Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Adwords (3)
- Google (3)
- First Amendment (2)
- Intellectual property (2)
- Privacy (2)
-
- Software (2)
- ALA v. United States (1)
- Administrative procedure (1)
- Adsense (1)
- American Library Association v. United States (1)
- Arbitration (1)
- Article 2 (1)
- Background color (1)
- Buyers (1)
- CIPA (1)
- Carnivore (1)
- Children's Internet Protection Act (1)
- China (1)
- Contract formation (1)
- Contract interpretation (1)
- Contracts (1)
- Copyright (1)
- Courts (1)
- Cybercrime (1)
- Domain name disputes (1)
- ECPA (1)
- Electronic surveillance (1)
- End user license (1)
- FBI (1)
- FISA (1)
Articles 1 - 14 of 14
Full-Text Articles in Law
Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen
Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen
Faculty Scholarship
Computer networks create tremendously increased capabilities but also represent equally increased vulnerabilities. These vulnerabilites are especially acute in relation to potential attacks on critical national infrasturucture. This Article proposes that international law must evolve to recognize that attacks against a nation's critical national infrastructure from any source constitute a use of force. Such attacks, therefore, give the victim state the right to proportional self-defense - including anticipatory self-defense - even if the computer network attack is not an armed attack under Article 51 of the United Nations Charter. Due to the instantaneous nature of computer network attacks, the right to …
Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean
Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.
Vol. Ix, Tab 41 - Ex. 5 - Google Advertising Policy Review, Google
Vol. Ix, Tab 41 - Ex. 5 - Google Advertising Policy Review, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 43 - Document Adwords Select™ - It's All About Results™, Google
Vol. Ix, Tab 46 - Ex. 43 - Document Adwords Select™ - It's All About Results™, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Digital Tv, Copy Control, And Public Policy, Jonathan Weinberg
Digital Tv, Copy Control, And Public Policy, Jonathan Weinberg
Law Faculty Research Publications
No abstract provided.
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Journal Articles
This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …
De-Bugging Open Source Software Licensing, Robert W. Gomulkiewicz
De-Bugging Open Source Software Licensing, Robert W. Gomulkiewicz
Articles
Home computer users and businesses often rely on software developed by unconventional programmers known as "hackers." Hackers claim that the code they develop is superior in quality to the code developed by commercial software firms because hackers freely share the code they develop. This code sharing enables a multitude of programmers from around the world to rapidly find and fix bugs. The legal mechanism that enables hackers to deploy this worldwide team of de-buggers is a license agreement or, to be more precise,an assortment of license agreements known as "open source" licenses.
Although open source software developers may regularly fix …
Default Rules In Sales And The Myth Of Contracting Out, James J. White
Default Rules In Sales And The Myth Of Contracting Out, James J. White
Articles
In this article, I trace the dispute in the courts and before the ALI and NCCUSL over the proper contract formation and interpretation default rules. In Part II, I consider the Gateway litigation. In Part III, I deal with UCITA and the revision to Article 2. In Part IV, I consider the merits of the competing default rules.
Legal Protection For Software: Still A Work In Progress, Robert W. Gomulkiewicz
Legal Protection For Software: Still A Work In Progress, Robert W. Gomulkiewicz
Articles
Software began as geekware-something written by programmers for programmers. Now, software is a business and consumer staple. Cryptic character-based user interfaces have given way to friendly graphical ones; multi-media is everywhere; people own multiple computers of varying sizes; computers are connected to one another across the globe; email and instant electronic messages have replaced letters and telephone calls for many people.
The issue of whether the law should protect software seems quaint to us now. Over the past twenty-five years, legislatures and courts have concluded that copyright, patent, trade secret, trademark, and contract law all can be used to protect …
The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister
The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister
Faculty Works
As the Internet has gained prevalence, attention has turned to its regulation. Indeed, regulation proves to be a unique and complex problem, given the Internet's lack of traditional borders and boundaries. Highlighting possible avenues of regulation, the author discusses neo-classical economic theory, specifically Monroe E. Price's market for loyalties theory. Although originally applied to the regulation of broadcasting, the author contends that the market for loyalties theory can also be applied to the Internet. Building on Professor Price's pioneering analysis, the article extends the theory to examine market elasticity's effect on the loss of monopoly control over information flow (as …
Form And Substance In Cyberspace, A. Michael Froomkin
Form And Substance In Cyberspace, A. Michael Froomkin
Articles
In this Response to the preceding article by Joe Sims and Cynthia Bauerly, A. Michael Froomkin defends his earlier critique of ICANN. This Response first summarizes the arguments in Wrong Turn In Cyberspace, which explained why ICANN lacks procedural and substantive legitimacy. This Response focuses on how the U.S. government continues to assert control over the domain name system, and how this control violates the APA, the nondelegation doctrine as articulated by the Supreme Court in Carter Coal, and public policy. Professor Froomkin then proposes that ICANN's role be more narrowly focused away from policy making towards true …
Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan
Articles by Maurer Faculty
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector, despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11 terrorist attacks on the World Trade Center and the Pentagon. Efforts to identify and bring to justice the perpetrators and to protect against future terrorist attacks, while threatening to weaken constitutional protections against government intrusions into personal …
The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog
The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog
Faculty Scholarship
Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …