Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (8)
- Columbia Law School (7)
- University of Baltimore Law (3)
- University of Pittsburgh School of Law (3)
- American University Washington College of Law (2)
-
- Boston University School of Law (2)
- New York Law School (2)
- Notre Dame Law School (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Dayton (2)
- University of Pennsylvania Carey Law School (2)
- Georgetown University Law Center (1)
- Pace University (1)
- Seattle University School of Law (1)
- Texas A&M University School of Law (1)
- UIC School of Law (1)
- University of Colorado Law School (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- University of Richmond (1)
- University of Tulsa College of Law (1)
- University of Washington School of Law (1)
- Wayne State University (1)
- Keyword
-
- Internet (9)
- Google (8)
- Adwords (7)
- Copyright (6)
- 2004 (5)
-
- Trademark policy (5)
- Privacy (3)
- Antitrust (2)
- Broadband (2)
- Consumer confusion (2)
- Cyberspace (2)
- GEICO (2)
- Intellectual Property Law (2)
- Intellectual property (2)
- Law (2)
- Music (2)
- Narrative (2)
- Personal jurisdiction (2)
- Property (2)
- SSRN (2)
- Technology (2)
- Trademarked terms (2)
- Access controls (1)
- Administrative Procedure Act (1)
- Affiliate (1)
- Attribution rights (1)
- Authors rights (1)
- Automation (1)
- Boundaries (1)
- CPC (1)
- Publication
-
- Faculty Scholarship (11)
- Rosetta Stone v. Google (Joint Appendix) (8)
- All Faculty Scholarship (5)
- Articles (4)
- Articles & Chapters (2)
-
- Journal Articles (2)
- Scholarly Articles (2)
- School of Law Faculty Publications (2)
- Amicus Briefs (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Chapters in Books and Other Contributions to Scholarly Works (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Faculty Articles (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Law Faculty Publications (1)
- Law Faculty Research Publications (1)
- Law Faculty Scholarship (1)
- Publications (1)
- UIC Law Open Access Faculty Scholarship (1)
Articles 1 - 30 of 47
Full-Text Articles in Law
Uncle Sam Is Watching You, David Cole
Uncle Sam Is Watching You, David Cole
Georgetown Law Faculty Publications and Other Works
No abstract provided.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Amicus Briefs
Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
Internet Pharmacies: Why State Regulatory Solutions Are Not Enough, Linda C. Fentiman
Internet Pharmacies: Why State Regulatory Solutions Are Not Enough, Linda C. Fentiman
Elisabeth Haub School of Law Faculty Publications
Internet pharmacies are an economic and communications miracle--and a regulatory nightmare. It is estimated that Americans spent some $3.2 billion in 2003 on medications from the Internet, but Internet pharmacies permit consumers to evade long-standing regulatory protections, particularly those that rely on the oversight of drug prescribing and dispensing by licensed physicians and pharmacists.
The Origins Of Cctld Policymaking, Peter K. Yu
The Origins Of Cctld Policymaking, Peter K. Yu
Faculty Scholarship
Extract:
A long time ago in a galaxy not so far away, there was a decentralized global network of computers. These computers shared information with each other regardless of how far apart they were and whether there was any direct line of communication between them. In the very beginning, this network was used exclusively by government and military agencies, educational and research institutions, government contractors, scientists, and technology specialists. Instead of the domain names we use today, such as “www. amazon.com,” users typed in numeric addresses, such as “123.45.67.89,” and, later, host names to send information to other computers.
This …
Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan
Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 58 - Deposition Of Rose Hagan From Geico V. Google (Google Managing Counsel Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck
Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 41 - Ex 6 - Google Three Ad Policy Changes, Google
Vol. Ix, Tab 41 - Ex 6 - Google Three Ad Policy Changes, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Communicating Entitlements: Property And The Internet, William Hubbard
Communicating Entitlements: Property And The Internet, William Hubbard
All Faculty Scholarship
No abstract provided.
No Wonder They Dislike Us: Us Admonishes Europe For Protecting Itself From Microsoft's Predation, Albert A. Foer, Robert H. Lande
No Wonder They Dislike Us: Us Admonishes Europe For Protecting Itself From Microsoft's Predation, Albert A. Foer, Robert H. Lande
All Faculty Scholarship
This short article applauds the European Commission for holding that Microsoft violated European competition laws, and admonishes the U.S. for criticizing the Europeans for protecting themselves from Microsoft's anticompetitive activity.
Vol. Ix, Tab 46 - Ex. 40 - Document Tmprocess.Txt Trademark Meeting 3/4, Google
Vol. Ix, Tab 46 - Ex. 40 - Document Tmprocess.Txt Trademark Meeting 3/4, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 30 - Document Google Trademark Policy Task Force, Google
Vol. Ix, Tab 46 - Ex. 30 - Document Google Trademark Policy Task Force, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Xxiii, Tab 60 - Ex. 7 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria
Vol. Xxiii, Tab 60 - Ex. 7 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 38 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria
Vol. Ix, Tab 46 - Ex. 38 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll
Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
Many participants in the music industry consider unauthorized transmissions of music files over the Internet to be theft of their property. Many Internet users who exchange music files reject this characterization. Prompted by the dispute over unauthorized music distribution, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing music making in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some …
Site Finder And Internet Governance, Jonathan Weinberg
Site Finder And Internet Governance, Jonathan Weinberg
Law Faculty Research Publications
No abstract provided.
"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin
"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin
Faculty Scholarship
Commentators frequently claim that there is no single, coherent doctrine of extra-territorial personal jurisdiction, and, unfortunately, they are correct. The International Shoe case, commonly (but inaccurately) thought of as the wellspring of the modern form of the doctrine, announced a relatively straightforward, two-factor, four-permutation test that worked well for resolving most cases. In the nearly sixty-year period following Shoe, however, as the Supreme Court expanded and refined the standard, what was once straightforward and uncomplicated became serendipitous and convoluted. Two general, and generally incompatible, versions of the doctrine competed for dominance. The first, what might best be described as …
Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler
Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler
UIC Law Open Access Faculty Scholarship
The role of libraries in American society is varied: libraries act as curators and repositories of American culture's recorded knowledge, as places to communicate with others, and as sources where one can gain information from books, magazines and other printed materials, as well as audio-video materials and the Internet. Courts in the United States have called libraries "the quintessential locus of the receipt of information, "'places that are "dedicated to quiet, to knowledge, and to beauty," and "a mighty resource in the free marketplace of ideas." These positive views of libraries are often in sharp contrast with views by some …
Toward A Criminal Law For Cyberspace: A New Model Of Law Enforcement?, Susan W. Brenner
Toward A Criminal Law For Cyberspace: A New Model Of Law Enforcement?, Susan W. Brenner
School of Law Faculty Publications
This article argues that one consequence of the increasing proliferation of computer technology and the attendant migration of human activities, including illegal activities, into cyberspace is that the efficacy of our traditional approach to enforcing the criminal law is eroding. (1) As Section II explains, it is already apparent that the traditional model is not an effective means of dealing with cybercrime, i.e., crime the commission of which entails the use of computer technology. (2)
We are therefore seeing the emergence of an alternative approach to law enforcement, (3) one that emphasizes collaboration between the public and private sectors and …
Toward A Criminal Law For Cyberspace: Distributed Security, Susan W. Brenner
Toward A Criminal Law For Cyberspace: Distributed Security, Susan W. Brenner
School of Law Faculty Publications
Cybercrime creates unique challenges for the reactive model of crime control that has been predominant for approximately the last century and a half. That model makes certain assumptions about crime, which derive from characteristics of real-world crime. These assumptions do not hold for cybercrime, so the reactive model is not an appropriate means of dealing with online crime. The article explains how modified principles of criminal law can be utilized to implement a new, non-reactive model which can deal effectively with cybercrime. This model of distributed security emphasizes prevention, rather than reaction, which is achieved by holding citizens liable for …
Internet Contracting And Standard Terms In The Global Electronic Age: Perspectives For Japan, James Maxeiner
Internet Contracting And Standard Terms In The Global Electronic Age: Perspectives For Japan, James Maxeiner
All Faculty Scholarship
This piece is intended to show Japanese law students how their own everyday experiences raise significant domestic and international legal questions. It shows that a seemingly technical matter need not be boring, but can provide an example of practical application of law internationally and of the benefits that knowledge of foreign law can bring in assisting in understanding and improving domestic law. It discusses standard terms in licenses of information and software.
Does The Child Online Protection Act Violate The First Amendment?, Susanna Frederick Fischer
Does The Child Online Protection Act Violate The First Amendment?, Susanna Frederick Fischer
Scholarly Articles
The Supreme Court weighs in for a second time in the more than 5-year-old court battle over whether the Child Online Protection Act drafters have rectified the constitutional defects of the Communications Decency Act, which the Court struck down in 1997 on First Amendment grounds. In an effort to cure the CDA's lack of "narrow tailoring," the drafters of COPA have more narrowly defined the speech that is being regulated and have also narrowed the speakers who are subject to regulation.
Technology And The Internet: The Impending Destruction Of Privacy By Betrayers, Grudgers, Snoops, Spammers, Corporations And The Media, Clifford S. Fishman
Technology And The Internet: The Impending Destruction Of Privacy By Betrayers, Grudgers, Snoops, Spammers, Corporations And The Media, Clifford S. Fishman
Scholarly Articles
This Article reviews how the Internet and related developments-technological, social, and legal-have magnified the threat to privacy posed by private individuals, commercial enterprises, and the media. It offers a brief overview of the current threats to privacy from sources other than the government, and, in particular, the impact of the Internet in creating or magnifying those threats. Part I discusses the threat to privacy in general, examining how the Internet and developments in surveillance technology, in information storage and retrieval, in dissemination of information, sound, and images, and changes to the informal "social contract" that defines general standards have all …
Rise Of The Machines: Justice Information Systems And The Question Of Public Access To Court Records Over The Internet, Gregory Silverman
Rise Of The Machines: Justice Information Systems And The Question Of Public Access To Court Records Over The Internet, Gregory Silverman
Faculty Articles
Professor Silverman discusses the machines that have been taking up positions in the court houses for more than a quarter of a century. These machines are becoming an integrated network integral to the workings of the court. With the assistance of the machines, the myriad and diverse members of the justice and public safety communities together with the public will evolve into a single complex whole that could dedicate itself to creating a more humane and just society comprised of better informed individuals to whom they are genuinely accountable. There are those who fear the machines, afraid that personal privacy …
The Hegemony Of The Copyright Treatise, Ann Bartow
The Hegemony Of The Copyright Treatise, Ann Bartow
Law Faculty Scholarship
This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.
Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue
Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue
Law Faculty Publications
The international community has been struggling with questions of who should regulate the Internet and how, but little consensus has emerged. For the United States, consideration of the pros and cons of the alternative jurisdictional approaches to e-commerce and cyberspace is complicated by an overlay of constitutional law. While the rest of the world considers the policy implications of a country of origin versus a country of destination approach, the United States is wrestling with what constitutes "purposeful availment" under the Due Process Clause.
The Supreme Court has never squarely considered what limits the Fifth Amendment imposes on assertions of …
Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh
Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh
All Faculty Scholarship
Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Journal Articles
The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.
This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …