Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Series

2006

Institution
Keyword
Publication

Articles 1 - 24 of 24

Full-Text Articles in Law

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan Nov 2006

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth Nov 2006

Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth

Faculty Scholarship

Significant change is anticipated in the Japanese Consumption Tax. The Japanese Tax Commission is recommending that the rate should double, multiple rates should be employed, and the "bookkeeping method" of accounting should be abandoned in favor of the European "invoice method."

The Tax Commission faces a tax policy dilemma. The aging population drives the need for a tax increase (making the Consumption Tax an obvious target for revenue enhancement) at exactly the same time the population is shrinking in overall size, thereby reducing the number of working-consumers who can pay the higher tax.

These are dramatic changes for the Japanese …


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang Sep 2006

Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth Aug 2006

Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth

Faculty Scholarship

Biometric identifiers embedded in national identity cards puts a formerly impossible goal of consumption taxation within the grasp of policymakers for the first time. Never before has it been possible to design a broad-based, single rate consumption tax that is truly progressive.

No consumption tax has ever had all three of the critical attributes of a progressive consumption tax: a broad base, a single rate, and measured relief for those in greatest need. Although economists have urged that a broad base and a single rate be pursued over progressivity, most consumption taxes instead seek progressivity at the expense of both …


Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth May 2006

Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth

Faculty Scholarship

Recent reports from the UK's Office for National Statistics estimate (as of May 11, 2006) that Missing Trader Intra-community Fraud (MTIC) may exceed 10 billion pounds this year.

Carousel fraud, a variant of MTIC where the same goods are sold over and over again, exploits the lingering non-certified, non-digital attributes of the EU VAT. The UK believes that carousel fraud cost the Exchequer between 1.12 and 1.9 billion pounds in the 2004-05 financial year. This article proposes that carousel fraud be eliminated in the EU through selective insertion of Digital VAT functionality into the present system. In other words, it …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White Mar 2006

Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone Mar 2006

Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman Mar 2006

Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman

Cornell Law Faculty Publications

No abstract provided.


Internet Cookies: When Is Permission Consent?, Max Oppenheimer Jan 2006

Internet Cookies: When Is Permission Consent?, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim Jan 2006

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

UIC Law Open Access Faculty Scholarship

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


A Dispatch From The Crypto Wars, A. Michael Froomkin Jan 2006

A Dispatch From The Crypto Wars, A. Michael Froomkin

Articles

Matt Curtin's Brute Force is a primarily personal account of one early effort to harness the power of distributed computing. In 1997, Mr. Curtin and other members of the DESCHALL (DES Challenge) project built, distributed, and managed software that united thousands of computers, many of them ordinary personal computers, in the search for a single decryption key among 72 quadrillion possibilities. The DESCHALL project sought to demonstrate that DES, then the U.S. national standard encryption algorithm, was no longer as secure as advertised. While Brute Force also offers some background on encryption regulation, export control policy, and other aspect of …


Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman Jan 2006

Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman

Faculty Publications

Due to search engines' automated operations, people often assume that search engines display search results neutrally and without bias. However, this perception is mistaken. Like any other media company, search engines affirmatively control their users' experiences, which has the consequence of skewing search results (a phenomenon called "search engine bias"). Some commentators believe that search engine bias is a defect requiring legislative correction. Instead, this Essay argues that search engine bias is the beneficial consequence of search engines optimizing content for their users. The Essay further argues that the most problematic aspect of search engine bias, the "winner-take all" effect …


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


Taxing Trademarks And Domain Names, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2006

Taxing Trademarks And Domain Names, Xuan-Thao Nguyen, Jeffrey A. Maine

Faculty Publications

With the arrival of global electronic commerce transactions on the Internet, new forms of intellectual property rights, such as Internet domain names, have emerged. Today, Internet domain names are some companies' most valuable assets. Yet law professors, attorneys, and judges struggle with the legal nature of domain names, which is far from settled. Questions drawing recent attention include: How should domain names be valued? Can domain names be used as collateral in secured transactions, and how does one perfect a security interest in domain names? What will happen to domain names in bankruptcy?


Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann Jan 2006

Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann

Faculty Scholarship

For several years now, open source software products have been gaining prominence and market share. Yet the products themselves are not as provocative as the way in which they are developed and distributed. Two related features of the open source model are distinctive: the use of collaborative development structures that extend beyond the boundaries of a single firm, and the lack of reliance on intellectual property ("IP") rights as a means of appropriating the value of the underlying technologies. Firm-level control of intellectual property is replaced by a complex set of relations, both informal and sometimes contractual, among strategic partners …


Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe Jan 2006

Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe

Scholarly Works

This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United States v. American …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Regulating Access To Databases Through Antitrust Law, Daryl Lim Jan 2006

Regulating Access To Databases Through Antitrust Law, Daryl Lim

Faculty Scholarly Works

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


Cite Checking: A Brave New World, Susan Nevelow Mart Jan 2006

Cite Checking: A Brave New World, Susan Nevelow Mart

Publications

No abstract provided.


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.


Computer Models For Legal Prediction, Kevin D. Ashley, Stephanie Bruninghaus Jan 2006

Computer Models For Legal Prediction, Kevin D. Ashley, Stephanie Bruninghaus

Articles

Computerized algorithms for predicting the outcomes of legal problems can extract and present information from particular databases of cases to guide the legal analysis of new problems. They can have practical value despite the limitations that make reliance on predictions risky for other real-world purposes such as estimating settlement values. An algorithm's ability to generate reasonable legal arguments also is important. In this article, computerized prediction algorithms are compared not only in terms of accuracy, but also in terms of their ability to explain predictions and to integrate predictions and arguments. Our approach, the Issue-Based Prediction algorithm, is a program …


Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton Jan 2006

Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton

Articles

Computer software is somewhat of a problem child for intellectual property law. Courts and legislatures have struggled to encourage innovations in software development while, at the same time, attempting to avoid undesirable digital information monopolies. Neither the patent nor the copyright system has provided a particularly satisfactory paradigm for software protection. Although patents have received greater attention than copyrights in the software context (consider, for example, the recent BlackBerry case), copyright law arguably creates more insidious undercurrents in today's marketplace. This is partly because we have not yet appreciated the potential impact of recent developments in programming methodology and digital …