Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 57

Full-Text Articles in Law

For Msnbc, Comcast Represents Not A Threat, But An Opportunity, Daniel Lyons Nov 2010

For Msnbc, Comcast Represents Not A Threat, But An Opportunity, Daniel Lyons

Daniel Lyons

No abstract provided.


Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García Nov 2010

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García

Bruno L. Costantini García

De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …


Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu Oct 2010

Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu

Subhajit Basu

LLM in Cyberlaw: information technology, law and society enables you to develop knowledge and skills in relation to the legal rules regulating cyberlaw activity in the UK and Europe, and at a global level.


A Failure Of Uniform Laws?, Michael Risch Sep 2010

A Failure Of Uniform Laws?, Michael Risch

Michael Risch

The Uniform Trade Secrets Act, adopted in forty-six states over 30 years, illustrates an important purpose of uniform laws: allowing states to adopt sister-state statutory interpretation when they enact the uniform statute. The case law of each UTSA state should theoretically apply in every other state adopting it, which provides an important benefit for small states that do not have enough litigation activity to generate their own substantial trade secret case law. This essay tests this purpose. It examines one small state’s opinions to see how much uniformity the UTSA provides. The results are somewhat surprising: the test state’s courts …


Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq. Sep 2010

Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author discusses the subtle differences between Copyright and Author's Rights. Then he goes into analyzing the different ways a work can become part of the public domain and how it varies from jurisdiction to jurisdiction and from time to time.////////////////////////////////////////////////////El autor analiza las sutiles diferencias entre los derechos de autor y el copyright. Posteriormente se adentra en el análisis de las formas en las que una obra entra dentro del dominio público, y como estas varían dependiendo del territorio y de la época.


Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale Sep 2010

Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale

Danielle Keats Citron

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security. While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


Forward To The Past, Michael Risch Sep 2010

Forward To The Past, Michael Risch

Michael Risch

The Supreme Court’s decision in Bilski v. Kappos - banning all patents claiming ‘‘abstract ideas,’’ but refusing to categorically bar any particular type of patent - represents a return to the Court’s past patentable subject matter jurisprudence. In so returning, the Court determined that business methods could potentially be patentable. This Supreme Court Review article discusses what is essentially a restart: lower courts and the PTO must remake the law using the same precedent that led to the rigid rules rejected by the Court in Bilski. Part I discusses Mr. Bilski’s patent application and the Court’s ruling that it is …


A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer Sep 2010

A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer

Matthew Rimmer

This essay provides a critical assessment of the Fair Use Project based at the Stanford Center for Internet and Society. In evaluating the efficacy of the Fair Use Project, it is worthwhile considering the litigation that the group has been involved in, and evaluating its performance. Part 1 outlines the history of the Stanford Center for Internet and Society, and the aims and objectives of the Fair Use Project. Part 2 considers the litigation in Shloss v. Sweeney over a biography concerning Lucia Joyce, the daughter of the avant-garde literary great, James Joyce. Part 3 examines the dispute over the …


La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano Aug 2010

La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano

Germán M. Teruel Lozano

Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.


The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons Jul 2010

The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons

Daniel Lyons

No abstract provided.


Privacy And Consumer Risks In Cloud Computing, Dan Svantesson, Roger Clarke Jul 2010

Privacy And Consumer Risks In Cloud Computing, Dan Svantesson, Roger Clarke

Dan Svantesson

While vaguely defined, and wide in scope, so-called ‘cloud computing’ has gained considerable attention in recent times. Put simply, it refers to an arrangement under which a user relies on another party to provide access to remote computers and software, whose whereabouts, including their jurisdictional location, are not known nor controllable by the user. In this article, we examine the privacy and consumer risks that are associated with cloud computing.


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García Jul 2010

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


The Path Of Cyberlaw In China(中国网络法的道路), Henry L. Hu, Benjamin Chiao, Fan Wang, Xiaoshu Wang Jun 2010

The Path Of Cyberlaw In China(中国网络法的道路), Henry L. Hu, Benjamin Chiao, Fan Wang, Xiaoshu Wang

Henry L Hu

No abstract provided.


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Danielle Keats Citron

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García Jun 2010

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas May 2010

New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

On 25 November 2009, the European Parliament and Council adopted a new legislation to revise the regulatory framework for the electronic communications sector. This new “package” of Directives includes Directive 2009/136/EC, which amends earlier Directive 2002/58/EC in the fields of 1. mandatory notification of personal data security breaches 2. consent requirements for cookies and 3. anti-spamming measures by ISPs. The scope of the Directive is to enhance the protection of consumers privacy and personal data in the electronic communications sector, through strengthened security-related provisions and improved enforcement mechanisms by the NRAs. In particular Τhe provisions of the new directive require …


The World Of Bits, Andrew D. Murray May 2010

The World Of Bits, Andrew D. Murray

Professor Andrew D Murray

This is Chapter One of my forthcoming book Information Technology Law: The Law and Society to be published by Oxford University Press in May 2010. It is made available as a limited preview.


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez Apr 2010

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


Convergence And Incongruence: Trademark Law And Icann’S Introduction Of New Generic Top-Level Domains, Christine Haight Farley Apr 2010

Convergence And Incongruence: Trademark Law And Icann’S Introduction Of New Generic Top-Level Domains, Christine Haight Farley

Christine Haight Farley

This paper demonstrates how problematic convergences between Internet technology, the demands of a burgeoning e-market and trademark laws have created myriad issues in international governance of domain names. The Internet Corporation for Assigned Names and Numbers (ICANN), the body that governs internet's infrastructure, recently approved a new policy that would allow it to accept applications for additional generic top-level domains (gTLDs). What ICANN contemplates is a uniform system to approve generic top level domains that is expected to have profound implications. Under this new plan anyone can apply for a new gTLD at any time and it could be literally …


Cyber Civil Rights: Looking Forward, Danielle Keats Citron Apr 2010

Cyber Civil Rights: Looking Forward, Danielle Keats Citron

Danielle Keats Citron

The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.


Mainstreaming Privacy Torts, Danielle Keats Citron Apr 2010

Mainstreaming Privacy Torts, Danielle Keats Citron

Danielle Keats Citron

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds Mar 2010

What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Mar 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Danielle Keats Citron

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Derecho De La Seguridad Social En México, Bruno L. Costantini García Feb 2010

Derecho De La Seguridad Social En México, Bruno L. Costantini García

Bruno L. Costantini García

Breve presentación del Derecho de la Segurida Social en México.

¿Qué es?

¿Cómo funciona?

¿Su aplicación?


The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer Jan 2010

The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer

Matthew Rimmer

After much hue and cry, the Copenhagen negotiations over intellectual property and climate change ended in a stalemate and an impasse. There was a gulf between the views of intellectual property maximalists who demanded strong protection of intellectual property rights in respect of clean technologies; and nation states and civil society groups calling for special measures to facilitate technology transfer. As a result, the Copenhagen Accord did contain any text on intellectual property and climate change. Nonetheless, the Copenhagen Accord does, though, contain an important compromise. The text provides for a technology mechanism, which envisages a network of Climate Innovation …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Danielle Keats Citron

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment. In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Leslie Meltzer Henry

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment. In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Danielle Keats Citron

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment. In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …


Civilians In Cyberwarfare: Casualties, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Casualties, Susan W. Brenner, Leo L. Clarke

Susan Brenner

This article is a sequel to Civilians in Cyberwarfare: Conscripts, to be published by the Vanderbilt Journal of Transnational Law. Conscripts addresses the essential role of civilians as participants in cyberwarfare. Here, we explore the potential losses cyberwarfare might cause to civilian entities, including multi-national corporations, utilities, universities and local governments. We explain why cyberwarfare presents unique risks and requires unique executive responses. We also analyze how civilians should manage specific legal liability, political and reputational risks. Finally, we consider whether civilians can expect compensation if the federal government imposes new regulations, appropriates intellectual property, or even conscripts entire businesses …