Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Chicago-Kent College of Law

2009

Copyright

Articles 1 - 2 of 2

Full-Text Articles in Law

Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder Jun 2009

Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder

Chicago-Kent Law Review

Peer-to-peer networks are often used to infringe copyrights, but they also serve some legitimate purposes consistent with copyright law. In attempting to find a satisfactor solution, this note develops and analyzes two models that future peer-to-peer networks could employ to attempt to avoid liability for copyright infringement. The note then analyzes the law, applies the two models to the relevant legal tests, and analyzes whether a peer-to-peer network operating on each model could avoid liability for copyright infringement. It concludes that modifying their technological structure may help peer-to-peer networks avoid liability, but that some risks remain.