Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Series

Privacy

Institution
Publication Year
Publication

Articles 61 - 70 of 70

Full-Text Articles in Law

New Surveillance, The , Sonia K. Katyal Jan 2003

New Surveillance, The , Sonia K. Katyal

Faculty Scholarship

A few years ago, it was fanciful to imagine a world where intellectual property owners - such as record companies, software owners, and publishers - were capable of invading the most sacred areas of the home in order to track, deter, and control uses of their products. Yet, today, strategies of copyright enforcement have rapidly multiplied, each strategy more invasive than the last. This new surveillance exposes the paradoxical nature of the Internet: It offers both the consumer and creator a seemingly endless capacity for human expression - a virtual marketplace of ideas - alongside an insurmountable array of capacities …


Regulatory Challenges And Models Of Regulation, Philip J. Weiser Jan 2003

Regulatory Challenges And Models Of Regulation, Philip J. Weiser

Publications

No abstract provided.


4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Nov 2002

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.


Copyright And The Jurisprudence Of Self-Help, Julie E. Cohen Jan 1998

Copyright And The Jurisprudence Of Self-Help, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The proposed draft of Article 2B grants broad rights to enforce electronically contract provisions governing access to and use of digital works. Purveyors of digital works may engage in electronic self-help following breach of contract, and may also elect to foreclose unauthorized uses ex ante, via electronic “regulation of performance.” This Article examines these provisions in light of existing law authorizing self-help repossession of tangible chattels, leading academic justifications for self-help repossession, and federal copyright law and policy. It concludes that the provisions authorize an unprecedented degree of intrusion into private homes and offices, that they lack a sound theoretical …


The Single Publication Rule: One Action Not One Law, Debra R. Cohen Jan 1996

The Single Publication Rule: One Action Not One Law, Debra R. Cohen

Journal Articles

Recovery in one action under one state's law for violation of the right of publicity-the right to control the commercial use of one's identity-arising out of multistate publication2 seems to be the trend of the nineties. When Samsung ran a nationwide print advertisement for VCRs depicting a robot dressed to resemble her, Vanna White sued for violation of her right of publicity.3 Under California law she recovered $403,000. 4 When a SalsaRio Doritos radio commercial imitating Tom Waits's distinctive raspy and gravelly voice aired nationwide, he sued Frito Lay for violation of his right of publicity.5 Under California law he …


Norms Of Communication And Commodification, Wendy J. Gordon Jan 1996

Norms Of Communication And Commodification, Wendy J. Gordon

Faculty Scholarship

Around the laws that regulate information and communication swarm a host of related nonlegal norms: norms of secrecy, confidentiality, and privacy; of anonymity, source-identity, and citation; of quotation, paraphrase, and hyperbole; norms of free copying and norms of obtaining permission; norms of gossip and of blackmail. The articles by Saul Levmore and Richard McAdams provide useful windows on some of the ways these laws and norms interact. The two articles also provide insight into the comparative advantage possessed in some circumstances by law and by nonlegal norms, respectively, when information and communication are at issue. In my brief Comment I …


Blackmail: Deontology - 1993, Wendy J. Gordon Jan 1993

Blackmail: Deontology - 1993, Wendy J. Gordon

Scholarship Chronologically

The basic logic of my deontologic approach is this.


Conversation With Lee Bollinger - 1985, Wendy J. Gordon May 1985

Conversation With Lee Bollinger - 1985, Wendy J. Gordon

Scholarship Chronologically

First, Lee Bollinger (and others) seem to feel that the misappropriation "urge" makes sense when seen against a background where most things one creates DO get property treatment. Lee therefore says it's my burden as a writer to explain why this area is different--both to succeed in making a case clear, AND to create barriers between this area and others. Essentially, he argues, people will be afraid that less-than-complete property here will erode property elsewhere.


Conversation With Whit Gray - 1985, Wendy J. Gordon Jan 1985

Conversation With Whit Gray - 1985, Wendy J. Gordon

Scholarship Chronologically

Whit Gray argued that even for things most of us would feel comfy saying AREN'T property, like the "idea" of shopping malls, we wouldn't feel so comfy with copying if the blueprints for the idea were copied prior to the time they became public. He argues also, that something more than "privacy" is at issue in our anger at visualizing such an intrusive prepublication copying.


High Technology, The Human Image, And Constitutional Value, Patrick L. Baude Jan 1985

High Technology, The Human Image, And Constitutional Value, Patrick L. Baude

Articles by Maurer Faculty

No abstract provided.