Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Law

Swimming Upstream: Negotiating Music Licenses For Interactive Streaming In The United States And Canada. How Copyrights Holders Can Participate In New Media And Still Protect Their Rights., Daniela Paola Oliva Dec 2011

Swimming Upstream: Negotiating Music Licenses For Interactive Streaming In The United States And Canada. How Copyrights Holders Can Participate In New Media And Still Protect Their Rights., Daniela Paola Oliva

Daniela Oliva

This article compares the music licensing process for interactive streaming in Canada and the United States. Unbeknownst to many, the process of acquiring a music license for interactive streaming in Canada and the United States is similar.

The unique portion of this article discusses the reasons why Canada may not have been the primary destination for interactive streaming companies. The article also discusses the benefits and windfalls of interactive streaming. Ultimately, copyright holders have the ability to negotiate with interactive streaming companies to attempt to receive a fair licensing rate. This article emphasizes that copyright holders should familiarize themselves with …


The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman Nov 2011

The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman

Bill D. Herman

Scholars who discuss copyright often observe that the voices for stronger copyright have more financial and political capital than their opponents and thus tend to win in Congress. While the playing field is still quite slanted toward stronger copyright, the politics around the issue are much messier and less predictable. This study, a detailed political and legislative history of the major proposals regarding copyright and digital rights management from 1987 to 2006, illustrates how this policy dynamic has changed so drastically. In 1987, there was no organized opposition to copyright’s expansion. By 2006, however, there was a substantial coalition of …


The Times They Are A-Changin’: The “Sexting” Problem And How The Intrusiveness Of A Cell Phone Search Determines The (Un)Constitutionality Of Suspicion-Based And Suspicionless Searches In The Public School Setting, Andrew T. Moore Oct 2011

The Times They Are A-Changin’: The “Sexting” Problem And How The Intrusiveness Of A Cell Phone Search Determines The (Un)Constitutionality Of Suspicion-Based And Suspicionless Searches In The Public School Setting, Andrew T. Moore

Andrew T Moore

In the past decade cell phone use amongst teenagers has gone from luxury to perceived necessity. With the expanded abilities of modern cell phones, students are able to easily participate in social sexual behavior such as sending explicit images of themselves or others to other cell phone users, an activity known as “sexting.” While schools may want to do all they can to eradicate this behavior, school administrators must not violate the constitutional rights of their students in the process of doing so. When a school administrator comes to suspect “sexting” behavior, he or she must follow existing Fourth Amendment …


Electronic Discovery: A Survey Of E-Discovery, Its Effect On Corporate Constitutional Rights And Why Corporations May Receive The Fifth Amendment Privilege Against Self-Incrimination During Parallel Civil And Criminal Litigation, Percy Arnell King Sep 2011

Electronic Discovery: A Survey Of E-Discovery, Its Effect On Corporate Constitutional Rights And Why Corporations May Receive The Fifth Amendment Privilege Against Self-Incrimination During Parallel Civil And Criminal Litigation, Percy Arnell King

Percy Arnell King Esq.

Advancing technology has created more places to seek out relevant information than ever before which, has created a burden for corporations tasked with retaining this information to comply with applicable laws and the prospect of civil or criminal litigation. This article explores how the modern trend of storing information electronically and subsequent electronic discovery allowed in parallel civil and criminal trials is inherently unfair to corporations. Furthermore, corporations have been granted several rights derived from the Bill of Rights, and should also receive the Fifth Amendment privilege against self-incrimination.


Metadata Discovery After The 2006 Amendments To The Federal Rules Of Civil Procedure: Did The Amendments Work?, Ryan J. Rawlings Sep 2011

Metadata Discovery After The 2006 Amendments To The Federal Rules Of Civil Procedure: Did The Amendments Work?, Ryan J. Rawlings

Ryan J. Rawlings

In 2003, the Civil Rules Advisory Committee determined electronically stored information discovery required a national, uniformly applied rule, and proposed amendments to the Federal Rules of Civil Procedure explicitly addressing electronically stored information. The electronically stored information amendments to the Federal Rules of Civil Procedure became effective December 01, 2006. It is time to ask, did the amendments achieve the Committee’s goal to create a uniform system of electronic discovery? This Note will review the amendments to Rule 34 and the amendments’ effect on metadata discovery.


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


Novel "Neutrality" Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny, Jeffrey Jarosch Aug 2011

Novel "Neutrality" Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny, Jeffrey Jarosch

Jeffrey Jarosch

This Article examines a recent trend in which the Federal Trade Commission and other enforcement agencies investigate internet platforms for behavior that is insufficiently “neutral” towards users or third parties that interact with the platform. For example, Google faces a formal FTC investigation based on allegations that it has tinkered with search results rather than presenting users with a “neutral” result. Twitter, too, faces a formal investigation after the social media service restricted the ways in which third party developers could interact with Twitter through its application programming interface (API). These investigations represent a new attempt to shift the network …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Aug 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

This Article …


Vernor V. Autodesk: Power To The...Producers?!, Elizabeth F. Wilhelm Aug 2011

Vernor V. Autodesk: Power To The...Producers?!, Elizabeth F. Wilhelm

Elizabeth F. Wilhelm

Vernor v. Autodesk, a recent case from the Ninth Circuit, threatens the very core of the first sale doctrine. Vernor radically alters the test for determining whether a transfer of a physical copy of copyrighted material is a sale or a license for the purposes of the first sale doctrine. The new test makes a transfer much more likely to be a license than a sale, possibly extending copyright protection beyond what is called for in the Copyright Act and extending the use of licensing in more media than just computer software. Many resale industries face the peril of widespread …


The Public Life Of The Virtual Self, Ari E. Waldman Aug 2011

The Public Life Of The Virtual Self, Ari E. Waldman

Ari E Waldman

While the Internet has changed dramatically since the early 1990s, the legal regime governing online speech and liability is still steeped in an early myth of the Internet user, completely hidden from other Internet users, in total control of his online experience and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility and radical individuation online, allowing hate and harassment to run wild. I argue that the myth of the online anonym is not only false as a matter of technology, but also inaccurate – …


Fear Of Facebook: Private Ordering Of Social Media Risks Incurred By Healthcare Providers, Nicolas P. Terry Aug 2011

Fear Of Facebook: Private Ordering Of Social Media Risks Incurred By Healthcare Providers, Nicolas P. Terry

Nicolas P Terry

The last two years have seen important quantitative and qualitative shifts in social media use patterns in the healthcare environment. Reacting to present and future risks there has been a rapid deployment of private ordering: social media policies and other contractual constructs emanating from physicians, professional organizations, employers and educators. These private, often contractual attempts to regulate online interactions or social media conduct are not all benign, themselves creating ethical or legal risk. This article, a follow-up to Physicians And Patients Who ‘Friend’ Or ‘Tweet’: Constructing A Legal Framework For Social Networking In A Highly Regulated Domain, 43 IND. L. …


Website Proprietorship Liability, Design And Two Regrettable Online Norms:, Nancy Kim Aug 2011

Website Proprietorship Liability, Design And Two Regrettable Online Norms:, Nancy Kim

Nancy Kim

Two regrettable norms have emerged online: the posting of content about others without their consent; and impulsive postings with little or no regard to their long term consequences. Website operators can either encourage or discourage these regrettable norms and influence their consequences through the design of their website and by the fostering of norms and codes of conduct. Unfortunately, section 230 of the Communications Decency Act as interpreted by courts provides websites with broad immunity. In a prior Article, I argued that a proprietorship standard should be imposed upon websites which would require them to take reasonable measures to prevent …


Fantasyscotus: Crowdsourcing A Prediction Market For The Supreme Court, Josh Blackman, Adam Aft, Corey Carpenter Apr 2011

Fantasyscotus: Crowdsourcing A Prediction Market For The Supreme Court, Josh Blackman, Adam Aft, Corey Carpenter

Josh Blackman

Every year the Supreme Court of the United States captivates the minds and curiosity of millions of Americans - yet the inner-workings of the Court are not fully transparent. The Court, without explanation, only decides the cases it wishes. They deliberate and assign authorship in private. The Justices hear oral arguments, and without notice, issue an opinion months later. They sometimes offer enigmatic clues during oral arguments through their questions. Between arguments and the day the Court issues an opinion, the outcome of a case is essentially a mystery. Sometimes the outcome falls along predictable lines; other times the outcome …


“No Fishing Poles Allowed At The Office,” And Other Suggestions On How To Limit “Fishing Expeditions” To An Outdoor Weekend Activity And Away From The Realm Of E-Discovery, Joanna K. Slusarz Apr 2011

“No Fishing Poles Allowed At The Office,” And Other Suggestions On How To Limit “Fishing Expeditions” To An Outdoor Weekend Activity And Away From The Realm Of E-Discovery, Joanna K. Slusarz

Joanna Slusarz

Early settlement is usually encouraged by the courts and welcomed by most parties involved in a lawsuit. However, it may not always be the most favorable result. This idiosyncrasy arises most when the costs of continuing litigation and adjudication on the merits outweigh those of early settlement. On the other hand, early settlement raises the risk of “encourag[ing] additional, low merit cases that might not otherwise have been filed had the company chosen to litigate existing lawsuits.”

The phenomenon of electronic discovery (“e-discovery”) has exponentially increased the occurrence of the latter result. As a result, defendants, particularly large corporations with …


System Overload: Is The Digital Music Age Making Consumers Yearned For Physical And Innovative Music Products?, Daniela Oliva Mar 2011

System Overload: Is The Digital Music Age Making Consumers Yearned For Physical And Innovative Music Products?, Daniela Oliva

Daniela Oliva

This article discusses problems inherent in digital music formats that have affected the music industry, consumers and musicians. Innovative digital products and unique physical music products can help the music industry mitigate damages and recapture some of the profit lost to illegal file sharing.


The People's Trade Secrets?, David S. Levine Feb 2011

The People's Trade Secrets?, David S. Levine

David S Levine

The content of administered public school exams, modifications made by a government to its voting machines, and the business strategies of government corporations should be of interest to the public. At a minimum, they are the kinds of information that a government should allow its citizens to see and examine. After all, the public might have some legitimate questions for its government: Is that voting machine working so that my vote gets counted? Is that public school examination fair and accurate? To whom or what is that government agency marketing and are kickbacks involved? One would think that the government …


Cyberlaw: The Unconscionability,/ Unenforceability Of Contracts (Shrinkwrap, Clickwrap, And Browsewrap) On The Internet: A Multijurisdictional Analysis Showing The Need For Oversight., Paul J. Morrow Sr Feb 2011

Cyberlaw: The Unconscionability,/ Unenforceability Of Contracts (Shrinkwrap, Clickwrap, And Browsewrap) On The Internet: A Multijurisdictional Analysis Showing The Need For Oversight., Paul J. Morrow Sr

Paul J. Morrow Sr

This paper analyzes the differences between the common law of contracts and the way various jurisdictions in the United States have applied new contract law doctrine as applied to cyber contracts. The paper also has recommendations on how to reconcile those differences. These differences could lead to a very unfair application of contract precedent essentially overturning 200 years of contract common law. This is the age of cyberspace and cyberlaw. If we do not begin to reconcile these differences, it could change the way our society does business. Do we adhere to precedent or are the changes warranted under the …