Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (19)
- Schulich School of Law, Dalhousie University (14)
- University of Richmond (13)
- Duke Law (12)
- Cleveland State University (10)
-
- University of Michigan Law School (8)
- Maurer School of Law: Indiana University (6)
- Vanderbilt University Law School (4)
- New York Law School (2)
- University of Washington School of Law (2)
- Brigham Young University Law School (1)
- Florida State University College of Law (1)
- Loyola University Chicago, School of Law (1)
- Northwestern Pritzker School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Internet (11)
- Media & Communications (7)
- 1996 Act (3)
- Book reviews (3)
- Copyright law (3)
-
- E-commerce (3)
- Fair use (3)
- Information (3)
- International (3)
- Propertization (3)
- Property (3)
- Telecommunications Act of 1996 (3)
- Consumers (2)
- Copyright (2)
- Copyright infringement (2)
- Cybertrespass (2)
- Digital Millennium Copyright Act (2)
- Digitization (2)
- ECommerce (2)
- FCC (2)
- Federal Communications Commission (2)
- Federal Rules of Civil Procedure (2)
- File sharing (2)
- Inc. (2)
- Intellectual Property (2)
- Intellectual property (2)
- International law (2)
- Mass media (2)
- Music (2)
- Privacy (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (16)
- Canadian Journal of Law and Technology (14)
- Richmond Journal of Law & Technology (13)
- Duke Law & Technology Review (12)
- Cleveland State Law Review (10)
-
- Michigan Telecommunications & Technology Law Review (5)
- Federal Communications Law Journal (4)
- UIC Review of Intellectual Property Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Indiana Law Journal (2)
- NYLS Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Washington Journal of Law, Technology & Arts (2)
- Brigham Young University Education and Law Journal (1)
- Florida State University Journal of Transnational Law & Policy (1)
- Maryland Law Review (1)
- Michigan Law Review (1)
- Northwestern Journal of International Law & Business (1)
- Public Interest Law Reporter (1)
- University of Arkansas at Little Rock Law Review (1)
- Vanderbilt Journal of Transnational Law (1)
- Washington and Lee Law Review (1)
Articles 1 - 30 of 97
Full-Text Articles in Law
T-Mobile Usa Inc. V. Department Of Finance For Baltimore City: What The Latest Salvo In Disproportional Cellular Phone Taxation Means For The Future, Daniel P. Slowey
T-Mobile Usa Inc. V. Department Of Finance For Baltimore City: What The Latest Salvo In Disproportional Cellular Phone Taxation Means For The Future, Daniel P. Slowey
Duke Law & Technology Review
Seventeen percent of the average monthly cellular phone bill in 2004 was comprised of federal, state, and local taxes. As the number of wireless subscribers across the nation continues to increase, states, cities, and counties are increasingly seizing upon cellular taxation as a panacea for budget shortfalls. The Maryland Tax Court’s recent decision in T-Mobile USA, Inc. v. Department of Finance for Baltimore City held state and county taxes on the sale of individual cellular lines as legal excise taxes rather than illegal sales taxes. This iBrief will highlight the origins of telecommunications taxation, examine the ruling in T-Mobile in …
The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong
The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong
Federal Communications Law Journal
This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware's functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note …
When Is Employee Blogging Protected By Section 7 Of The Nlra?, Katherine M. Scott
When Is Employee Blogging Protected By Section 7 Of The Nlra?, Katherine M. Scott
Duke Law & Technology Review
The National Labor Relations Act forbids employers from retaliating against certain types of employee speech or intimidating those who engage in it. This iBrief examines how blogging fits into the current statutory framework and recommends how the National Labor Relations Board and the courts should address the unique features of employee blogs.
Three Reactions To Mgm V. Grokster, Pamela Samuelson
Three Reactions To Mgm V. Grokster, Pamela Samuelson
Michigan Telecommunications & Technology Law Review
It was prescient of the Michigan Telecommunications and Technology Law Review to have organized a conference to discuss the Supreme Court's decision in Metro-Goldwyn-Mayer, Inc. v. Grokster, Inc. As the articles in this issue reveal, commentators have had somewhat mixed reactions to the Grokster decision. Perhaps I am the most mixed (or mixed up) about Grokster among its commentators, for I have had not just one but three reactions to the Grokster decision. My first reaction was to question whether MGM and its co-plaintiffs really won the Grokster case, or at least won it in the way they had hoped. …
File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber
File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber
Michigan Telecommunications & Technology Law Review
Much economic, political, judicial and legal attention has been showered on the significant changes currently taking place within the music production and distribution business forced by the use of the Internet for both file sharing (of unauthorized copyrighted material) and more recent online (legal) music distribution. The strong demand for music, coupled with the low cost of distributing illegal copies via peer-to-peer (P2P) systems, is unraveling the business model by which music has traditionally been created, developed, and distributed. Application of traditional copyright law has been ineffective in stopping the loss of business in the traditional channels. Producers have implemented …
The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher
The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher
Michigan Telecommunications & Technology Law Review
Google's major new initiative is to undertake the task of digitizing the world's collection of books so as to make them searchable. The very idea is audacious, but what is more so is that Google plans to copy without first seeking the permission of the owners of these works. Google Print would make available what is, by conventional measures at least, the highest grade of information--books produced by millions of the world's leading scholars. This is in stark contrast to the inconsistent quality spectrum one encounters through other online sources such as peer-to-peer networks and blogs, where there currently exists …
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Michigan Telecommunications & Technology Law Review
By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Michigan Telecommunications & Technology Law Review
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
Intellectual Property - Copyright & Internet Law - "The Big Chill": The Supreme Court Adopts An Inducement Standard For Third-Party Copyright Infringement Liability, Leaving Innovation In The Cold Metro-Goldwyn-Mayer Studios, Inc. V. Grokster, Ltd., 125 S. Ct. 2764 (2005)., Darrin Keith Henning
University of Arkansas at Little Rock Law Review
A key feature of an effective copyright system is to provide protection against infringement that is consistent with a copyright's goal: to "promote . . . useful Arts." Thus, for the overall public good, it is vital to achieve a proper balance between protecting authors' works as an incentive to create and the public's interest in accessing both creative works and new technology. The outcome of Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd. (Grosker III) and the resulting business and legal developments created ambiguity and doubt regarding potential liability in the copyright system that is having a deleterious effect on technical …
The Constitutionality Of Wipo’S Broadcasting Treaty: The Originality And Limited Times Requirements Of The Copyright Clause, Adam R. Tarosky
The Constitutionality Of Wipo’S Broadcasting Treaty: The Originality And Limited Times Requirements Of The Copyright Clause, Adam R. Tarosky
Duke Law & Technology Review
Because the proposed WIPO Broadcasting Treaty extends perpetual copyright-like protections to unoriginal information, its implementation would violate at least two fundamental limitations on Congress’s Copyright Clause power: the originality and "limited times" requirements. But Congress has a trump card--the Commerce Clause. This iBrief argues that to give proper effect to the limitations of the Copyright Clause, Congress should not be allowed to implement copyright-like legislation under the less restrictive Commerce Clause.
Don't Send That E-Mail To A Minor!: Compliance With State Child Protection Registry Statutes, Laura Dunlop
Don't Send That E-Mail To A Minor!: Compliance With State Child Protection Registry Statutes, Laura Dunlop
Washington Journal of Law, Technology & Arts
In July of 2004, Michigan and Utah enacted child protection registry laws that prohibit businesses from sending e-mail advertisements for certain types of goods and services to “contact points” (e.g. individual or school e-mail domains) listed on registries maintained by each state. The prohibited goods and services include alcohol, tobacco, pornography, and illegal drugs. This Article summarizes these statutes and provides guidance to businesses concerning statutory compliance. The Article also highlights certain concerns about the scope and ambiguities in the statutory language. Despite ongoing debate surrounding these statutes, companies that choose to market via the Internet must understand their statutory …
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
Canadian Journal of Law and Technology
This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Canadian Journal of Law and Technology
This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …
Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland
Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland
Canadian Journal of Law and Technology
This article examines podcasting and its specific characteristics to see, first, where it fits within Canada’s copyright law, and second, how the licensing regime for musical works in Canada applies to podcasting. The discussion next turns to whether or not the current licensing regime for podcasting is desirable in light of the purpose of copyright in Canada, and with a view to the various interests at stake: those of artists, in being paid, and those of society, in enabling podcasters to access material in order to produce their work. An examination of the current and proposed licensing regime and its …
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Canadian Journal of Law and Technology
This paper argues that Canadian courts can, and should, adopt electronic trespass as a viable cause of action for the protection of property rights on the Internet. Of course, this conclusion presupposes that property rights in fact exist on the Internet. While American courts have accepted the existence of property rights on the Internet without any real controversy, a significant body of criticism has developed around American jurisprudence. Part III examines the critiques levelled against the assumption of property rights inherent in electronic trespass, and argues that there are property rights that need to be protected on the Internet. Part …
The End Of Net Neutrality, William G. Laxton Jr.
The End Of Net Neutrality, William G. Laxton Jr.
Duke Law & Technology Review
In 2005, the FCC changed the competitive landscape of the high-speed Internet access industry by classifying both DSL and cable modem service as "information services." While many hail this move as a victory for competition and free markets, others fear the ruling could jeopardize the future of the Internet. This iBrief examines the potential end of "net neutrality" and concludes that new federal regulations are unnecessary because antitrust laws and a competitive marketplace will provide consumers with sufficient protection.
A Technological Theory Of The Arms Race, Lee Kovarsky
A Technological Theory Of The Arms Race, Lee Kovarsky
Indiana Law Journal
Although the "technological arms race" has recently emerged as a vogue-ish piece of legal terminology, scholarship has quite conspicuously failed to explore the phenomenon systematically. What are "technological" arms races? Why do they happen? Does the recent spike in scholarly attention actually reflect their novelty? Are they always inefficient? How do they differ from military ones? What role can legal institutions play in slowing them down?
In this Article I seek to answer these questions. I argue that copyright enforcement and self-help represent substitutable tactics for regulating access to expressive assets, and that the efficacy of each tactic depends on …
Interconnection Policy And Technological Progress, Gerald W. Brock
Interconnection Policy And Technological Progress, Gerald W. Brock
Federal Communications Law Journal
No abstract provided.
Rivalrous Telecommunications Networks With And Without Mandatory Sharing, Thomas W. Hazlett
Rivalrous Telecommunications Networks With And Without Mandatory Sharing, Thomas W. Hazlett
Federal Communications Law Journal
No abstract provided.
'Wi-Fi'ght Them When You Can Join Them? How The Philadelphia Compromise May Have Saved Municipally-Owned Telecommunications Services, Adam Christensen
'Wi-Fi'ght Them When You Can Join Them? How The Philadelphia Compromise May Have Saved Municipally-Owned Telecommunications Services, Adam Christensen
Federal Communications Law Journal
When the Mayor of Philadelphia announced his plan to provide municipally sponsored Wi-Fi Internet access, Verizon, the incumbent telecommunications service provider organized lobbyists to block the plan. The compromise eventually struck between Pennsylvania municipalities and Verizon, which allows municipalities to offer telecommunications services after giving Verizon a right of first refusal has resulted in a certain degree of uncertainty in the future of municipally sponsored Internet access. This Note examines this compromise and argues that it represents an optimistic future for municipally sponsored telecommunications services. The Note first discusses the history of Wi-Fi technology and the development of the law …
What Does Granholm V. Heald Mean For The Future Of The Twenty-First Amendment, The Three-Tier System, And Efficient Alcohol Distribution?, Gregory E. Durkin
What Does Granholm V. Heald Mean For The Future Of The Twenty-First Amendment, The Three-Tier System, And Efficient Alcohol Distribution?, Gregory E. Durkin
Washington and Lee Law Review
No abstract provided.
Applying The Wiretap Act To Online Communications After United States V. Councilman, Jessica Belskis
Applying The Wiretap Act To Online Communications After United States V. Councilman, Jessica Belskis
Washington Journal of Law, Technology & Arts
This article examines the federal Wiretap Act and its application to online communications in light of the United States Court of Appeals for the First Circuit’s recent decision in United States v. Councilman. The federal Wiretap Act places legal limits on the surveillance of electronic communications, but courts struggle to make sense of its application to online communications. Formerly, courts held that the Wiretap Act did not apply to the retrieval of communications from places of electronic storage. However, in United States v. Councilman, the First Circuit suggests that retrieval of emails from temporary places of electronic storage …
Shielding Journalist-“Bloggers”: The Need To Protect Newsgathering Despite The Distribution Medium, Laura Durity
Shielding Journalist-“Bloggers”: The Need To Protect Newsgathering Despite The Distribution Medium, Laura Durity
Duke Law & Technology Review
The failure to agree on a sufficiently narrow definition of "journalist" has stalled efforts to enact a federal shield law to legally protect reporter-source communications from compelled disclosure in federal court. The increasing use of the Internet in news coverage and the greater reliance by the public on the Internet as a news source creates further problems as to who should qualify for federal shield law protection. This iBrief argues that a functional definition of "journalist" can be created to shield journalists from compelled source disclosure so as to protect the free flow of information to the public, but limits …
Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison
Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison
Indiana Law Journal
No abstract provided.
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Canadian Journal of Law and Technology
The following discussion will examine the utility requirement for patentability in the context of EST patents. Part I will provide background information regarding the utility requirement under patent law and will explain why it has been difficult to apply to ESTs. Part II will briefly examine how other jurisdictions, in particular the United States, have addressed the difficul- ties associated with applying the current utility require- ment to biological materials, in particular ESTs. Part III will look at how Canadian courts have interpreted and applied the utility requirement for patentability, and will suggest that ESTs have sufficient value to the …
E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory
Canadian Journal of Law and Technology
This hefty volume is a useful compendium of the basic source materials for the law of electronic commerce in Canada. It offers the text of all the general-purpose legislation that removes legal barriers to the use of electronic communications, for all jurisdictions in the country. It then takes a dozen related areas of law, from domain names to taxation, from competition law to consumer protection, from security to standards, and offers a quick overview and the key documents applicable to each. In each case the commentary is in English then in French, and where the texts are available in both …
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
Canadian Journal of Law and Technology
The volume, composition and management of solid waste generated by households, governments, the commercial sector, and industry have all changed dramatically over the past century. Household waste contained mainly organic material a hundred years ago. Today, both residential and commercial waste is a complex mix of organics, plastics, paper products, metals and a variety of toxic material. Historically, individual households looked after their own waste, through efforts such as composting and burning. Over the past century, with significant increases in volume of waste generated, municipalities have taken over primary responsibility for solid waste management, initially mainly for aesthetic and sanitary …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Canadian Journal of Law and Technology
Rapid growth of technology in the last decades has given rise to electronic commerce (e-commerce) as a new mode of commerce. This new commerce environment has many characteristics that affect commercial relationships and parties. Of these characteristics, global and borderless commercial activity and the intangible nature of communication can be singled out.
From a legal perspective, e-commerce has developed new modes, of contract formation, performance of contracts for intangible goods, as well as payment. In this new borderless and transient sphere, certain interests of parties involved in commercial activities as buyers or sellers are in need of protection. In particular, …
Protecting Intellectual Property In The Developing World: Next Stop—Thailand, Cortney M. Arnold
Protecting Intellectual Property In The Developing World: Next Stop—Thailand, Cortney M. Arnold
Duke Law & Technology Review
This iBrief examines the U.S. strategy for strengthening the protection of intellectual property rights (IPRs) in Southeast Asia through the use of free trade agreements (FTAs). After briefly examining the U.S. methodology for strengthening IPRs outside the U.S., this iBrief predicts that the intellectual property provisions in the final text of the U.S.-Thailand FTA, which is currently being negotiated, will be very similar to the provisions in previous FTAs that the United States has negotiated with other developing countries.