Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Cyberspace And Domain Name Disputes: A Look At The Forums And Remedies Available To Trademark Holders In Cyberspace, J. Kyle Mccurry Jul 2002

Cyberspace And Domain Name Disputes: A Look At The Forums And Remedies Available To Trademark Holders In Cyberspace, J. Kyle Mccurry

Journal of Dispute Resolution

The purpose of this Comment is to define the scope and advantages of using both the UDRP and the ACPA. In the same regard, this Comment looks at the limitations of the UDRP and the ACPA and the problems which have arisen in the arbitrations and cases that have come under both.


Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane Jun 2002

Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane

International Law Studies

No abstract provided.


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Indecent Exposures In An Electronic Regime, Natalie L. Regoli Mar 2002

Indecent Exposures In An Electronic Regime, Natalie L. Regoli

Federal Communications Law Journal

As the topic of data privacy is vast and the subject of much scrutiny, this Comment focuses narrowly on commercial cyber-activities relating to the nonconsensual Internet acquisition of personally identifiable user data. Beginning with a brief examination of the technology that has exacerbated privacy law's inadequacies, it briefly discusses failed attempts to safeguard privacy rights through the market and federal agency management. It then addresses current U.S. privacy legislation and the 1995 European Privacy Directive. Finally, this Comment proposes the creation of a new legislative system to effectively combat the surreptitious collection, storage, use, and sale of personal data.


The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis Mar 2002

The Defamation Of Choice-Of-Law In Cyberspace: Countering The View That The Restatement (Second) Of Conflict Of Laws Is Inadequate To Navigate The Borderless Reaches Of The Intangible Frontier, Philip Adam Davis

Federal Communications Law Journal

This Note examines the adequacy of the traditional choice-of-law rules, including the Restatement (Second), in interstate cyber-defamation disputes, and argues that there is nothing different or unique about cyberspace which warrants the modification or abandonment of traditional choice-of-law regimes for cyber-defamation disputes.


Haste Makes Waste: Congress And The Common Law In Cyberspace, Suzanna Sherry Mar 2002

Haste Makes Waste: Congress And The Common Law In Cyberspace, Suzanna Sherry

Vanderbilt Law Review

Speed is an asset in computer technology, but not necessarily in law. The new technologies of the twentieth and twenty-first centuries have inevitably raised new legal questions; all too often, the response to these new legal challenges is a hastily enacted federal statute. If the Internet allows children access to pornography, we enact the Communications Decency Act ("CDA"). Commercial concerns about cyber-authenticity prompt the Electronic Signatures in Global and National Commerce Act ("E-SIGN"). Are cybersquatters creating domain name problems? We've got a law for that, too. These are just a few of the quick fixes driven by a perceived need …


The Globalization Of Jurisdiction, Paul Schiff Berman Jan 2002

The Globalization Of Jurisdiction, Paul Schiff Berman

GW Law Faculty Publications & Other Works

This Article begins by surveying the myriad ways that increasing globalization of communication, travel, and trade, and in particular the rise of the Internet, have forced judges and legal scholars to "adapt" traditional rules for legal jurisdiction to the new economic and social environment. For example, if a person posts content online that is legal where posted but illegal in some place where it is viewed, can that person be subject to suit in the far-off location? How should the International Shoe "minimum contacts" test account for online contacts? Is online activity sufficient to make one "present" in a jurisdiction …


How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos Jan 2002

How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos

Northwestern Journal of International Law & Business

The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …


Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove Jan 2002

Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove

GW Law Faculty Publications & Other Works

In this article, Professor Solove develops a theory to reconcile the tension between transparency and privacy in the context of public records. Federal and state governments maintain public records containing personal information spanning an individual's life from birth to death. The web of state and federal regulation that governs the accessibility of these records generally creates a default rule in open access to information. Solove contends that the ready availability of public records creates a significant problem for privacy because various bits of information when aggregated paint a detailed portrait of a person's life that Solove refers to as a …