Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (74)
- Selected Works (40)
- Schulich School of Law, Dalhousie University (24)
- SelectedWorks (24)
- UIC School of Law (23)
-
- Maurer School of Law: Indiana University (21)
- University of Maryland Francis King Carey School of Law (13)
- University of Pittsburgh School of Law (12)
- University of Richmond (12)
- Seton Hall University (11)
- University of Michigan Law School (7)
- Duke Law (6)
- Singapore Management University (6)
- Georgetown University Law Center (5)
- Boston University School of Law (4)
- University of Colorado Law School (4)
- Vanderbilt University Law School (4)
- Cornell University Law School (3)
- University of Dayton (3)
- American University Washington College of Law (2)
- Boise State University (2)
- Chicago-Kent College of Law (2)
- Columbia Law School (2)
- New York Law School (2)
- University of Kentucky (2)
- University of Missouri School of Law (2)
- University of Nevada, Las Vegas (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Washington School of Law (2)
- Keyword
-
- Google (58)
- Adwords (48)
- Rosetta Stone (31)
- Internet (25)
- Trademark (24)
-
- Copyright (16)
- Consumer confusion (14)
- Rosetta (13)
- Information privacy (10)
- Intellectual property (10)
- Social media (10)
- Keyword (9)
- Counterfeit (8)
- Cyberspace Law (8)
- Privacy (8)
- Technology (8)
- Internet Governance (7)
- Regulation (7)
- Software (7)
- Trademarked terms (7)
- Cyberlaw (6)
- First Amendment (6)
- Law and Technology (6)
- Trademark infringement (6)
- Web 2.0 (6)
- Civil rights (5)
- Constitutional law (5)
- Cyberspace (5)
- Cyberspace law (5)
- DMCA (5)
- Publication
-
- Rosetta Stone v. Google (Joint Appendix) (73)
- Canadian Journal of Law and Technology (23)
- Federal Communications Law Journal (20)
- UIC John Marshall Journal of Information Technology & Privacy Law (17)
- Faculty Scholarship (16)
-
- Student Works (11)
- Articles (10)
- Henry L Hu (9)
- Mubashshir Sarshar (9)
- Richmond Journal of Law & Technology (9)
- Danielle Keats Citron (8)
- Daniel Lyons (6)
- Duke Law & Technology Review (6)
- Research Collection Yong Pung How School Of Law (6)
- Bruno L. Costantini García (5)
- All Faculty Scholarship (4)
- Publications (4)
- Cornell Law Faculty Publications (3)
- Faculty Publications (3)
- Maryland Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Testimony Before Congress (3)
- UIC Review of Intellectual Property Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Book Chapters (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Germán M. Teruel Lozano (2)
- James Grimmelmann (2)
- Kentucky Law Journal (2)
- Law Student Publications (2)
- Publication Type
- File Type
Articles 241 - 270 of 336
Full-Text Articles in Law
The Darknet: A Digital Copyright Revolution, Jessica A. Wood
The Darknet: A Digital Copyright Revolution, Jessica A. Wood
Richmond Journal of Law & Technology
We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …
Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker
Advancing Consumer Interests Through Ubiquitous Broadband: The Need For A New Spectrum, Meredith Attwell Baker
Federal Communications Law Journal
Comprehensive and long-term spectrum reform can play a critical role in the FCC's development of a National Broadband Plan and in its consideration of Open Internet rules. More efficient and intensive use of the nation's spectrum resources would help provide a path to greater broadband deployment, competition and innovation for all consumers. Wireless and mobile technologies hold great promise to offer consumers new services to complement, extend, or even replace existing broadband offerings. A comprehensive review of the nation's spectrum policy is, therefore, necessary to ensure that wireless and mobile broadband services are not hamstrung by outdated rules or command-and-control …
Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs
Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs
Federal Communications Law Journal
Network neutrality has become a contentious issue both in Europe and the United States. Regulators on both sides of the Atlantic face digital divides in their society, and are confronted with potentially conflicting policy goals-to incentivize private investment in next-generation broadband while maintaining "neutral" and competitive broadband networks.
This Article compares nascent American and European network neutrality policy in terms of regulatory error costs. Emerging markets, such as broadband, are more likely to be affected by regulatory errors, and these errors have graver consequences in emerging markets than in regular markets. U.S. telecommunications policy traditionally has advanced a trial-and-error approach …
Creating Effective Broadband Network Regulation, Daniel L. Brenner
Creating Effective Broadband Network Regulation, Daniel L. Brenner
Federal Communications Law Journal
The Internet is central to the business and pastimes of Americans. Calls for increased regulation are ongoing, inevitable, and often justified. But calls for "network neutrality" or "nondiscrimination" assume with little hesitation federal agency competence to give predictable and accurate meaning to these terms and create regulations to implement them. This Article's chief contribution to Internet policy debate is to focus attention on the likelihood of successful FCC Internet regulation-a key assumption of some advocates.
The Article analyzes three characteristics that hobble the FCC, which is the likeliest federal agency to provide prescriptive rules. First, the record for the agency …
Sovereignty In The Age Of Twitter, Donald L. Doernberg
Sovereignty In The Age Of Twitter, Donald L. Doernberg
Villanova Law Review
No abstract provided.
Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton
Virtually Enabled: How Title Iii Of The Americans With Disabilities Act Might Be Applied To Online Virtual Worlds, Joshua Newton
Federal Communications Law Journal
The rise and popularity of online virtual worlds, such as World of Warcraft and Second Life, holds significant promise for people with disabilities. For people who are unable to easily leave home or travel, virtual worlds provide a public venue, wherein people may interact freely without the social stigma that accompanies disability. However, access to these virtual worlds may be inhibited by physical, visual, or aural impairments, and virtual-world developers can be hostile to modifying their products to mitigate these difficulties. Thus, some disability advocates have turned to Title III of the Americans with Disabilities Act, arguing that places of …
Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman
Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman
Faculty Publications
This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …
Digital + Library: Mass Book Digitization As Collective Inquiry, Mary Murrell
Digital + Library: Mass Book Digitization As Collective Inquiry, Mary Murrell
NYLS Law Review
No abstract provided.
The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg
The Not-So-Risky Business Of High-End Escorts And The Internet In The 21st Century, Robert Rigg
Richmond Journal of Law & Technology
Prostitution is often referred to as “the world’s oldest profession.” It is defined as “[t]he act or practice of engaging in sexual activity for money or its equivalent.” As a service industry, it fulfills specific human desires. Nevertheless, most states condemn and criminalize both the act of prostitution and those who solicit such services.
Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas
UIC Law Review
No abstract provided.
Communication Indecency: Why The Communications Decency Act, And The Judicial Interpretation Of It, Has Led To A Lawless Internet In The Area Of Defamation, Colby Ferris
Barry Law Review
First, this article explores how law of defamation has been applied in the brick and mortar world, and how those same principles were applied to the cyber world. Next it looks at Congress’s legislation of defamation law on the Internet, and how that legislation has been applied in court. Finally, it evaluates the changing attitude toward that legislation, and changes Congress should consider making.
Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson
Whose Burden Is It Anyway? Addressing The Needs Of Content Owners In Dmca Safe Harbors, Greg Janson
Federal Communications Law Journal
Much of today's network neutrality debate addresses concerns that cable providers will limit access to competing Web-based services delivering multimedia content. While proposals to mandate nondiscrimination for all Internet traffic surely will help create a competitive environment where online entertainment providers can prosper, ISP interference is not the only threat. Online entertainment sites that relay user-generated content are threatened by crippling litigation brought by copyright holders for actions taken by third parties using their services. Reliance on the safe harbors provided in the Digital Millennium Copyright Act has, in most cases, proved unsuccessful. This Note addresses the concerns of both …
Virtual Contacts In Patent Cases: How Should Internet-Related Contacts Affect The Personal Jurisdiction Analysis?, Megan M. La Belle
Virtual Contacts In Patent Cases: How Should Internet-Related Contacts Affect The Personal Jurisdiction Analysis?, Megan M. La Belle
Scholarly Articles
In the 1990s, when the Internet was still considered novel, courts struggled with the question of how Internet-related contacts should be treated in the personal jurisdiction analysis. So when Zippo Manufacturing v. Zippo DOT Com established an apparently easy-to-apply test for deciding whether a defendant’s virtual contacts are sufficient for personal jurisdiction, many courts embraced it . To date, however, the Federal Circuit has neither adopted nor rejected the Zippo approach, leaving litigants and lower courts in patent cases with little guidance on the issue. Although a recent decision suggests that the Federal Circuit recognizes the limitations of Zippo, it …
A Call For Judicial Scrutiny: How Increased Judicial Discretion Has Led To Disparity And Unpredictability In Federal Sentencings For Child Pornography, Loren Rigsby
Seattle University Law Review
The United States Sentencing Commission (USSC) has made child pornography related crimes among the most harshly punishable federal offenses. Nevertheless, sentencing judges have regained the right to depart from the recommended Federal Sentencing Guidelines (Guidelines). The Guideline range for child pornography reflects sound and clear congressional intent to impose harsh penalties on defendants to deter, and ultimately eliminate, the market for child pornography. For this reason, this Comment argues that sentences that fall outside the Guidelines range should be reviewed with much greater scrutiny and should not be used solely to reflect a judge’s view that the advised sentence is …
Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton
Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton
Publications
No abstract provided.
Libraries, Digital Content, And Copyright, Laura N. Gasaway
Libraries, Digital Content, And Copyright, Laura N. Gasaway
Vanderbilt Journal of Entertainment & Technology Law
Libraries use, acquire, create and host generate digital content. They digitize their existing collections of works such as letters, diaries and manuscripts and post them on library websites. Increasingly, libraries are utilizing digital technology to preserve library works which may or may not be made available to the public. Libraries also create, manage and host user generated content such as posts on discussion boards, blogs, wikis, RSS feeds, social bookmarking, tagging, and social networks. Libraries use user generated content for internal library purposes, such as displays and events and for teaching. Further, libraries often are asked to assist users who …
No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman
No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman
Vanderbilt Journal of Entertainment & Technology Law
Internet search engines such as Google and Yahoo! earn a majority of their profit from selling advertisements to appear next to search results. Google's coveted advertising space, however, causes nightmares for trademark holders when their trademarks are auctioned by Google to competitors as keywords to trigger the competitors' advertisements when the trademark is used as a search term. Advertisers strategically bid on trademarks of competitors to ensure that their ads appear whenever the trademark is used as a search term, instead of the advertisements of the trademark holder. For example, Nike could bid on the trademark for "Adidas," with the …
A Portrait Of The Internet As A Young Man, Ann Bartow
A Portrait Of The Internet As A Young Man, Ann Bartow
Law Faculty Scholarship
In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …
Government Speech 2.0, Danielle K. Citron, Helen Norton
Government Speech 2.0, Danielle K. Citron, Helen Norton
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Faculty Scholarship
For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).
The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …
The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul
The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul
Canadian Journal of Law and Technology
The issue of the patentability of electromagnetic and acoustic signals has not been litigated in Canada. If, however, the issue does come forward for litigation, Canadian courts may decide differently than their American colleagues did. The Supreme Court of Canada’s ‘Harvard Mouse’ decision shows that the Canadian law on patentable subject matter differs from American law. Under the Canadian definition of manufacture, electromagnetic and acoustic signals could constitute patentable subject matter.
Book Review: E-Discovery In Canada, Robert J. Currie
Book Review: E-Discovery In Canada, Robert J. Currie
Canadian Journal of Law and Technology
It is not hyperbolic to say that the proliferation of electronically stored information (ESI) is probably the most prominent change-harbinger and potential havoc-wreaker in civil litigation today — second only, perhaps, to the spiralling costs of litigation itself. Indeed, the practical and legal difficulties associated with the storage, gathering, preservation, disclosure and evidentiary use of ESI have the potential to act as a Trojan Horse, causing what would previously have been ordinary cases to implode under their weight. Increasing recognition of this is evident; electronic discovery (e-discovery) cases have begun to emerge in the reports, a successful co-operative effort by …
A New Approach To Data Security Breaches, Gideon Emcee Christian
A New Approach To Data Security Breaches, Gideon Emcee Christian
Canadian Journal of Law and Technology
This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …
Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa
Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa
Canadian Journal of Law and Technology
This article considers whether the permissive disclosure provisions of the Personal Information Protection and Electronic Documents Act (PIPEDA) and its substantially similar counterparts mean that law enforcement agents have ready access to information about our movements and activities, or whether s. 8 of the Charter plays a role in limiting the circumstances in which disclosure without notice or consent may take place.
Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley
Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley
Canadian Journal of Law and Technology
For professional “fact-gatherers” such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a smoking gun, depending on your perspective. The personal information contained in a Facebook profile may be highly relevant to matters at issue in litigation; when dealing with claims, particularly in the personal injury context, the information contained on a Facebook page can make or break a case. It is, therefore, crucial that legal and insurance professionals stay informed of new developments in this emerging area of law. This article, written with …
Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef
Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef
Canadian Journal of Law and Technology
It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …
Google Adwords And Canadian Trademark Law, Reed W. Taubner
Google Adwords And Canadian Trademark Law, Reed W. Taubner
Canadian Journal of Law and Technology
This article aims to answer two questions: should business competitors be allowed to use each other’s goodwill in this way and, if so, can trademark law police the program without stifling competition? Part I examines the technical aspects of the AdWords program. Part II explores the underlying rationales of trademark law to start developing a normative position. Part III reviews the American jurisprudence and commentary to hone that normative position and to identify a compatible legal framework. Part IV compares that framework against Canadian law.
This article endorses the work of Misha Gregory Macaw who, unlike some trademark expansionists, argues …
A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon
A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon
SMU Science and Technology Law Review
No abstract provided.
Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law: The Singapore Example, Eliza Mik
Research Collection Yong Pung How School Of Law
The United Nations Commission on International Trade Law (UNCITRAL) Convention on the Use of Electronic Communications in International Contracts (CUECIC or Convention) was adopted on 23 November 2005. Its essential objective is to establish uniform rules intended to “remove obstacles to the use of electronic communications in international contracts, including obstacles that might result from the operation of existing international trade law instruments, with a view to enhancing legal certainty and commercial predictability.” The Convention relies on the UNCITRAL Model Law on Electronic Commerce (MLEC), which constitutes an e-commerce flagship project dating back to 1995. It also resembles UNCITRAL’s Convention …
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Maryland Law Review
No abstract provided.