Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 101

Full-Text Articles in Law

Copyright's Knowledge Principle, Jenny L. Sheridan Jan 2014

Copyright's Knowledge Principle, Jenny L. Sheridan

Vanderbilt Journal of Entertainment & Technology Law

This Article argues that copyright jurisprudence has lost sight of the knowledge principle at the heart of the constitutional justification for copyright. The Framers envisioned the objective of copyright as promoting the advancement of knowledge for a democratic society by increasing access to published works. Under what is best termed the "knowledge principle," access to existing knowledge is a necessary condition for the creation of new knowledge. Copyright jurisprudence has largely protected the interests of producers--from early booksellers to modern Hollywood film companies--failing to notice the central role of access to works as a necessary pre-condition to the creation of …


Buy My Vote: Online Reviews For Sale, Kendall L. Short Jan 2013

Buy My Vote: Online Reviews For Sale, Kendall L. Short

Vanderbilt Journal of Entertainment & Technology Law

The Internet has granted consumers access to a wealth of information to use in researching products and services. A substantial portion of this information consists of online consumer reviews, which hold great influence over consumers' purchasing decisions due to their perceived honesty and independence from the company. The problem with relying on these reviews, however, is that real consumers may not be the authors; instead, companies often hire writers to fabricate reviews, known as "opinion spam," which can either be positive for the hiring company or negative toward an innocent competitor. Because these fake reviews are difficult to detect, both …


Sexual Privacy In The Internet Age: How Substantive Due Process Protects Online Obscenity, Jennifer M. Kinsley Jan 2013

Sexual Privacy In The Internet Age: How Substantive Due Process Protects Online Obscenity, Jennifer M. Kinsley

Vanderbilt Journal of Entertainment & Technology Law

Obscenity is one of the narrow categories of speech that has historically lacked First Amendment free-speech protection, and courts and scholars alike have wrestled with the indefinable and often unworkable nature of the obscenity test. The advent of the Internet has both intensified and yet potentially resolved these problems. Recent Supreme Court cases, such as Lawrence v. Texas, suggest that sexually explicit expression that falls outside the scope of the First Amendment may nevertheless be entitled to privacy protection under Fourteenth Amendment substantive due process. Yet Lawrence's potential applicability to online obscenity has created tension in lower-court decisions and produced …


Compelled Production Of Encrypted Data, John E.D. Larkin Jan 2012

Compelled Production Of Encrypted Data, John E.D. Larkin

Vanderbilt Journal of Entertainment & Technology Law

There is a myth that shadowy and powerful government agencies can crack the encryption software that criminals use to protect computers filled with child pornography and stolen credit card numbers. The reality is that cheap or free encryption programs can place protected data beyond law enforcement's reach. If courts seriously mean to protect the victims of Internet crime--all too often children--then Congress must adopt a legal mechanism to remedy the technological deficiency.

To date, police and prosecutors have relied on subpoenas to either compel defendants to produce their password, or to decipher their protected data. This technique has been met …


Promoting Trademark's Ends And Means Through Online Contributory Liability, E. Jordan Teague Jan 2012

Promoting Trademark's Ends And Means Through Online Contributory Liability, E. Jordan Teague

Vanderbilt Journal of Entertainment & Technology Law

Trademark law accomplishes its ultimate end--helping consumers easily find, distinguish between, and trust products and services from different brands--through the means of giving markholders an incentive to develop and cultivate these brands in the first place. While individual trademark laws should serve these ends and means, this is not the case with contributory infringement in the United States as applied to the Internet. First, since the doctrine is based entirely in common law with little case law specifically addressing the online context, contributory infringement gives online service providers (OSPs) little notice as to what types of behaviors could result in …


"Do-Not-Track" As Contract, Joshua A.T. Fairfield Jan 2012

"Do-Not-Track" As Contract, Joshua A.T. Fairfield

Vanderbilt Journal of Entertainment & Technology Law

Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically--telephone numbers do not change, whereas Internet protocol (IP) addresses may …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert H. Sloan Jan 2012

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert H. Sloan

Vanderbilt Journal of Entertainment & Technology Law

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors website advertising as closely as possible to individual interests. The vast majority of consumers want considerably more control over our information. Consumers nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data …


The Romantic Collective Author, Margaret Chon Jan 2012

The Romantic Collective Author, Margaret Chon

Vanderbilt Journal of Entertainment & Technology Law

Although the romantic collective author is a much more elusive creature than its romantic individual counterpart, it can be discerned amidst the proliferation of expression on the Internet. This Article first outlines the ways in which the romantic author effect operates through both its genius and its arbiter prongs within collaborative authorship practices in digital networks. It next turns to scientific collaboration, where this author effect is attenuated, to assess whether scientific authorship practices might contribute to a more realistic and less romantic understanding of expressive authorship practices. A subsequent case study of collaborative digital authorship by Wikipedia contributors uncovers …


Curbing Copyblight, John Tehranian Jan 2012

Curbing Copyblight, John Tehranian

Vanderbilt Journal of Entertainment & Technology Law

This Article identifies and analyzes the growing problem of "copyblight" the use of overreaching claims by putative copyright holders to ownership of public domain works, and, more broadly, to exclusive rights which they do not hold in copyrighted works. Despite the fact that copyblight circumscribes political and social discourse, stifles creativity, and constricts the dissemination of information, present law provides few, if any, disincentives against the practice. Building on the groundbreaking work of Paul Heald and Jason Mazzone, this Article advances three proposals to temper the problems of overreach in order to restore a needed balance in our copyright system: …


The Risks Of Taking Facebook At Face Value: Why The Psychology Of Social Networking Should Influence The Evidentiary Relevance Of Facebook Photographs, Kathryn R. Brown Jan 2012

The Risks Of Taking Facebook At Face Value: Why The Psychology Of Social Networking Should Influence The Evidentiary Relevance Of Facebook Photographs, Kathryn R. Brown

Vanderbilt Journal of Entertainment & Technology Law

Social networking sites in general, and Facebook in particular, have changed the way individuals communicate and express themselves. Facebook users share a multitude of personal information through the website, especially photographs. Additionally, Facebook enables individuals to tailor their online profiles to project a desired persona. However, as social scientists have demonstrated, the image users portray can mislead outside observers. Given the wealth of information available on Facebook, it is no surprise that attorneys often peruse the website for evidence to dispute opponents' claims.

This Note examines the admission and relevance of Facebook photographs offered to prove a litigant's state of …


Implementing An Online Dispute Resolution Scheme: Using Domain Name Registration Contracts To Create A Workable Framework, Michael G. Bowers May 2011

Implementing An Online Dispute Resolution Scheme: Using Domain Name Registration Contracts To Create A Workable Framework, Michael G. Bowers

Vanderbilt Law Review

Online businesses have grown tremendously in the past decade. As a larger percentage of the U.S. economy moves onto the Internet, a larger percentage of people doing business online will find themselves disagreeing with each other. How those disputes are resolved presents an ongoing challenge in a world where traditional ordering mechanisms, like geographical boundaries, become increasingly antiquated. As contracts are formed across state and national lines, dispute resolution systems built around spatial locations become ever more unwieldy. The complications and costs of securing a favorable decision from a far-off decisionmaking body make reliance on geographic-based systems exceedingly difficult. Out …


Edible Plagiarism: Reconsidering Recipe Copyright In The Digital Age, Meredith G. Lawrence Jan 2011

Edible Plagiarism: Reconsidering Recipe Copyright In The Digital Age, Meredith G. Lawrence

Vanderbilt Journal of Entertainment & Technology Law

Sharing recipes through food blogs is an increasingly popular activity. Bloggers publish their own recipes, claiming copyright protection, but they also publish others' recipes. Food publishers who distribute recipes online may be harmed when bloggers include the entire text of the food publisher's recipe on a blog without the publisher's knowledge or permission. The blogger's inclusion of an entire recipe often reduces site traffic to the food publisher's website, thereby damaging advertising revenues. Copyright law, as courts interpret it today, does not provide these publishers with recourse against bloggers who publish their recipes without permission.

This Note analyzes the various …


Is Online Copyright Enforcement Scalable?, Annemarie Bridy Jan 2011

Is Online Copyright Enforcement Scalable?, Annemarie Bridy

Vanderbilt Journal of Entertainment & Technology Law

This Article examines P2P file sharing and the copyright enforcement problem it has created through the lens of scalability. Part I traces the evolution of peer-to-peer (P2P) networks from Napster to BitTorrent, with a focus on the relative scalability of successive architectures. Part II takes up the difficult question of the scale of P2P infringement and its harms, examining the strategic number-crunching that underlies industry data on piracy, the government's credulous acceptance of that data, and the risk of letting industry hyperbole drive copyright policy and law enforcement priorities. Part III evaluates the efficacy of the Digital Millennium Copyright Act …


Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg Jan 2011

Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg

Vanderbilt Journal of Entertainment & Technology Law

In the last decade, email spam has become more than just an annoyance for email users. Unsolicited messages now comprise more than 95 percent of all email sent worldwide. This costs US businesses billions of dollars in lost productivity each year. The US Congress passed the CAN-SPAM Act of 2003 to regulate the spam industry. Unfortunately, data show that spam only increased since the Act's passage. Part of the reason for this failure is that the Act only authorizes the Federal Trade Commission, state attorneys general, and Internet Service Providers to bring action under its provisions. Each of these authorized …


Information Wars And The Challenges Of Content Protection In Digital Contexts, Raymond T. Nimmer Jan 2011

Information Wars And The Challenges Of Content Protection In Digital Contexts, Raymond T. Nimmer

Vanderbilt Journal of Entertainment & Technology Law

We are in the midst of a fundamental conflict in law and policy between those who favor maintaining and expanding copyright and related rights in the digital context ("rights enhancers"), and those who favor letting rights atrophy ("rights restrictors'). This Article argues that strong intellectual property rights are essential. At minimum, they are important to support creativity in contexts where the creation, collection, or distribution of the content requires substantial investment of time and resources. The case for allowing creators' rights to weaken is both untested and structurally suspect. Copyright law must construct a balance that fully supports creative activity …


Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton Jan 2011

Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton

Vanderbilt Journal of Entertainment & Technology Law

Direct copyright infringement attracts strict liability. However, as a theoretical matter, it is not necessarily clear why. Legislatures and courts have typically imposed strict liability where: (a) a defendant has notice of a plaintiff's rights, particularly where those rights involve a property interest; (b) a mens rea requirement on the part of the defendant would create an untenable burden on the plaintiff; (c) it is easier for the defendant to avoid harming the plaintiff than it is for the plaintiff to avoid the harm; or, (d) it is more administratively or economically efficient for the defendant to bear the risk …


Constitutionality Of Cyberbullying Laws: Keeping The Online Playground Safe For Both Teens And Free Speech, Alison V. King Apr 2010

Constitutionality Of Cyberbullying Laws: Keeping The Online Playground Safe For Both Teens And Free Speech, Alison V. King

Vanderbilt Law Review

The Internet is a blessing and a curse. Along with the manifold benefits the Internet provides-electronic research, instantaneous news, social networking, online shopping, to name a few-comes a host of dangers: online harassment and cyberbullying, hacking, voyeurism, identity theft, phishing, and perhaps still more perils that have yet to appear. The Internet creates a virtual world that can result in very real consequences for people's lives. This creates a challenge for parents, schools, and policymakers attempting to keep pace with rapidly developing technologies and to provide adequate protections for children. The even greater challenge, however, is to balance these vital …


Libraries, Digital Content, And Copyright, Laura N. Gasaway Jan 2010

Libraries, Digital Content, And Copyright, Laura N. Gasaway

Vanderbilt Journal of Entertainment & Technology Law

Libraries use, acquire, create and host generate digital content. They digitize their existing collections of works such as letters, diaries and manuscripts and post them on library websites. Increasingly, libraries are utilizing digital technology to preserve library works which may or may not be made available to the public. Libraries also create, manage and host user generated content such as posts on discussion boards, blogs, wikis, RSS feeds, social bookmarking, tagging, and social networks. Libraries use user generated content for internal library purposes, such as displays and events and for teaching. Further, libraries often are asked to assist users who …


No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman Jan 2010

No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman

Vanderbilt Journal of Entertainment & Technology Law

Internet search engines such as Google and Yahoo! earn a majority of their profit from selling advertisements to appear next to search results. Google's coveted advertising space, however, causes nightmares for trademark holders when their trademarks are auctioned by Google to competitors as keywords to trigger the competitors' advertisements when the trademark is used as a search term. Advertisers strategically bid on trademarks of competitors to ensure that their ads appear whenever the trademark is used as a search term, instead of the advertisements of the trademark holder. For example, Nike could bid on the trademark for "Adidas," with the …


Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis Jan 2010

Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis

Vanderbilt Journal of Entertainment & Technology Law

Google Books will likely become the world's most extensive book and magazine search and browsing resource, library, and bookstore--combined. However, as users necessarily reveal personal identifying information through their book searches and reading habits, this service poses a significant threat to personal privacy.

Because the Google Books Amended Settlement Agreement neglects to meaningfully address user privacy, the only available privacy protections are the limited rights bestowed by the Google Books Privacy Policy and the Google Privacy Policy. Unfortunately, these Privacy Policies protect the interests of Google at the expense of users.

The enactment of federal privacy statutes, which include provisions …


Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison Apr 2009

Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison

Vanderbilt Law Review

Now that federal court records are available online, anyone can obtain criminal case files instantly over the Internet. But this unfettered flow of information is in fundamental tension with many goals of the criminal justice system, including the integrity of criminal investigations, the accountability of prosecutors, and the security of witnesses. It has also altered the behavior of prosecutors intent on protecting the identity of cooperating defendants who assist them in investigating other targets. As prosecutors and courts collaborate to obscure the process by which cooperators are recruited and rewarded, Internet availability risks degrading the value of the information obtained …


Combating Incitement To Terrorism On The Internet: Comparative Approaches In The United States And United Kingdom And The Need For An International Solution, Elizabeth M. Renieris Jan 2009

Combating Incitement To Terrorism On The Internet: Comparative Approaches In The United States And United Kingdom And The Need For An International Solution, Elizabeth M. Renieris

Vanderbilt Journal of Entertainment & Technology Law

In recent years, terrorist use of the Internet has been gaining in popularity, with more than several thousand radical or extremist websites in existence today. Because the Internet transcends physical and geographic boundaries, combating terrorist incitement on the Internet requires cross-border global cooperation. Although the international community has taken steps to combat the problem with United Nations Security Council Resolutions 1373 and 1624, the state parties to these resolutions have been unable to close the significant holes in the current international legal framework, and there is little evidence that terrorist use of the Internet for purposes of incitement is being …


We're Friends, Right? Client List Misappropriation And Online Social Networking In The Workplace, Brian V. Wyk Jan 2009

We're Friends, Right? Client List Misappropriation And Online Social Networking In The Workplace, Brian V. Wyk

Vanderbilt Journal of Entertainment & Technology Law

Social networks, such as Facebook, MySpace, and LinkedIn have grown tremendously over the past decade, and today they claim over 200 million users between the three services. A great number of smaller social networks have also appeared, and new services are constantly being created. With the vast growth of social networking has come the use of social networking in business. As businesses have sought to exploit the wealth of information that social network users share over these networks, businesses have encountered the problem of protecting the compilations of information they have produced. The problem became clear in 2008 when a …


Internet Retailers And Intertype Competition: How The Supreme Court's Incomplete Analysis In Leegin V. Psks Leaves Lower Courts Improperly Equipped To Consider Modern Resale Price Maintenance Agreements, Daniel B. Nixa Jan 2009

Internet Retailers And Intertype Competition: How The Supreme Court's Incomplete Analysis In Leegin V. Psks Leaves Lower Courts Improperly Equipped To Consider Modern Resale Price Maintenance Agreements, Daniel B. Nixa

Vanderbilt Journal of Entertainment & Technology Law

In Leegin Creative Leather Products, Inc. v. PSKS, Inc., the U.S. Supreme Court held that resale price maintenance (RPM) agreements are to be judged under the rule of reason. An RPM agreement is an agreement between a manufacturer and retailers stipulating that retailers will charge a certain price for the manufacturer's products. This Note argues that the Supreme Court should have instructed lower courts to consider intertype competition in addition to interbrand and intrabrand competition when evaluating RPM agreements under the rule of reason. Two reasons lead to this conclusion. First, the Internet has invigorated intertype competition and has made …


Working Toward Spontaneous Copyright Licensing: A Simple Solution For A Complex Problem, Tanya M. Woods Jan 2009

Working Toward Spontaneous Copyright Licensing: A Simple Solution For A Complex Problem, Tanya M. Woods

Vanderbilt Journal of Entertainment & Technology Law

As the web evolves, so too are discussions on how to manage the rights of copyright owners online. Finding a solution that is balanced and that accounts for the international nature of the Internet is essential. While many have attempted to craft such a solution, a model that accommodates the spontaneity of copyright content users and that recognizes the multi-territorial nature of the Internet has yet to materialize. For this reason, this Article formulates a macro-level conceptual approach to building a practical copyright licensing model that could generate spontaneous digital copyright licenses to accommodate the creative impulses of web users …


"Transformative" User-Generated Content In Copyright Law: Infringing Derivative Works Or Fair Use?, Mary W.S. Wong Jan 2009

"Transformative" User-Generated Content In Copyright Law: Infringing Derivative Works Or Fair Use?, Mary W.S. Wong

Vanderbilt Journal of Entertainment & Technology Law

In the United States, the line between the type and level of transformation required for a copyrightable derivative work and that required to constitute fair use has not been drawn clearly. With the rise of user-generated content, this question (which arises in two distinct copyright contexts) has become even more important. At the same time, copyright law has generally shied away from defining authorship as a legal concept, preferring instead to develop and rely on the related (but not identical) concept of originality. This has resulted in a low copyrightability threshold that does not adequately account for the fact that …


Mass Culture And The Culture Of The Masses: A Manifesto For User-Generated Rights, Debora Halbert Jan 2009

Mass Culture And The Culture Of The Masses: A Manifesto For User-Generated Rights, Debora Halbert

Vanderbilt Journal of Entertainment & Technology Law

User-generated content is a term used to describe the division between culture produced as a commodity for consumption and the culture that is generated by people acting as creative beings without any market incentive. While under current copyright law all types of creativity are protected, the laws of copyright exist primarily to protect commercial forms of expression, not the non-commercial ones that form the foundation of user-generated content. The disconnect between what current copyright law protects and how most people create generates tensions that must be addressed. This Article presents an argument for broader protection of all creative work, including …


The Magic Circle, Joshua A.T. Fairfield Jan 2009

The Magic Circle, Joshua A.T. Fairfield

Vanderbilt Journal of Entertainment & Technology Law

This Article examines the concept of the "magic circle," the metaphorical barrier that supposedly excludes real-world law from virtual worlds. The Article argues that this metaphor fails because there is no "real" world as distinguished from "virtual" worlds. Instead of a magic circle, this Article advocates a rule of consent: actions in a virtual world give rise to legal liability if they exceed the scope of consent given by other players within the game. The Article concludes that although real-world law cannot reasonably be excluded from virtual worlds, game gods and players can control the interface between law and virtual …


Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril Jan 2009

Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril

Vanderbilt Journal of Entertainment & Technology Law

Users of social networking websites tend to disclose much personal information online yet seem to retain some form of an expectation of privacy. Is this expectation of privacy always unreasonable? How do users of online social networks define their expectations of privacy online?

These questions were the impetus behind an empirical study, the findings of which are presented in this Article. The project, simultaneously conducted in Canada, at Ryerson University, and in the United States, at the University of Miami, consisted of a survey regarding personal information protection and expectations of privacy on online social networks (OSNs). Approximately 2,500 young …


Increasing Global Demand For An Uncensored Internet, Andrew W. Lloyd Jan 2008

Increasing Global Demand For An Uncensored Internet, Andrew W. Lloyd

Vanderbilt Journal of Transnational Law

This Note discusses efforts to defeat government censorship of the Internet. In the narrow meaning of that idea, this Note initially discusses technological efforts to circumvent government-imposed Internet firewalls; in the broader sense, it addresses the larger goal of inducing censoring governments to bring their firewalls down. Proposed U.S. legislation would provide U.S. government funding of censorship circumvention technology. This Note discusses why such funding is not a good approach. Absent larger international efforts, private action--within both the U.S. and censoring countries--has the best chance of bringing down government-run firewalls. This Note discusses how the U.S. government can best facilitate …