Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (8)
- University of Pennsylvania Carey Law School (6)
- American University Washington College of Law (5)
- Boston University School of Law (5)
- Pace University (3)
-
- Roger Williams University (3)
- University of Baltimore Law (3)
- University of Florida Levin College of Law (3)
- Cornell University Law School (2)
- University of Georgia School of Law (2)
- University of Michigan Law School (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of New Hampshire (2)
- City University of New York (CUNY) (1)
- Florida International University College of Law (1)
- Mitchell Hamline School of Law (1)
- Seattle University School of Law (1)
- St. John's University School of Law (1)
- University of Denver (1)
- University of Missouri-Kansas City School of Law (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- Washington University in St. Louis (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (9)
- Articles by Maurer Faculty (8)
- Faculty Scholarship (6)
- Articles in Law Reviews & Other Academic Journals (4)
- Elisabeth Haub School of Law Faculty Publications (3)
-
- Life of the Law School (1993- ) (3)
- UF Law Faculty Publications (3)
- Articles (2)
- Faculty Publications (2)
- LLM Theses and Essays (2)
- Law Faculty Scholarship (2)
- Boyd Briefs / Road Scholars (1)
- Cornell Law Faculty Publications (1)
- Cornell Law School Inter-University Graduate Student Conference Papers (1)
- Faculty Works (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Law Faculty Publications (1)
- Law Librarian Scholarship (1)
- Publications and Research (1)
- Scholarly Works (1)
- Scholarship@WashULaw (1)
- Seattle University Law Review Online (1)
- Sturm College of Law: Faculty Scholarship (1)
Articles 31 - 56 of 56
Full-Text Articles in Law
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
UF Law Faculty Publications
This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
UF Law Faculty Publications
When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
UF Law Faculty Publications
This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
All Faculty Scholarship
The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
All Faculty Scholarship
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
Internet Cookies: When Is Permission Consent?, Max Oppenheimer
Internet Cookies: When Is Permission Consent?, Max Oppenheimer
All Faculty Scholarship
No abstract provided.
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson
Elisabeth Haub School of Law Faculty Publications
This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …
Once And Future Copyright, James Gibson
Once And Future Copyright, James Gibson
Law Faculty Publications
Copyright is like a well-meaning but ultimately bothersome friend, eager to help but nearly impossible to get rid of. It attaches indiscriminately to the simplest acts of expression, without regard for whether the author needs or wants its protection. This automatic propertization made sense in the print era, when mass distribution of information was an expensive process rarely undertaken by those with no plans to profit from their creativity. It makes little sense today. The following article shows that copyright's overly solicitous nature is the source of several seemingly unrelated and intractable problems - e.g., closed code, copyright as censorship, …
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield
Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield
Articles by Maurer Faculty
Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.
A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …
Ub Viewpoint – Aol/Microsoft Settlement Could Harm Consumers, Robert H. Lande
Ub Viewpoint – Aol/Microsoft Settlement Could Harm Consumers, Robert H. Lande
All Faculty Scholarship
No abstract provided.
The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister
The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister
Faculty Works
As the Internet has gained prevalence, attention has turned to its regulation. Indeed, regulation proves to be a unique and complex problem, given the Internet's lack of traditional borders and boundaries. Highlighting possible avenues of regulation, the author discusses neo-classical economic theory, specifically Monroe E. Price's market for loyalties theory. Although originally applied to the regulation of broadcasting, the author contends that the market for loyalties theory can also be applied to the Internet. Building on Professor Price's pioneering analysis, the article extends the theory to examine market elasticity's effect on the loss of monopoly control over information flow (as …
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Faculty Publications
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites, Xuan-Thao Nguyen
Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites, Xuan-Thao Nguyen
Articles
In the e-commerce world, a company's web site becomes the primary communication center with the customer. The web site is where the company displays products, presents marketing materials, and provides sales and post-sales support. Increasingly, companies are spending valuable resources to build and maintain their web sites. With the rapid change in web technology, many web sites now feature more than just ordinary text. Color, clipart, graphics, designs, animations, and sounds are now part of the overall appearance of web sites. Yet copying an image from a web site is just one click away. What protection is available to the …
Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil
Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil
LLM Theses and Essays
This thesis is an effort to evaluate the structural changes that have taken place in the securities market of the United States and its impact on securities disclosure regime mandated by the Federal Securities Act. Part 2 of the thesis discusses the securities disclosure regime and its underlying economic theories. This part also traces the challenges posed by technology and takes a quick look at the argument that the traditional norms are incompatible in dealing with those challenges. Part 3 deals primarily with structural developments in the securities market over the past five years by examining some of the innovative …
Principles Of Internet Privacy, Fred H. Cate
Principles Of Internet Privacy, Fred H. Cate
Articles by Maurer Faculty
The definition of privacy developed by Brandeis and Warren and Prosser, and effectively codified by Alan Westin in 1967 - the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others - worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.
But that definition's exclusive focus on individual control has grown incomplete in a world in which most privacy concerns involve …
In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer
In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer
All Faculty Scholarship
No abstract provided.
Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross
Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Legal Aspects Of The Internet, Etienne Pichat
Legal Aspects Of The Internet, Etienne Pichat
LLM Theses and Essays
This thesis will explain the legal aspects of the Internet so that users who wish to protect their rights and avoid liability can log on with a better understanding of the rules of the game. This work will be divided into two chapters. The first chapter will focus on existing legal regulation of the Internet to advise users on which law is relevant, and how to solve problems of conflicts of laws in the cyberworld. It will answer the question of whether cyberspace is, or not, a "no laws land", and what kind of regulation would better fit the cyberworld. …
Law In Cyberspace, Fred H. Cate
The Technological Transformation Of Copyright Law, Fred H. Cate
The Technological Transformation Of Copyright Law, Fred H. Cate
Articles by Maurer Faculty
Both statutory and case law clearly recognize the constitutional interest in promoting, not restricting, expression. Digital technologies, however, are rapidly changing the application of copyright law to prohibit access, protect ideas and facts, and dramatically expand the monopoly granted to copyright holders.
Whether on a disk or network, digital expression cannot be accessed without being copied into computer memory, as well as onto a hard drive, floppy disk, or magnetic tape if it is to be retained after the computer is switched off. This necessarily violates the exclusive right to reproduce that copyright law grants to copyright holders.
Moreover, to …
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
No abstract provided.
The First Amendment And The National Information Infrastructure, Fred H. Cate
The First Amendment And The National Information Infrastructure, Fred H. Cate
Articles by Maurer Faculty
What the First Amendment status of electronic information should be is a fundamental question which must be addressed in any attempt to arrive at appropriate legal standards to protect the multifarious interests of the users of cyberspace. Yet, despite its importance, the First Amendment has largely been ignored in the debate surrounding what sort of legal framework should control the emerging National Information Infrastructure. Professor Cate surveys the current terrain of First Amendment jurisprudence and describes the different analytical approaches which may be taken. Doctrinal anomalies such as the law of common carriage indicate that at times the courts have …
A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn
Articles in Law Reviews & Other Academic Journals
No abstract provided.