considers property created and used in the virtual realm of video games, which is often given real- T world value. From the unauthorized copying of designer clothes sold on Second Life for in-game cash, to real court damages awarded against game operators’ deletion of player-earned swords on Mir 3, a bridge has been taking shape from video gaming’s virtual economies to real-world economies. However, virtual property created in virtual worlds has yet to be formally recognized by North American courts or legislatures. This article attempts to touch on some of the legal considerations paramount in determining how such …


L'Affaire Xm Satellite Radio: La Légalité Des Appareils Qui Enregistrent La Radio Par Satellite, René Pépin Apr 2007

L'Affaire Xm Satellite Radio: La Légalité Des Appareils Qui Enregistrent La Radio Par Satellite, René Pépin

Canadian Journal of Law and Technology

Aux Etats-Unis, la radio par satellite existe depuis le nouveau millénaire. Mais les compagnies qui œuvrent dans ce domaine font face depuis 2006 a des poursuites devant les tribunaux par les grandes compagnies de disques. Elles paient pourtant les tarifs convenus avec les entreprises qui s’occupent de gestion collective des droits d’auteur sur les disques. Le probleme vient du fait que depuis leur entrée en ondes, des progrès technologiques leur permettent d’offrir à leurs abonnés des appareils qui sont bien plus polyvalents qu’un simple appareil radio récepteur. Les nouveaux modèles peuvent enregistrer plusieurs heures d'émissions, et ils peuvent transmettre à …


Front Matter Mar 2007

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2007

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Mar 2007

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Suing Based On Spyware? Admissibility Of Evidence Obtained From Spyware In Violation Of Federal And State Wiretap Laws: O'Brien V. O'Brien As A Paradigmatic Case, Shan Sivalingam Feb 2007

Suing Based On Spyware? Admissibility Of Evidence Obtained From Spyware In Violation Of Federal And State Wiretap Laws: O'Brien V. O'Brien As A Paradigmatic Case, Shan Sivalingam

Washington Journal of Law, Technology & Arts

Early in 2005, a Florida intermediate appellate court ruled that a trial court adjudicating a divorce proceeding had properly excluded evidence that the wife obtained by installing a spyware program on the husband’s computer. The court held that the evidence was an intercepted electronic communication that violated a Florida statute modeled after the Federal Wiretap Act. The Florida court ruled that exclusion fell properly within the discretion of the trial court, despite the fact that the relevant Florida statute did not contain an exclusionary rule for intercepted electronic communications. This Article provides a short overview of the federal and state …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Eileen R. Geller Jan 2007

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Eileen R. Geller

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the 2007–2008 academic school year. Our authors tackle a number of emerging issues in ways we think you’ll find especially interesting.


Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement , William H. Page, Seldon J. Childers Jan 2007

Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement , William H. Page, Seldon J. Childers

Michigan Telecommunications & Technology Law Review

An important provision in each of the final judgments in the government's Microsoft antitrust case requires Microsoft to "make available" to software developers the communications protocols that Windows client operating systems use to interoperate "natively" (that is, without adding software) with Microsoft server operating systems in corporate networks or over the Internet. The short-term goal of the provision is to allow developers, as licensees of the protocols, to write applications for non-Microsoft server operating systems that interoperate with Windows client computers in the same ways that applications written for Microsoft's server operating systems interoperate with Windows clients. The long-term goal …


Microsoft Tying Consumers' Hands - The Windows Vista Problem And The South Korean Solution, Daniel J. Silverthorn Jan 2007

Microsoft Tying Consumers' Hands - The Windows Vista Problem And The South Korean Solution, Daniel J. Silverthorn

Michigan Telecommunications & Technology Law Review

Currently, more than ninety percent of the world's PCs operate under Windows. To cement its market power, Microsoft has engaged in controversial business practices. Those practices have led to adverse antitrust decisions in the United States, the European Union (EU), and South Korea. Many of these decisions, both judicial and administrative, revolve around Microsoft's bundling, or "tying," of certain subsidiary applications with the Windows operating system, including Internet Explorer and Windows Media Player. In doing so, Microsoft arguably gains a greater than deserved market share with these bundled applications, inhibiting fair competition in the software marketplace. The United States, EU …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer Jan 2007

The Common Body Of Knowledge: A Framework To Promote Relevant Information Security Research, Kenneth J. Knapp, F. N. Ford, Thomas E. Marshall, R. K. Rainer

Journal of Digital Forensics, Security and Law

This study proposes using an established common body of knowledge (CBK) as one means of organizing information security literature. Consistent with calls for more relevant information systems (IS) research, this industrydeveloped framework can motivate future research towards topics that are important to the security practitioner. In this review, forty-eight articles from ten IS journals from 1995 to 2004 are selected and cross-referenced to the ten domains of the information security CBK. Further, we distinguish articles as empirical research, frameworks, or tutorials. Generally, this study identified a need for additional empirical research in every CBK domain including topics related to legal …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Jan 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Journal of Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam Jan 2007

Computer Crimes: A Case Study Of What Malaysia Can Learn From Others?, Janaletchumi Appudurai, Chitra L. Ramalingam

Journal of Digital Forensics, Security and Law

Rapid development of information technology (IT) has brought with it many new applications such as e-commerce and global business. The past few years have seen activities in the legislative arena covering issues such as digital signatures, the international recognition of electronic documents and privacy and data protection. Both the developed and developing countries have exhibited keenness to embrace the IT environment. Securing this electronic environment from intrusion, however, continues to be problematic. A particular favorite form of computer crime would be ‘hacking’. As more computer systems move on to on-line processing and improved telecommunications, computer hackers are now a real …


Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa Jan 2007

Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa

Canadian Journal of Law and Technology

It is now trite to say that the events of September 11, 2001 have had a profound impact on our national security, in terms of its institutional and normative dimensions, and also in terms of a more general public anxiety. The hastily enacted Anti-terrorism Act of 2001 brought about significant changes to a wide range of statutes including, among others, the Criminal Code, the Official Secrets Act, the Canada Evidence Act, and the Proceeds of Crime (Money Laundering) Act. An early conference and resultant book on the Anti-terrorism Act raised serious concerns about the potential impact of the changes on …