Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2006

Internet

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 76

Full-Text Articles in Law

The Five Indicia Of Virtual Property, Charles Blazer Dec 2006

The Five Indicia Of Virtual Property, Charles Blazer

The University of New Hampshire Law Review

[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.

“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Three Reactions To Mgm V. Grokster, Pamela Samuelson Oct 2006

Three Reactions To Mgm V. Grokster, Pamela Samuelson

Michigan Telecommunications & Technology Law Review

It was prescient of the Michigan Telecommunications and Technology Law Review to have organized a conference to discuss the Supreme Court's decision in Metro-Goldwyn-Mayer, Inc. v. Grokster, Inc. As the articles in this issue reveal, commentators have had somewhat mixed reactions to the Grokster decision. Perhaps I am the most mixed (or mixed up) about Grokster among its commentators, for I have had not just one but three reactions to the Grokster decision. My first reaction was to question whether MGM and its co-plaintiffs really won the Grokster case, or at least won it in the way they had hoped. …


File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber Oct 2006

File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber

Michigan Telecommunications & Technology Law Review

Much economic, political, judicial and legal attention has been showered on the significant changes currently taking place within the music production and distribution business forced by the use of the Internet for both file sharing (of unauthorized copyrighted material) and more recent online (legal) music distribution. The strong demand for music, coupled with the low cost of distributing illegal copies via peer-to-peer (P2P) systems, is unraveling the business model by which music has traditionally been created, developed, and distributed. Application of traditional copyright law has been ineffective in stopping the loss of business in the traditional channels. Producers have implemented …


The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald Oct 2006

The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald

Michigan Telecommunications & Technology Law Review

In June, 2005, the United States Supreme Court set forth an "inducement" rule in MGM Studios, Inc. v. Grokster, Ltd. that imposes secondary liability on "one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement." The Court emphasized the limitations of the liability standard it was setting forth, stating that the target was only "purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise." Yet, the liability standard set forth in Grokster …


The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese Oct 2006

The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese

Michigan Telecommunications & Technology Law Review

The copyright issues raised by "dual-use" technologies--equipment that can be used both in ways that infringe copyright and in ways that do not--first gained prominence in connection with the litigation over videocassette recorders that culminated in the Supreme Court's decision in Sony in 1984. Copyright owners had asserted that Sony's manufacture and distribution of VCRs rendered it liable for copyright infringement committed by customers using their Sony VCRs. The Supreme Court in Sony concluded that copyright law did not impose such secondary liability where the device in question was capable of substantial noninfringing uses (and that the VCR was such …


The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher Oct 2006

The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher

Michigan Telecommunications & Technology Law Review

Google's major new initiative is to undertake the task of digitizing the world's collection of books so as to make them searchable. The very idea is audacious, but what is more so is that Google plans to copy without first seeking the permission of the owners of these works. Google Print would make available what is, by conventional measures at least, the highest grade of information--books produced by millions of the world's leading scholars. This is in stark contrast to the inconsistent quality spectrum one encounters through other online sources such as peer-to-peer networks and blogs, where there currently exists …


21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists Oct 2006

21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists

Michigan Telecommunications & Technology Law Review

21st Century Copyright Law in the Digital Domain Symposium held at Universtiy of Michigan Law School Friday, March 24, 2006


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Oct 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

Michigan Telecommunications & Technology Law Review

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden Sep 2006

Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden

ExpressO

Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.

While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Aug 2006

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

ExpressO

When a trade secret is stolen from its owner and posted on the Internet, the default rule is that it becomes a free for all. By virtue of the fact that it has been posted, it becomes public, and consequently loses its trade secret protection. The ensuing result is that independent third parties, including competitors, are entitled to use it, and the trade secret owner, despite years of laudable efforts to maintain the secret, suffers a fatal loss at the hands of a wrongdoer. The apparent injustice in that conclusion does not go unnoticed.

Given that trade secret law is …


Review The Literatures Of The Commons, And Its Application To The Intellectual Property And The Internet, Piyabutr Bunaramrueang Jul 2006

Review The Literatures Of The Commons, And Its Application To The Intellectual Property And The Internet, Piyabutr Bunaramrueang

piyabutr bunaramrueang

There are many controversial ideas of resource utilization. The main discussion is how to maximally benefit from the scarce resources; “private property” and “common property” regimes are the two major solutions for centuries. However, the private property has been taking into the major role as the most convincing principle of economics. The intellectual property has been established and developed but not exactly from the same ground of property of things. Today the intellectual property is expanding its border of exclusive rights and impairs individuals’ reasonable rights to enjoy the common intellectual property. The more problematic issue has occurred when the …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


All Rights Reserved? Cultural Monopoly And The Troubles With Copyright , Michael Geist Jul 2006

All Rights Reserved? Cultural Monopoly And The Troubles With Copyright , Michael Geist

Marquette Intellectual Property Law Review

With an increasing ease for one to download, trade and share information, there is also an increasing desire by companies, corporations and private interests to protect their works. In a time where everything can be commoditized and ideas can be bought and sold at a price, a question we must answer is - Who owns our creativity? Must all rights be reserved? This lecture explores the growth of the citizen journalist and the blossoming of independent creativity online. He also examines the concerns with copyright: how lobby groups have consistently pushed for ever stronger rules. Finally, Dr. Geist presents the …


The Law Of Unintended Consequences, Susan Ness Jun 2006

The Law Of Unintended Consequences, Susan Ness

Federal Communications Law Journal

No abstract provided.


Interconnection Policy And Technological Progress, Gerald W. Brock Jun 2006

Interconnection Policy And Technological Progress, Gerald W. Brock

Federal Communications Law Journal

No abstract provided.


The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra Jun 2006

The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra

Federal Communications Law Journal

No abstract provided.


The 1996 Telecommunications Act, Jim Robbins Jun 2006

The 1996 Telecommunications Act, Jim Robbins

Federal Communications Law Journal

No abstract provided.


Spoofing!: Criminal Law, Cyberspace And Egypt, Rim Al Kassaby Jun 2006

Spoofing!: Criminal Law, Cyberspace And Egypt, Rim Al Kassaby

Archived Theses and Dissertations

Cyberspace is a fascinating world. As we live in our world, we also live in cyberspace. Life in cyberspace is nothing but a partial reflection of our day to day life, things are done, relations are created and ended, and just like in our real life, crimes could happen.

How can we prevent Cybercrime? Is the legal system ready to incorporate such crime. Is society ready to understand how to prevent such crime? The legal framework as well as the main actors of this legal system such as judges or prosecutors need to be prepared and equipped with proper tools …


Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman Apr 2006

Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman

ExpressO

This paper calls for mandated “network neutrality,” the principle that broadband service providers (BSPs) should generally treat all nondestructive data equally. Without such a mandate, BSPs will likely begin charging content providers for the right to send data at the fastest speeds available. The present frequency with which BSPs block some data entirely will also likely increase.

Neutral networks are preferable for two key reasons. First, they spawn innovation, as illustrated by the explosive online innovation to date. Second, neutral networks better distribute communication power, promoting First Amendment values. Extant and likely future acts of discrimination erode both goals. The …


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger Apr 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger

Law Faculty Scholarly Articles

The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and the accompanying disappearance of rational justifications …


Protecting Speech V. Protecting Children: An Examination Of The Judicial Refusal To Allow Legislative Action In The Realm Of Minors And Internet Pornography, William H. Jordan Apr 2006

Protecting Speech V. Protecting Children: An Examination Of The Judicial Refusal To Allow Legislative Action In The Realm Of Minors And Internet Pornography, William H. Jordan

South Carolina Law Review

No abstract provided.


Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison Apr 2006

Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison

Indiana Law Journal

No abstract provided.


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Apr 2006

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Faculty Scholarship

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …


Revenge Of The Bellheads: How The Telecommunications Mindset Will Reshape The Internet, Robert M. Frieden Mar 2006

Revenge Of The Bellheads: How The Telecommunications Mindset Will Reshape The Internet, Robert M. Frieden

ExpressO

Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.

While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …


Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal Mar 2006

Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal

ExpressO

Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …


Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton Mar 2006

Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton

ExpressO

This paper first describes the various mechanical aspects of Internet gambling, and then reviews the U.S. criminal laws that apply to gambling conducted online. As part of this review, several criminal and civil cases involving Internet gambling activities are discussed. Lastly, how the rapidly changing gambling landscape in the United States and the world may effect future federal lawmaking efforts for controlling Internet gambling is considered.