Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 76 of 76

Full-Text Articles in Law

Typosquatters, The Tactical Fight Being Waged By Corporations, And Congress' Attempt To Fight Back In The Criminal Arena, David A. Gusewelle Jan 2004

Typosquatters, The Tactical Fight Being Waged By Corporations, And Congress' Attempt To Fight Back In The Criminal Arena, David A. Gusewelle

Vanderbilt Journal of Entertainment & Technology Law

Part II of this Note presents an overview of domain names as well as a general overview of cybersquatting and trademarks. Part III analyzes some of the measures Congress has taken against cybersquatting and the case law under those measures. Part IV gives a general overview of typosquatters, who constitute a subgroup of cybersquatters. Part V discusses the TDNA and issues that have been addressed through U.S. v. Zuccarini. Part VI asks whether the TDNA is an unconstitutional restriction on free speech. Part VII questions whether criminal liability is appropriate and argues for a higher culpability standard in § 2252(B)(b) …


New Media, New Rules: The Digital Performance Right And Streaming Media Over The Internet, Joseph E. Magri Jan 2003

New Media, New Rules: The Digital Performance Right And Streaming Media Over The Internet, Joseph E. Magri

Vanderbilt Journal of Entertainment & Technology Law

Streaming music over the Internet, or what otherwise is known as webcasting or Internet radio, has the potential to become the single most revolutionary means of music transmission ever developed.' In order to appreciate the potential impact of Internet radio, it is helpful to understand that Internet radio has the ability to venture far beyond the at-home personal computer that is tethered to a wall and logged-on to the Internet. With advances in wireless broadband technologies, such as wireless fidelity or Wi-Fi, and the growing availability of Internet content via mobile devices,' Internet radio will soon become widely available on …


Solutions Are On Track, Beth A. Thomas Jan 2003

Solutions Are On Track, Beth A. Thomas

Vanderbilt Journal of Entertainment & Technology Law

This Note discusses the need to solve the copyright problems caused by digital file sharing over peer-to-peer networks and the possible solutions that would be acceptable to both the media industries and the public. While it is likely that the problems caused by file sharing will not decrease significantly by placing post-sales control in the hands of the artists, it is probable that legislative and industry driven technical counter-measures will be able to decrease illegal file sharing in an acceptable way.

Part I outlines copyright in general and how digital technology is pushing at the boundaries of copyright law. Part …


Is There Judicial Recourse To Attack Spammers?, Ashley L. Rogers Jan 2003

Is There Judicial Recourse To Attack Spammers?, Ashley L. Rogers

Vanderbilt Journal of Entertainment & Technology Law

This Note will discuss the issue of non-commercial spam through the prism of a case recently decided by the California Supreme Court, Intel v. Hamidi. Until recently there was no federal regulation for unwanted electronic communication and common law was the only potential solution. Part I of this Note will discuss the nature of spam, focusing on the distinction between commercial e-mail and bulk e-mail and the importance therein. Part II will detail the history and the legal doctrine of trespass as it applies to the Internet. Part III will summarize the case of Intel v. Hamidi as it struggled …


The Digital Music Dilemma: Protecting Copyright In The Age Of Peer-To-Peer File Sharing, Natalie Koss Jan 2003

The Digital Music Dilemma: Protecting Copyright In The Age Of Peer-To-Peer File Sharing, Natalie Koss

Vanderbilt Journal of Entertainment & Technology Law

This paper seeks a resolution between the need to eliminate copyright infringement and the desire to encourage new technology. This paper will suggest that the music industry would be better off directing resources toward solutions such as compulsory licensing, royalty collection, and working with hardware manufacturers to discourage copyright infringement. These solutions would allow the industry to take advantage of file sharing now rather than expending resources in court where the desired result of ending P2P programs may never come.


From Subway Stations To The Information Superhighway: Compliance Strategies For Musicians To Avoid The Worldwide Entanglement Of Privacy Laws, Yvenne M. King Jan 2002

From Subway Stations To The Information Superhighway: Compliance Strategies For Musicians To Avoid The Worldwide Entanglement Of Privacy Laws, Yvenne M. King

Vanderbilt Journal of Entertainment & Technology Law

In light of the fact that operating a website raises many complex legal issues covering numerous areas of law, this Article focuses on one area that musicians, as website owners, should address: their potential liability for third-party claims based upon violation of consumer privacy laws. This Article first discusses the importance for musician website operators of protecting consumers' privacy rights. Second, it addresses the need to establish a "global privacy compliance plan" to limit musicians' legal liabilities. Finally, it explains how musicians can go about creating such a plan by developing "minimum guidelines" and "privacy practices." ... For purposes of …


Book Publishing In The Age Of The E-Book, Nancy B. Vermylen Jan 2002

Book Publishing In The Age Of The E-Book, Nancy B. Vermylen

Vanderbilt Journal of Entertainment & Technology Law

Whatever role e-publishing is ultimately to assume in the publishing world, its emergence calls for the (re)evaluation of significant legal issues affecting the contractual relationship of authors and publishers. This Note identifies some of those issues, and where appropriate, suggests some tentative solutions. Part II of this Note sets e-publishing and the concerns it raises in context by providing a brief discussion of the traditional book publishing industry and the roles that publishing contracts and personal relationships play in that industry. Part III provides an introduction to the emerging world of e-publishing and e-books. Part IV discusses the legal issues …


The Peer-To-Peer Revolution: A Post-Napster Analysis Of The Rapidly Developing File Sharing Technology, Joseph A. Sifferd Jan 2002

The Peer-To-Peer Revolution: A Post-Napster Analysis Of The Rapidly Developing File Sharing Technology, Joseph A. Sifferd

Vanderbilt Journal of Entertainment & Technology Law

This Note will focus on A&M Records, Inc. v. Napster, Inc. and will include an analysis of copyright law applicable to the legality of the incipient peer-to-peer file-sharing technology. The first section provide a brief factual history and introduction to the Napster legal discussion. The second Section of this Note will include a survey of relevant copyright doctrines, followed by a discussion of the Ninth Circuit's analysis of these doctrines as applied to the facts presented in "Napster." Finally, I will address the future of the peer-to-peer phenomenon, including a review and analysis of different types of peer-to-peer networks that …


E-Pluribus Unum?: The Problem Of Anonymous Election-Related Communications On The Internet, Paul A. Werner, Iii Jan 2002

E-Pluribus Unum?: The Problem Of Anonymous Election-Related Communications On The Internet, Paul A. Werner, Iii

Vanderbilt Journal of Entertainment & Technology Law

This Note discusses an aspect of this fundamental question in the context of one provision of the FECA. The FECA's identification requirement, section 441d, prohibits anonymous communications via mass media when any person makes an expenditure for the purpose of financing communications expressly advocating the election or defeat of clearly identified candidates. The mass media included are broadcast, print, direct mail, outdoor advertising facilities, and any other general public political advertising. Communications triggering this provision must contain clear information identifying who paid for and who authorized them. The statute delineates three possible required disclosures: (1) that the communication has been …


Cyberjacking, Mouse Trapping, And The Ftc Act: Are Federal Consumer Protection Laws Helping Or Hurting Online Consumers?, Kenneth Sanney Jan 2001

Cyberjacking, Mouse Trapping, And The Ftc Act: Are Federal Consumer Protection Laws Helping Or Hurting Online Consumers?, Kenneth Sanney

Vanderbilt Journal of Entertainment & Technology Law

Only the Federal Trade Commission (FTC) can bring a federal cause of action against a company whose business practices or actions deceive consumers. However, the FTC's power is limited; it can intervene on behalf of consumers only when there is a pattern of misconduct by the business that threatens the public interest. But where the scams themselves are difficult to spot, patterns may be virtually impossible to establish. Moreover, even successful FTC actions may yield little in the way of preventative or compensatory benefit for the individual user.

My aim in this Note, therefore, is to offer one possible means …


Irreconcilable Congressional Treatment Of Internet Service Providers As Speakers, Raymond Shih Ray Ku Jan 2001

Irreconcilable Congressional Treatment Of Internet Service Providers As Speakers, Raymond Shih Ray Ku

Vanderbilt Journal of Entertainment & Technology Law

This Article argues that under the CDA and OCILLA, Congress adopted facially inconsistent approaches towards ISP liability for expression. Nonetheless, despite the overt differences, it is possible to discern an underlying principle for determining when ISPs should be considered speakers that reconciles this inconsistency. Put simply, the CDA and OCILLA support an approach toward determining when ISPs are speakers that focuses on whether an ISP exercises editorial control over its network. This approach is evidenced by the fact that both statutes recognize that ISPs are able to exercise editorial control over any and all content on their networks, and both …


Why Traditional Insurance Policies Are Not Enough: The Nature Of Potential E-Commerce Losses & Liabilities, Anna Lee Jan 2001

Why Traditional Insurance Policies Are Not Enough: The Nature Of Potential E-Commerce Losses & Liabilities, Anna Lee

Vanderbilt Journal of Entertainment & Technology Law

There are two general categories of insurance policies: first-party policies and third-party/liability policies. First-party polices provide benefits directly to policyholders for losses suffered by the policyholders. For example, fire damage to the policyholder's plant or financial loss resulting from the interruption of the policyholder's business would be covered under the first-party insurance. Generally, these first-party losses are covered under policies such as "all risk," "named peril," "business interruption," or "expense to reduce loss" coverages. Among these various types of first-party policies, "all risk" insurance policies provide the broadest coverages.

Third-party or liability policies provide protection for claims against the policyholder …


Changing Horses In Mid-Stream: The Copyright Office's New Rule Makes Broadcasters Pay For "Streaming" Their Signals Over The Internet, Samuel Fifer, Gregory R. Naron Jan 2001

Changing Horses In Mid-Stream: The Copyright Office's New Rule Makes Broadcasters Pay For "Streaming" Their Signals Over The Internet, Samuel Fifer, Gregory R. Naron

Vanderbilt Journal of Entertainment & Technology Law

With traditional, over-the-air broadcasts, radio stations do not have to start paying license fees to rights holders if they get a bigger transmitter or technology allows their signal to reach more listeners. That much, not even the RIAA will dispute. So why should it matter if stations use the Internet to reach additional listeners? The law shouldn't be interpreted to discourage radio stations from using new Internet technology to do the same thing they're doing now--especially since Congress itself expressly said it did not want to "[hamper] ... new technologies" or "impose new and unreasonable burdens" on broadcasters. And make …


Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post Jan 2000

Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post

Vanderbilt Journal of Entertainment & Technology Law

MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …


How To Can Spam, Gary Miller Jan 2000

How To Can Spam, Gary Miller

Vanderbilt Journal of Entertainment & Technology Law

Receiving unsolicited commercial email, also known as "Spam," is like receiving junk mail, postage due. Spam shifts the cost of advertising from the advertiser to the consumer. This imposes enormous costs on Internet Service Providers (ISPs) and their customers. The Spam problem cries out for a legislative solution, and that is why I introduced H.R. 2162, the "Can Spam Act." The source of the Spam moniker for unsolicited commercial e-mail is apparently attributed to an annoying song in a Monty Python skit. In the skit, actors dressed like Vikings sing the word "Spam" over and over again, becoming louder and …


The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney Jan 2000

The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney

Vanderbilt Journal of Entertainment & Technology Law

The text of the ADA does not support such an extension. The interpretative canons of "noscitur a sociis" and "ejusdem generis" dictate that "places of public accommodation" refer exclusively to physical facilities. The canons also sufficiently resolve any possible statutory ambiguities, thereby foreclosing the opportunity for contrary agency interpretations. Although the intentionally broad purpose and design of the ADA make the statute an attractive avenue for advocates of online expansion, that same purpose and design limit the ADA to physical facilities. This note addresses the issues in two parts. First, it presents the arguments just listed. Second, it recognizes the …