Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 241 - 270 of 336

Full-Text Articles in Law

The Darknet: A Digital Copyright Revolution, Jessica A. Wood Jan 2010

The Darknet: A Digital Copyright Revolution, Jessica A. Wood

Richmond Journal of Law & Technology

We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …


Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker Jan 2010

Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker

Federal Communications Law Journal

Comprehensive and long-term spectrum reform can play a critical role in the FCC's development of a National Broadband Plan and in its consideration of Open Internet rules. More efficient and intensive use of the nation's spectrum resources would help provide a path to greater broadband deployment, competition and innovation for all consumers. Wireless and mobile technologies hold great promise to offer consumers new services to complement, extend, or even replace existing broadband offerings. A comprehensive review of the nation's spectrum policy is, therefore, necessary to ensure that wireless and mobile broadband services are not hamstrung by outdated rules or command-and-control …


Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs Jan 2010

Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs

Federal Communications Law Journal

Network neutrality has become a contentious issue both in Europe and the United States. Regulators on both sides of the Atlantic face digital divides in their society, and are confronted with potentially conflicting policy goals-to incentivize private investment in next-generation broadband while maintaining "neutral" and competitive broadband networks.

This Article compares nascent American and European network neutrality policy in terms of regulatory error costs. Emerging markets, such as broadband, are more likely to be affected by regulatory errors, and these errors have graver consequences in emerging markets than in regular markets. U.S. telecommunications policy traditionally has advanced a trial-and-error approach …


Creating Effective Broadband Network Regulation, Daniel L. Brenner Jan 2010

Creating Effective Broadband Network Regulation, Daniel L. Brenner

Federal Communications Law Journal

The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for "network neutrality" or "nondiscrimination" assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article's chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates.

The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the agency …


Sovereignty In The Age Of Twitter, Donald L. Doernberg Jan 2010

Sovereignty In The Age Of Twitter, Donald L. Doernberg

Villanova Law Review

No abstract provided.


Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton Jan 2010

Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton

Federal Communications Law Journal

The rise and popularity of online virtual worlds, such as World of Warcraft and Second Life, holds significant promise for people with disabilities. For people who are unable to easily leave home or travel, virtual worlds provide a public venue, wherein people may interact freely without the social stigma that accompanies disability. However, access to these virtual worlds may be inhibited by physical, visual, or aural impairments, and virtual-world developers can be hostile to modifying their products to mitigate these difficulties. Thus, some disability advocates have turned to Title III of the Americans with Disabilities Act, arguing that places of …


Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman Jan 2010

Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman

Faculty Publications

This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …


Digital + Library: Mass Book Digitization As Collective Inquiry, Mary Murrell Jan 2010

Digital + Library: Mass Book Digitization As Collective Inquiry, Mary Murrell

NYLS Law Review

No abstract provided.


The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg Jan 2010

The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg

Richmond Journal of Law & Technology

Prostitution is often referred to as “the world’s oldest profession.” It is defined as “[t]he act or practice of engaging in sexual activity for money or its equivalent.” As a service industry, it fulfills specific human desires. Nevertheless, most states condemn and criminalize both the act of prostitution and those who solicit such services.


Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas Jan 2010

Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas

UIC Law Review

No abstract provided.


Communication Indecency: Why The Communications Decency Act, And The Judicial Interpretation Of It, Has Led To A Lawless Internet In The Area Of Defamation, Colby Ferris Jan 2010

Communication Indecency: Why The Communications Decency Act, And The Judicial Interpretation Of It, Has Led To A Lawless Internet In The Area Of Defamation, Colby Ferris

Barry Law Review

First, this article explores how law of defamation has been applied in the brick and mortar world, and how those same principles were applied to the cyber world. Next it looks at Congress’s legislation of defamation law on the Internet, and how that legislation has been applied in court. Finally, it evaluates the changing attitude toward that legislation, and changes Congress should consider making.


Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson Jan 2010

Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson

Federal Communications Law Journal

Much of today's network neutrality debate addresses concerns that cable providers will limit access to competing Web-based services delivering multimedia content. While proposals to mandate nondiscrimination for all Internet traffic surely will help create a competitive environment where online entertainment providers can prosper, ISP interference is not the only threat. Online entertainment sites that relay user-generated content are threatened by crippling litigation brought by copyright holders for actions taken by third parties using their services. Reliance on the safe harbors provided in the Digital Millennium Copyright Act has, in most cases, proved unsuccessful. This Note addresses the concerns of both …


Virtual Contacts In Patent Cases: How Should Internet-Related Contacts Affect The Personal Jurisdiction Analysis?, Megan M. La Belle Jan 2010

Virtual Contacts In Patent Cases: How Should Internet-Related Contacts Affect The Personal Jurisdiction Analysis?, Megan M. La Belle

Scholarly Articles

In the 1990s, when the Internet was still considered novel, courts struggled with the question of how Internet-related contacts should be treated in the personal jurisdiction analysis. So when Zippo Manufacturing v. Zippo DOT Com established an apparently easy-to-apply test for deciding whether a defendant’s virtual contacts are sufficient for personal jurisdiction, many courts embraced it . To date, however, the Federal Circuit has neither adopted nor rejected the Zippo approach, leaving litigants and lower courts in patent cases with little guidance on the issue. Although a recent decision suggests that the Federal Circuit recognizes the limitations of Zippo, it …


A Call For Judicial Scrutiny: How Increased Judicial Discretion Has Led To Disparity And Unpredictability In Federal Sentencings For Child Pornography, Loren Rigsby Jan 2010

A Call For Judicial Scrutiny: How Increased Judicial Discretion Has Led To Disparity And Unpredictability In Federal Sentencings For Child Pornography, Loren Rigsby

Seattle University Law Review

The United States Sentencing Commission (USSC) has made child pornography related crimes among the most harshly punishable federal offenses. Nevertheless, sentencing judges have regained the right to depart from the recommended Federal Sentencing Guidelines (Guidelines). The Guideline range for child pornography reflects sound and clear congressional intent to impose harsh penalties on defendants to deter, and ultimately eliminate, the market for child pornography. For this reason, this Comment argues that sentences that fall outside the Guidelines range should be reviewed with much greater scrutiny and should not be used solely to reflect a judge’s view that the advised sentence is …


Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton Jan 2010

Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton

Publications

No abstract provided.


Libraries, Digital Content, And Copyright, Laura N. Gasaway Jan 2010

Libraries, Digital Content, And Copyright, Laura N. Gasaway

Vanderbilt Journal of Entertainment & Technology Law

Libraries use, acquire, create and host generate digital content. They digitize their existing collections of works such as letters, diaries and manuscripts and post them on library websites. Increasingly, libraries are utilizing digital technology to preserve library works which may or may not be made available to the public. Libraries also create, manage and host user generated content such as posts on discussion boards, blogs, wikis, RSS feeds, social bookmarking, tagging, and social networks. Libraries use user generated content for internal library purposes, such as displays and events and for teaching. Further, libraries often are asked to assist users who …


No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman Jan 2010

No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman

Vanderbilt Journal of Entertainment & Technology Law

Internet search engines such as Google and Yahoo! earn a majority of their profit from selling advertisements to appear next to search results. Google's coveted advertising space, however, causes nightmares for trademark holders when their trademarks are auctioned by Google to competitors as keywords to trigger the competitors' advertisements when the trademark is used as a search term. Advertisers strategically bid on trademarks of competitors to ensure that their ads appear whenever the trademark is used as a search term, instead of the advertisements of the trademark holder. For example, Nike could bid on the trademark for "Adidas," with the …


A Portrait Of The Internet As A Young Man, Ann Bartow Jan 2010

A Portrait Of The Internet As A Young Man, Ann Bartow

Law Faculty Scholarship

In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul Jan 2010

The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul

Canadian Journal of Law and Technology

The issue of the patentability of electromagnetic and acoustic signals has not been litigated in Canada. If, however, the issue does come forward for litigation, Canadian courts may decide differently than their American colleagues did. The Supreme Court of Canada’s ‘Harvard Mouse’ decision shows that the Canadian law on patentable subject matter differs from American law. Under the Canadian definition of manufacture, electromagnetic and acoustic signals could constitute patentable subject matter.


Book Review: E-Discovery In Canada, Robert J. Currie Jan 2010

Book Review: E-Discovery In Canada, Robert J. Currie

Canadian Journal of Law and Technology

It is not hyperbolic to say that the proliferation of electronically stored information (ESI) is probably the most prominent change-harbinger and potential havoc-wreaker in civil litigation today — second only, perhaps, to the spiralling costs of litigation itself. Indeed, the practical and legal difficulties associated with the storage, gathering, preservation, disclosure and evidentiary use of ESI have the potential to act as a Trojan Horse, causing what would previously have been ordinary cases to implode under their weight. Increasing recognition of this is evident; electronic discovery (e-discovery) cases have begun to emerge in the reports, a successful co-operative effort by …


A New Approach To Data Security Breaches, Gideon Emcee Christian Jan 2010

A New Approach To Data Security Breaches, Gideon Emcee Christian

Canadian Journal of Law and Technology

This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …


Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa Jan 2010

Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa

Canadian Journal of Law and Technology

This article considers whether the permissive disclosure provisions of the Personal Information Protection and Electronic Documents Act (PIPEDA) and its substantially similar counterparts mean that law enforcement agents have ready access to information about our movements and activities, or whether s. 8 of the Charter plays a role in limiting the circumstances in which disclosure without notice or consent may take place.


Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley Jan 2010

Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley

Canadian Journal of Law and Technology

For professional “fact-gatherers” such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a smoking gun, depending on your perspective. The personal information contained in a Facebook profile may be highly relevant to matters at issue in litigation; when dealing with claims, particularly in the personal injury context, the information contained on a Facebook page can make or break a case. It is, therefore, crucial that legal and insurance professionals stay informed of new developments in this emerging area of law. This article, written with …


Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef Jan 2010

Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef

Canadian Journal of Law and Technology

It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …


Google Adwords And Canadian Trademark Law, Reed W. Taubner Jan 2010

Google Adwords And Canadian Trademark Law, Reed W. Taubner

Canadian Journal of Law and Technology

This article aims to answer two questions: should business competitors be allowed to use each other’s goodwill in this way and, if so, can trademark law police the program without stifling competition? Part I examines the technical aspects of the AdWords program. Part II explores the underlying rationales of trademark law to start developing a normative position. Part III reviews the American jurisprudence and commentary to hone that normative position and to identify a compatible legal framework. Part IV compares that framework against Canadian law.

This article endorses the work of Misha Gregory Macaw who, unlike some trademark expansionists, argues …


A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon Jan 2010

A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon

SMU Science and Technology Law Review

No abstract provided.


Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law: The Singapore Example, Eliza Mik Jan 2010

Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law: The Singapore Example, Eliza Mik

Research Collection Yong Pung How School Of Law

The United Nations Commission on International Trade Law (UNCITRAL) Convention on the Use of Electronic Communications in International Contracts (CUECIC or Convention) was adopted on 23 November 2005. Its essential objective is to establish uniform rules intended to “remove obstacles to the use of electronic communications in international contracts, including obstacles that might result from the operation of existing international trade law instruments, with a view to enhancing legal certainty and commercial predictability.” The Convention relies on the UNCITRAL Model Law on Electronic Commerce (MLEC), which constitutes an e-commerce flagship project dating back to 1995. It also resembles UNCITRAL’s Convention …


Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Jan 2010

Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Maryland Law Review

No abstract provided.