Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Series

Internet

Institution
Publication Year
Publication

Articles 31 - 56 of 56

Full-Text Articles in Law

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Jan 2009

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

UF Law Faculty Publications

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Jan 2007

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

UF Law Faculty Publications

When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …


Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe Jan 2007

Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe

UF Law Faculty Publications

This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Internet Cookies: When Is Permission Consent?, Max Oppenheimer Jan 2006

Internet Cookies: When Is Permission Consent?, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Once And Future Copyright, James Gibson Nov 2005

Once And Future Copyright, James Gibson

Law Faculty Publications

Copyright is like a well-meaning but ultimately bothersome friend, eager to help but nearly impossible to get rid of. It attaches indiscriminately to the simplest acts of expression, without regard for whether the author needs or wants its protection. This automatic propertization made sense in the print era, when mass distribution of information was an expensive process rarely undertaken by those with no plans to profit from their creativity. It makes little sense today. The following article shows that copyright's overly solicitous nature is the source of several seemingly unrelated and intractable problems - e.g., closed code, copyright as censorship, …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield Jan 2004

Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield

Articles by Maurer Faculty

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Ub Viewpoint – Aol/Microsoft Settlement Could Harm Consumers, Robert H. Lande Jun 2003

Ub Viewpoint – Aol/Microsoft Settlement Could Harm Consumers, Robert H. Lande

All Faculty Scholarship

No abstract provided.


The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister Jan 2002

The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister

Faculty Works

As the Internet has gained prevalence, attention has turned to its regulation. Indeed, regulation proves to be a unique and complex problem, given the Internet's lack of traditional borders and boundaries. Highlighting possible avenues of regulation, the author discusses neo-classical economic theory, specifically Monroe E. Price's market for loyalties theory. Although originally applied to the regulation of broadcasting, the author contends that the market for loyalties theory can also be applied to the Internet. Building on Professor Price's pioneering analysis, the article extends the theory to examine market elasticity's effect on the loss of monopoly control over information flow (as …


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Jan 2001

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Faculty Publications

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites, Xuan-Thao Nguyen Jan 2001

Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites, Xuan-Thao Nguyen

Articles

In the e-commerce world, a company's web site becomes the primary communication center with the customer. The web site is where the company displays products, presents marketing materials, and provides sales and post-sales support. Increasingly, companies are spending valuable resources to build and maintain their web sites. With the rapid change in web technology, many web sites now feature more than just ordinary text. Color, clipart, graphics, designs, animations, and sounds are now part of the overall appearance of web sites. Yet copying an image from a web site is just one click away. What protection is available to the …


Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil Jan 2000

Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil

LLM Theses and Essays

This thesis is an effort to evaluate the structural changes that have taken place in the securities market of the United States and its impact on securities disclosure regime mandated by the Federal Securities Act. Part 2 of the thesis discusses the securities disclosure regime and its underlying economic theories. This part also traces the challenges posed by technology and takes a quick look at the argument that the traditional norms are incompatible in dealing with those challenges. Part 3 deals primarily with structural developments in the securities market over the past five years by examining some of the innovative …


Principles Of Internet Privacy, Fred H. Cate Jan 2000

Principles Of Internet Privacy, Fred H. Cate

Articles by Maurer Faculty

The definition of privacy developed by Brandeis and Warren and Prosser, and effectively codified by Alan Westin in 1967 - the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others - worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.

But that definition's exclusive focus on individual control has grown incomplete in a world in which most privacy concerns involve …


In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer Jan 1999

In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross Jan 1998

Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Legal Aspects Of The Internet, Etienne Pichat Jan 1997

Legal Aspects Of The Internet, Etienne Pichat

LLM Theses and Essays

This thesis will explain the legal aspects of the Internet so that users who wish to protect their rights and avoid liability can log on with a better understanding of the rules of the game. This work will be divided into two chapters. The first chapter will focus on existing legal regulation of the Internet to advise users on which law is relevant, and how to solve problems of conflicts of laws in the cyberworld. It will answer the question of whether cyberspace is, or not, a "no laws land", and what kind of regulation would better fit the cyberworld. …


Law In Cyberspace, Fred H. Cate Jan 1996

Law In Cyberspace, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


The Technological Transformation Of Copyright Law, Fred H. Cate Jan 1996

The Technological Transformation Of Copyright Law, Fred H. Cate

Articles by Maurer Faculty

Both statutory and case law clearly recognize the constitutional interest in promoting, not restricting, expression. Digital technologies, however, are rapidly changing the application of copyright law to prohibit access, protect ideas and facts, and dramatically expand the monopoly granted to copyright holders.

Whether on a disk or network, digital expression cannot be accessed without being copied into computer memory, as well as onto a hard drive, floppy disk, or magnetic tape if it is to be retained after the computer is switched off. This necessarily violates the exclusive right to reproduce that copyright law grants to copyright holders.

Moreover, to …


Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll Jan 1996

Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

No abstract provided.


The First Amendment And The National Information Infrastructure, Fred H. Cate Jan 1995

The First Amendment And The National Information Infrastructure, Fred H. Cate

Articles by Maurer Faculty

What the First Amendment status of electronic information should be is a fundamental question which must be addressed in any attempt to arrive at appropriate legal standards to protect the multifarious interests of the users of cyberspace. Yet, despite its importance, the First Amendment has largely been ignored in the debate surrounding what sort of legal framework should control the emerging National Information Infrastructure. Professor Cate surveys the current terrain of First Amendment jurisprudence and describes the different analytical approaches which may be taken. Doctrinal anomalies such as the law of common carriage indicate that at times the courts have …


A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn Jan 1995

A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn

Articles in Law Reviews & Other Academic Journals

No abstract provided.