Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …


Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian Oct 2002

Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian

Michigan Telecommunications & Technology Law Review

The purpose of this research guide is not to answer the question "What remedies are available to an owner of computer related technology whose rights have been infringed?" but to provide a methodology by which a legal practitioner can find the answer to this question. This guide sets forth materials and methods of research that can be used for an inquiry that is broad in scope, such as researching which legal scheme's remedial component best suits a client's technology, but that are also capable of being used for a narrow or limited inquiry, such as looking for specific remedies available …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …