Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen Dec 2002

Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen

Faculty Scholarship

Computer networks create tremendously increased capabilities but also represent equally increased vulnerabilities. These vulnerabilites are especially acute in relation to potential attacks on critical national infrasturucture. This Article proposes that international law must evolve to recognize that attacks against a nation's critical national infrastructure from any source constitute a use of force. Such attacks, therefore, give the victim state the right to proportional self-defense - including anticipatory self-defense - even if the computer network attack is not an armed attack under Article 51 of the United Nations Charter. Due to the instantaneous nature of computer network attacks, the right to …


Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean Nov 2002

Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Nov 2002

4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.


Vol. Ix, Tab 41 - Ex. 5 - Google Advertising Policy Review, Google Mar 2002

Vol. Ix, Tab 41 - Ex. 5 - Google Advertising Policy Review, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 43 - Document Adwords Select™ - It's All About Results™, Google Jan 2002

Vol. Ix, Tab 46 - Ex. 43 - Document Adwords Select™ - It's All About Results™, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Digital Tv, Copy Control, And Public Policy, Jonathan Weinberg Jan 2002

Digital Tv, Copy Control, And Public Policy, Jonathan Weinberg

Law Faculty Research Publications

No abstract provided.


Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley Jan 2002

Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley

Journal Articles

This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …


De-Bugging Open Source Software Licensing, Robert W. Gomulkiewicz Jan 2002

De-Bugging Open Source Software Licensing, Robert W. Gomulkiewicz

Articles

Home computer users and businesses often rely on software developed by unconventional programmers known as "hackers." Hackers claim that the code they develop is superior in quality to the code developed by commercial software firms because hackers freely share the code they develop. This code sharing enables a multitude of programmers from around the world to rapidly find and fix bugs. The legal mechanism that enables hackers to deploy this worldwide team of de-buggers is a license agreement or, to be more precise,an assortment of license agreements known as "open source" licenses.

Although open source software developers may regularly fix …


Default Rules In Sales And The Myth Of Contracting Out, James J. White Jan 2002

Default Rules In Sales And The Myth Of Contracting Out, James J. White

Articles

In this article, I trace the dispute in the courts and before the ALI and NCCUSL over the proper contract formation and interpretation default rules. In Part II, I consider the Gateway litigation. In Part III, I deal with UCITA and the revision to Article 2. In Part IV, I consider the merits of the competing default rules.


Legal Protection For Software: Still A Work In Progress, Robert W. Gomulkiewicz Jan 2002

Legal Protection For Software: Still A Work In Progress, Robert W. Gomulkiewicz

Articles

Software began as geekware-something written by programmers for programmers. Now, software is a business and consumer staple. Cryptic character-based user interfaces have given way to friendly graphical ones; multi-media is everywhere; people own multiple computers of varying sizes; computers are connected to one another across the globe; email and instant electronic messages have replaced letters and telephone calls for many people.

The issue of whether the law should protect software seems quaint to us now. Over the past twenty-five years, legislatures and courts have concluded that copyright, patent, trade secret, trademark, and contract law all can be used to protect …


The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister Jan 2002

The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister

Faculty Works

As the Internet has gained prevalence, attention has turned to its regulation. Indeed, regulation proves to be a unique and complex problem, given the Internet's lack of traditional borders and boundaries. Highlighting possible avenues of regulation, the author discusses neo-classical economic theory, specifically Monroe E. Price's market for loyalties theory. Although originally applied to the regulation of broadcasting, the author contends that the market for loyalties theory can also be applied to the Internet. Building on Professor Price's pioneering analysis, the article extends the theory to examine market elasticity's effect on the loss of monopoly control over information flow (as …


Form And Substance In Cyberspace, A. Michael Froomkin Jan 2002

Form And Substance In Cyberspace, A. Michael Froomkin

Articles

In this Response to the preceding article by Joe Sims and Cynthia Bauerly, A. Michael Froomkin defends his earlier critique of ICANN. This Response first summarizes the arguments in Wrong Turn In Cyberspace, which explained why ICANN lacks procedural and substantive legitimacy. This Response focuses on how the U.S. government continues to assert control over the domain name system, and how this control violates the APA, the nondelegation doctrine as articulated by the Supreme Court in Carter Coal, and public policy. Professor Froomkin then proposes that ICANN's role be more narrowly focused away from policy making towards true …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan Jan 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan

Articles by Maurer Faculty

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector, despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11 terrorist attacks on the World Trade Center and the Pentagon. Efforts to identify and bring to justice the perpetrators and to protect against future terrorist attacks, while threatening to weaken constitutional protections against government intrusions into personal …


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …