Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Series

2004

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 47

Full-Text Articles in Law

Uncle Sam Is Watching You, David Cole Nov 2004

Uncle Sam Is Watching You, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi Nov 2004

Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi

Amicus Briefs

Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


Internet Pharmacies: Why State Regulatory Solutions Are Not Enough, Linda C. Fentiman Oct 2004

Internet Pharmacies: Why State Regulatory Solutions Are Not Enough, Linda C. Fentiman

Elisabeth Haub School of Law Faculty Publications

Internet pharmacies are an economic and communications miracle--and a regulatory nightmare. It is estimated that Americans spent some $3.2 billion in 2003 on medications from the Internet, but Internet pharmacies permit consumers to evade long-standing regulatory protections, particularly those that rely on the oversight of drug prescribing and dispensing by licensed physicians and pharmacists.


The Origins Of Cctld Policymaking, Peter K. Yu Oct 2004

The Origins Of Cctld Policymaking, Peter K. Yu

Faculty Scholarship

Extract:

A long time ago in a galaxy not so far away, there was a decentralized global network of computers. These computers shared information with each other regardless of how far apart they were and whether there was any direct line of communication between them. In the very beginning, this network was used exclusively by government and military agencies, educational and research institutions, government contractors, scientists, and technology specialists. Instead of the domain names we use today, such as “www. amazon.com,” users typed in numeric addresses, such as “123.45.67.89,” and, later, host names to send information to other computers.

This …


Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan Sep 2004

Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 58 - Deposition Of Rose Hagan From Geico V. Google (Google Managing Counsel Trademarks), Rose Hagan Sep 2004

Vol. Ix, Tab 46 - Ex. 58 - Deposition Of Rose Hagan From Geico V. Google (Google Managing Counsel Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck Jun 2004

Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 41 - Ex 6 - Google Three Ad Policy Changes, Google Apr 2004

Vol. Ix, Tab 41 - Ex 6 - Google Three Ad Policy Changes, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Communicating Entitlements: Property And The Internet, William Hubbard Apr 2004

Communicating Entitlements: Property And The Internet, William Hubbard

All Faculty Scholarship

No abstract provided.


No Wonder They Dislike Us: Us Admonishes Europe For Protecting Itself From Microsoft's Predation, Albert A. Foer, Robert H. Lande Mar 2004

No Wonder They Dislike Us: Us Admonishes Europe For Protecting Itself From Microsoft's Predation, Albert A. Foer, Robert H. Lande

All Faculty Scholarship

This short article applauds the European Commission for holding that Microsoft violated European competition laws, and admonishes the U.S. for criticizing the Europeans for protecting themselves from Microsoft's anticompetitive activity.


Vol. Ix, Tab 46 - Ex. 40 - Document Tmprocess.Txt Trademark Meeting 3/4, Google Mar 2004

Vol. Ix, Tab 46 - Ex. 40 - Document Tmprocess.Txt Trademark Meeting 3/4, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 30 - Document Google Trademark Policy Task Force, Google Feb 2004

Vol. Ix, Tab 46 - Ex. 30 - Document Google Trademark Policy Task Force, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xxiii, Tab 60 - Ex. 7 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria Feb 2004

Vol. Xxiii, Tab 60 - Ex. 7 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 38 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria Feb 2004

Vol. Ix, Tab 46 - Ex. 38 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll Jan 2004

Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Many participants in the music industry consider unauthorized transmissions of music files over the Internet to be theft of their property. Many Internet users who exchange music files reject this characterization. Prompted by the dispute over unauthorized music distribution, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing music making in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some …


Site Finder And Internet Governance, Jonathan Weinberg Jan 2004

Site Finder And Internet Governance, Jonathan Weinberg

Law Faculty Research Publications

No abstract provided.


"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin Jan 2004

"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin

Faculty Scholarship

Commentators frequently claim that there is no single, coherent doctrine of extra-territorial personal jurisdiction, and, unfortunately, they are correct. The International Shoe case, commonly (but inaccurately) thought of as the wellspring of the modern form of the doctrine, announced a relatively straightforward, two-factor, four-permutation test that worked well for resolving most cases. In the nearly sixty-year period following Shoe, however, as the Supreme Court expanded and refined the standard, what was once straightforward and uncomplicated became serendipitous and convoluted. Two general, and generally incompatible, versions of the doctrine competed for dominance. The first, what might best be described as …


Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler Jan 2004

Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler

UIC Law Open Access Faculty Scholarship

The role of libraries in American society is varied: libraries act as curators and repositories of American culture's recorded knowledge, as places to communicate with others, and as sources where one can gain information from books, magazines and other printed materials, as well as audio-video materials and the Internet. Courts in the United States have called libraries "the quintessential locus of the receipt of information, "'places that are "dedicated to quiet, to knowledge, and to beauty," and "a mighty resource in the free marketplace of ideas." These positive views of libraries are often in sharp contrast with views by some …


Toward A Criminal Law For Cyberspace: A New Model Of Law Enforcement?, Susan W. Brenner Jan 2004

Toward A Criminal Law For Cyberspace: A New Model Of Law Enforcement?, Susan W. Brenner

School of Law Faculty Publications

This article argues that one consequence of the increasing proliferation of computer technology and the attendant migration of human activities, including illegal activities, into cyberspace is that the efficacy of our traditional approach to enforcing the criminal law is eroding. (1) As Section II explains, it is already apparent that the traditional model is not an effective means of dealing with cybercrime, i.e., crime the commission of which entails the use of computer technology. (2)

We are therefore seeing the emergence of an alternative approach to law enforcement, (3) one that emphasizes collaboration between the public and private sectors and …


Toward A Criminal Law For Cyberspace: Distributed Security, Susan W. Brenner Jan 2004

Toward A Criminal Law For Cyberspace: Distributed Security, Susan W. Brenner

School of Law Faculty Publications

Cybercrime creates unique challenges for the reactive model of crime control that has been predominant for approximately the last century and a half. That model makes certain assumptions about crime, which derive from characteristics of real-world crime. These assumptions do not hold for cybercrime, so the reactive model is not an appropriate means of dealing with online crime. The article explains how modified principles of criminal law can be utilized to implement a new, non-reactive model which can deal effectively with cybercrime. This model of distributed security emphasizes prevention, rather than reaction, which is achieved by holding citizens liable for …


Internet Contracting And Standard Terms In The Global Electronic Age: Perspectives For Japan, James Maxeiner Jan 2004

Internet Contracting And Standard Terms In The Global Electronic Age: Perspectives For Japan, James Maxeiner

All Faculty Scholarship

This piece is intended to show Japanese law students how their own everyday experiences raise significant domestic and international legal questions. It shows that a seemingly technical matter need not be boring, but can provide an example of practical application of law internationally and of the benefits that knowledge of foreign law can bring in assisting in understanding and improving domestic law. It discusses standard terms in licenses of information and software.


Does The Child Online Protection Act Violate The First Amendment?, Susanna Frederick Fischer Jan 2004

Does The Child Online Protection Act Violate The First Amendment?, Susanna Frederick Fischer

Scholarly Articles

The Supreme Court weighs in for a second time in the more than 5-year-old court battle over whether the Child Online Protection Act drafters have rectified the constitutional defects of the Communications Decency Act, which the Court struck down in 1997 on First Amendment grounds. In an effort to cure the CDA's lack of "narrow tailoring," the drafters of COPA have more narrowly defined the speech that is being regulated and have also narrowed the speakers who are subject to regulation.


Technology And The Internet: The Impending Destruction Of Privacy By Betrayers, Grudgers, Snoops, Spammers, Corporations And The Media, Clifford S. Fishman Jan 2004

Technology And The Internet: The Impending Destruction Of Privacy By Betrayers, Grudgers, Snoops, Spammers, Corporations And The Media, Clifford S. Fishman

Scholarly Articles

This Article reviews how the Internet and related developments-technological, social, and legal-have magnified the threat to privacy posed by private individuals, commercial enterprises, and the media. It offers a brief overview of the current threats to privacy from sources other than the government, and, in particular, the impact of the Internet in creating or magnifying those threats. Part I discusses the threat to privacy in general, examining how the Internet and developments in surveillance technology, in information storage and retrieval, in dissemination of information, sound, and images, and changes to the informal "social contract" that defines general standards have all …


Rise Of The Machines: Justice Information Systems And The Question Of Public Access To Court Records Over The Internet, Gregory Silverman Jan 2004

Rise Of The Machines: Justice Information Systems And The Question Of Public Access To Court Records Over The Internet, Gregory Silverman

Faculty Articles

Professor Silverman discusses the machines that have been taking up positions in the court houses for more than a quarter of a century. These machines are becoming an integrated network integral to the workings of the court. With the assistance of the machines, the myriad and diverse members of the justice and public safety communities together with the public will evolve into a single complex whole that could dedicate itself to creating a more humane and just society comprised of better informed individuals to whom they are genuinely accountable. There are those who fear the machines, afraid that personal privacy …


The Hegemony Of The Copyright Treatise, Ann Bartow Jan 2004

The Hegemony Of The Copyright Treatise, Ann Bartow

Law Faculty Scholarship

This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.

Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Jan 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue Jan 2004

Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue

Law Faculty Publications

The international community has been struggling with questions of who should regulate the Internet and how, but little consensus has emerged. For the United States, consideration of the pros and cons of the alternative jurisdictional approaches to e-commerce and cyberspace is complicated by an overlay of constitutional law. While the rest of the world considers the policy implications of a country of origin versus a country of destination approach, the United States is wrestling with what constitutes "purposeful availment" under the Due Process Clause.

The Supreme Court has never squarely considered what limits the Fifth Amendment imposes on assertions of …


Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh Jan 2004

Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh

All Faculty Scholarship

Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Jan 2004

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Journal Articles

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …