Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

How Not To Criminalize Cyberbullying, Lyrissa Barnett Lidsky, Andrea Garcia Dec 2014

How Not To Criminalize Cyberbullying, Lyrissa Barnett Lidsky, Andrea Garcia

Lyrissa Barnett Lidsky

This essay provides a sustained constitutional critique of the growing body of laws criminalizing cyberbullying. These laws typically proceed by either modernizing existing harassment and stalking laws or crafting new criminal offenses. Both paths are beset with First Amendment perils, which this essay illustrates through 'case studies' of selected legislative efforts. Though sympathetic to the aims of these new laws, this essay contends that reflexive criminalization in response to tragic cyberbullying incidents has led law-makers to conflate cyberbullying as a social problem with cyberbullying as a criminal problem, creating pernicious consequences. The legislative zeal to eradicate cyberbullying potentially produces disproportionate …


Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe Dec 2014

Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe

Elizabeth A Rowe

This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …


Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Dec 2014

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

Elizabeth A Rowe

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Dec 2014

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

Elizabeth A Rowe

When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …


Bargaining In The Shadow Of The European Microsoft Decision: The Microsoft-Samba Protocol License, William H. Page, Seldon J. Childers Nov 2014

Bargaining In The Shadow Of The European Microsoft Decision: The Microsoft-Samba Protocol License, William H. Page, Seldon J. Childers

William H. Page

The Microsoft-Samba agreement is by far the most important tangible outcome of the European Microsoft case. The EC’s other remedial order in the case, which required Microsoft to create a version of Windows without Windows Media Player, was an embarrassing failure. The Samba agreement, however, is significant because it requires Microsoft to provide, to its most important rival in the server market, detailed documentation of its communications protocols, under terms that allow use of the information in open source development and distribution. There is good reason to believe that Samba will be able to use the information to compete more …


Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers Nov 2014

Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers

William H. Page

An important provision in each of the final judgments in the government's Microsoft antitrust case requires Microsoft to "make available" to software developers the communications protocols that Windows client operating systems use to interoperate "natively" (that is, without adding software) with Microsoft server operating systems in corporate networks or over the Internet. The short-term goal of the provision is to allow developers, as licensees of the protocols, to write applications for non-Microsoft server operating systems that interoperate with Windows client computers in the same ways that applications written for Microsoft's server operating systems interoperate with Windows clients. The long-term goal …


Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page Nov 2014

Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page

William H. Page

The goal of telecommunications policy has shifted from the control of natural monopoly to the promotion of competition. But the question remains how extensive and persistent the government's regulatory role should be in the operation of communications markets. One might think that regulators could find the answer to this question in antitrust law. But antitrust has itself been torn between interventionist and laissez-faire tendencies. Over the past two decades, the dominant Chicago School approach to antitrust has focused on economic efficiency, a standard that has led to the abandonment or contraction of some categories of liability. More recently, however, post-Chicago …


The Software Licensing Dilemma, Nancy S. Kim Aug 2014

The Software Licensing Dilemma, Nancy S. Kim

Nancy Kim

No abstract provided.


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik Jun 2014

The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik

Warren Bartholomew CHIK

In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …


The Study Of Safety Governance For Service Robots: On Open-Texture Risk, Yueh-Hsuan Weng May 2014

The Study Of Safety Governance For Service Robots: On Open-Texture Risk, Yueh-Hsuan Weng

Yueh-Hsuan Weng

The emergence of steam and microelectrical machines in society gradually expanded since the era of the Industrial Revolution. Up until now, human beings have already co-existed with these machines for more than two centuries, and contemporary laws have developed preventional regulatory frameworks. These frameworks are based on risk assessments to supervise the safety of microelectrical machines which include automobiles, railway systems, elevators and industrial robots, etc. Regulators, especially South Korea and Japan expect human-robot co-existence societies to emerge within the next decade. These next generation robots will be capable of adapting to complex, unstructured environments and interact with humans to …


Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati Apr 2014

Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati

Rodolfo C. Rivas

The authors provide a brief rundown of strategies to protect a wide range of IP rights in cyberspace. The strategies tackle practical advice and suggest a series of progressive actions in order to ensure maximum protection with an efficient use of resources.//////////////////////////////// Los autores proporcionan un breve resumen de las estrategias para proteger una amplia gama de derechos de propiedad intelectual en el ciberespacio. Las estrategias abordan consejos prácticos y sugieren una serie de acciones en orden progresivo con la finalidad de garantizar la máxima protección manteniendo un uso eficiente de los recursos.


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank Pasquale

Frank A. Pasquale

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Mar 2014

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

A. Michael Froomkin

US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …


Information Society Perspectives On Choice Of Law And Jurisdiction – Party Autonomy In Transition, Ulf Maunsbach Dec 2013

Information Society Perspectives On Choice Of Law And Jurisdiction – Party Autonomy In Transition, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner Dec 2013

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

Richard Warner

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Network Nepotism And The Market For Content Delivery, Tejas N. Narechania Dec 2013

Network Nepotism And The Market For Content Delivery, Tejas N. Narechania

Tejas N. Narechania

The Federal Communications Commission has officially launched its third attempt to impose network neutrality rules on Internet traffic. But before the Commission could release its proposed regulations, they leaked to the Wall Street Journal and were quickly embroiled in controversy. Chief among the objections was the possibility that the new regulations would allow broadband carriers, such as Verizon, to prioritize certain traffic, thereby creating an Internet “fast lane” that could be dedicated to select content, websites, or applications. Of particular concern was the possibility that carriers would use this power to accord special treatment to other members of its corporate …


Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu Dec 2013

Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu

Tejas N. Narechania

In January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC's 2010 Open Internet Order, which contained the Commission's net neutrality rules. The Commission has since indicated that it will take up the D.C. Circuit's invitation to implement rules that, consistent with historic practice, meet the court’s test for preventing improper blocking and discrimination of Internet traffic. In this paper, we consider the Commission's options for a path forward under Title II of the Communications Act. We find that the FCC has at least two available paths. The first is predominantly legal: By adopting the …