Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Copyright (7)
- Copyright law (6)
- First Amendment (6)
- Digital Millennium Copyright Act (4)
- Liability (4)
-
- Privacy (4)
- Cyberspace (3)
- Federal Trade Commission (3)
- Internet (3)
- Peer-to-peer networks (3)
- Personal information (3)
- User-generated content (3)
- YouTube (3)
- Big data (2)
- Contract law (2)
- Data protection (2)
- Fair use (2)
- File sharing technology (2)
- Governance (2)
- Internet service providers (2)
- Regulation (2)
- Right to be forgotten (2)
- Spam (2)
- Virtual worlds (2)
- Access to knowledge (1)
- Advertising triggers (1)
- Aero (1)
- Alien Tort Statute (1)
- Allocation policy (1)
- Americans with Disabilities Act (1)
Articles 61 - 76 of 76
Full-Text Articles in Law
Typosquatters, The Tactical Fight Being Waged By Corporations, And Congress' Attempt To Fight Back In The Criminal Arena, David A. Gusewelle
Typosquatters, The Tactical Fight Being Waged By Corporations, And Congress' Attempt To Fight Back In The Criminal Arena, David A. Gusewelle
Vanderbilt Journal of Entertainment & Technology Law
Part II of this Note presents an overview of domain names as well as a general overview of cybersquatting and trademarks. Part III analyzes some of the measures Congress has taken against cybersquatting and the case law under those measures. Part IV gives a general overview of typosquatters, who constitute a subgroup of cybersquatters. Part V discusses the TDNA and issues that have been addressed through U.S. v. Zuccarini. Part VI asks whether the TDNA is an unconstitutional restriction on free speech. Part VII questions whether criminal liability is appropriate and argues for a higher culpability standard in § 2252(B)(b) …
New Media, New Rules: The Digital Performance Right And Streaming Media Over The Internet, Joseph E. Magri
New Media, New Rules: The Digital Performance Right And Streaming Media Over The Internet, Joseph E. Magri
Vanderbilt Journal of Entertainment & Technology Law
Streaming music over the Internet, or what otherwise is known as webcasting or Internet radio, has the potential to become the single most revolutionary means of music transmission ever developed.' In order to appreciate the potential impact of Internet radio, it is helpful to understand that Internet radio has the ability to venture far beyond the at-home personal computer that is tethered to a wall and logged-on to the Internet. With advances in wireless broadband technologies, such as wireless fidelity or Wi-Fi, and the growing availability of Internet content via mobile devices,' Internet radio will soon become widely available on …
Solutions Are On Track, Beth A. Thomas
Solutions Are On Track, Beth A. Thomas
Vanderbilt Journal of Entertainment & Technology Law
This Note discusses the need to solve the copyright problems caused by digital file sharing over peer-to-peer networks and the possible solutions that would be acceptable to both the media industries and the public. While it is likely that the problems caused by file sharing will not decrease significantly by placing post-sales control in the hands of the artists, it is probable that legislative and industry driven technical counter-measures will be able to decrease illegal file sharing in an acceptable way.
Part I outlines copyright in general and how digital technology is pushing at the boundaries of copyright law. Part …
Is There Judicial Recourse To Attack Spammers?, Ashley L. Rogers
Is There Judicial Recourse To Attack Spammers?, Ashley L. Rogers
Vanderbilt Journal of Entertainment & Technology Law
This Note will discuss the issue of non-commercial spam through the prism of a case recently decided by the California Supreme Court, Intel v. Hamidi. Until recently there was no federal regulation for unwanted electronic communication and common law was the only potential solution. Part I of this Note will discuss the nature of spam, focusing on the distinction between commercial e-mail and bulk e-mail and the importance therein. Part II will detail the history and the legal doctrine of trespass as it applies to the Internet. Part III will summarize the case of Intel v. Hamidi as it struggled …
The Digital Music Dilemma: Protecting Copyright In The Age Of Peer-To-Peer File Sharing, Natalie Koss
The Digital Music Dilemma: Protecting Copyright In The Age Of Peer-To-Peer File Sharing, Natalie Koss
Vanderbilt Journal of Entertainment & Technology Law
This paper seeks a resolution between the need to eliminate copyright infringement and the desire to encourage new technology. This paper will suggest that the music industry would be better off directing resources toward solutions such as compulsory licensing, royalty collection, and working with hardware manufacturers to discourage copyright infringement. These solutions would allow the industry to take advantage of file sharing now rather than expending resources in court where the desired result of ending P2P programs may never come.
From Subway Stations To The Information Superhighway: Compliance Strategies For Musicians To Avoid The Worldwide Entanglement Of Privacy Laws, Yvenne M. King
From Subway Stations To The Information Superhighway: Compliance Strategies For Musicians To Avoid The Worldwide Entanglement Of Privacy Laws, Yvenne M. King
Vanderbilt Journal of Entertainment & Technology Law
In light of the fact that operating a website raises many complex legal issues covering numerous areas of law, this Article focuses on one area that musicians, as website owners, should address: their potential liability for third-party claims based upon violation of consumer privacy laws. This Article first discusses the importance for musician website operators of protecting consumers' privacy rights. Second, it addresses the need to establish a "global privacy compliance plan" to limit musicians' legal liabilities. Finally, it explains how musicians can go about creating such a plan by developing "minimum guidelines" and "privacy practices." ... For purposes of …
Book Publishing In The Age Of The E-Book, Nancy B. Vermylen
Book Publishing In The Age Of The E-Book, Nancy B. Vermylen
Vanderbilt Journal of Entertainment & Technology Law
Whatever role e-publishing is ultimately to assume in the publishing world, its emergence calls for the (re)evaluation of significant legal issues affecting the contractual relationship of authors and publishers. This Note identifies some of those issues, and where appropriate, suggests some tentative solutions. Part II of this Note sets e-publishing and the concerns it raises in context by providing a brief discussion of the traditional book publishing industry and the roles that publishing contracts and personal relationships play in that industry. Part III provides an introduction to the emerging world of e-publishing and e-books. Part IV discusses the legal issues …
The Peer-To-Peer Revolution: A Post-Napster Analysis Of The Rapidly Developing File Sharing Technology, Joseph A. Sifferd
The Peer-To-Peer Revolution: A Post-Napster Analysis Of The Rapidly Developing File Sharing Technology, Joseph A. Sifferd
Vanderbilt Journal of Entertainment & Technology Law
This Note will focus on A&M Records, Inc. v. Napster, Inc. and will include an analysis of copyright law applicable to the legality of the incipient peer-to-peer file-sharing technology. The first section provide a brief factual history and introduction to the Napster legal discussion. The second Section of this Note will include a survey of relevant copyright doctrines, followed by a discussion of the Ninth Circuit's analysis of these doctrines as applied to the facts presented in "Napster." Finally, I will address the future of the peer-to-peer phenomenon, including a review and analysis of different types of peer-to-peer networks that …
E-Pluribus Unum?: The Problem Of Anonymous Election-Related Communications On The Internet, Paul A. Werner, Iii
E-Pluribus Unum?: The Problem Of Anonymous Election-Related Communications On The Internet, Paul A. Werner, Iii
Vanderbilt Journal of Entertainment & Technology Law
This Note discusses an aspect of this fundamental question in the context of one provision of the FECA. The FECA's identification requirement, section 441d, prohibits anonymous communications via mass media when any person makes an expenditure for the purpose of financing communications expressly advocating the election or defeat of clearly identified candidates. The mass media included are broadcast, print, direct mail, outdoor advertising facilities, and any other general public political advertising. Communications triggering this provision must contain clear information identifying who paid for and who authorized them. The statute delineates three possible required disclosures: (1) that the communication has been …
Cyberjacking, Mouse Trapping, And The Ftc Act: Are Federal Consumer Protection Laws Helping Or Hurting Online Consumers?, Kenneth Sanney
Cyberjacking, Mouse Trapping, And The Ftc Act: Are Federal Consumer Protection Laws Helping Or Hurting Online Consumers?, Kenneth Sanney
Vanderbilt Journal of Entertainment & Technology Law
Only the Federal Trade Commission (FTC) can bring a federal cause of action against a company whose business practices or actions deceive consumers. However, the FTC's power is limited; it can intervene on behalf of consumers only when there is a pattern of misconduct by the business that threatens the public interest. But where the scams themselves are difficult to spot, patterns may be virtually impossible to establish. Moreover, even successful FTC actions may yield little in the way of preventative or compensatory benefit for the individual user.
My aim in this Note, therefore, is to offer one possible means …
Irreconcilable Congressional Treatment Of Internet Service Providers As Speakers, Raymond Shih Ray Ku
Irreconcilable Congressional Treatment Of Internet Service Providers As Speakers, Raymond Shih Ray Ku
Vanderbilt Journal of Entertainment & Technology Law
This Article argues that under the CDA and OCILLA, Congress adopted facially inconsistent approaches towards ISP liability for expression. Nonetheless, despite the overt differences, it is possible to discern an underlying principle for determining when ISPs should be considered speakers that reconciles this inconsistency. Put simply, the CDA and OCILLA support an approach toward determining when ISPs are speakers that focuses on whether an ISP exercises editorial control over its network. This approach is evidenced by the fact that both statutes recognize that ISPs are able to exercise editorial control over any and all content on their networks, and both …
Why Traditional Insurance Policies Are Not Enough: The Nature Of Potential E-Commerce Losses & Liabilities, Anna Lee
Vanderbilt Journal of Entertainment & Technology Law
There are two general categories of insurance policies: first-party policies and third-party/liability policies. First-party polices provide benefits directly to policyholders for losses suffered by the policyholders. For example, fire damage to the policyholder's plant or financial loss resulting from the interruption of the policyholder's business would be covered under the first-party insurance. Generally, these first-party losses are covered under policies such as "all risk," "named peril," "business interruption," or "expense to reduce loss" coverages. Among these various types of first-party policies, "all risk" insurance policies provide the broadest coverages.
Third-party or liability policies provide protection for claims against the policyholder …
Changing Horses In Mid-Stream: The Copyright Office's New Rule Makes Broadcasters Pay For "Streaming" Their Signals Over The Internet, Samuel Fifer, Gregory R. Naron
Changing Horses In Mid-Stream: The Copyright Office's New Rule Makes Broadcasters Pay For "Streaming" Their Signals Over The Internet, Samuel Fifer, Gregory R. Naron
Vanderbilt Journal of Entertainment & Technology Law
With traditional, over-the-air broadcasts, radio stations do not have to start paying license fees to rights holders if they get a bigger transmitter or technology allows their signal to reach more listeners. That much, not even the RIAA will dispute. So why should it matter if stations use the Internet to reach additional listeners? The law shouldn't be interpreted to discourage radio stations from using new Internet technology to do the same thing they're doing now--especially since Congress itself expressly said it did not want to "[hamper] ... new technologies" or "impose new and unreasonable burdens" on broadcasters. And make …
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Vanderbilt Journal of Entertainment & Technology Law
MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …
How To Can Spam, Gary Miller
How To Can Spam, Gary Miller
Vanderbilt Journal of Entertainment & Technology Law
Receiving unsolicited commercial email, also known as "Spam," is like receiving junk mail, postage due. Spam shifts the cost of advertising from the advertiser to the consumer. This imposes enormous costs on Internet Service Providers (ISPs) and their customers. The Spam problem cries out for a legislative solution, and that is why I introduced H.R. 2162, the "Can Spam Act." The source of the Spam moniker for unsolicited commercial e-mail is apparently attributed to an annoying song in a Monty Python skit. In the skit, actors dressed like Vikings sing the word "Spam" over and over again, becoming louder and …
The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney
The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney
Vanderbilt Journal of Entertainment & Technology Law
The text of the ADA does not support such an extension. The interpretative canons of "noscitur a sociis" and "ejusdem generis" dictate that "places of public accommodation" refer exclusively to physical facilities. The canons also sufficiently resolve any possible statutory ambiguities, thereby foreclosing the opportunity for contrary agency interpretations. Although the intentionally broad purpose and design of the ADA make the statute an attractive avenue for advocates of online expansion, that same purpose and design limit the ADA to physical facilities. This note addresses the issues in two parts. First, it presents the arguments just listed. Second, it recognizes the …