Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Pushing Back On Stricter Copyright Isp Liability Rules, Pamela Samuelson Apr 2021

Pushing Back On Stricter Copyright Isp Liability Rules, Pamela Samuelson

Michigan Technology Law Review

For more than two decades, internet service providers (ISPs) in the United States, the European Union (EU), and many other countries have been shielded from copyright liability under “safe harbor” rules. These rules apply to ISPs who did not know about or participate in user-uploaded infringements and who take infringing content down after receiving notice from rights holders. Major copyright industry groups were never satisfied with these safe harbors, and their dissatisfaction has become more strident over time as online infringements have grown to scale.

Responding to copyright industry complaints, the EU in 2019 adopted its Directive on Copyright and …


Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas Nov 2017

Paypal Is New Money: Extending Secondary Copyright Liability Safe Harbors To Online Payment Processors, Erika Douglas

Michigan Telecommunications & Technology Law Review

The Digital Millennium Copyright Act (DMCA) has shaped the Internet as we know it. This legislation shields online service providers from secondary copyright infringement liability in exchange for takedown of infringing content of their users. Yet online payment processors, the backbone of $300 billion in U.S. e-commerce, are completely outside of the DMCA’s protection. This Article uses PayPal, the most popular online payment company in the U.S., to illustrate the growing risk of secondary liability for payment processors. First it looks at jurisprudence that expands secondary copyright liability online, and explains how it might be applied to PayPal. Then it …


Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian Apr 2017

Jailbreak!: What Happens When Autonomous Vehicle Owners Hack Into Their Own Cars, Michael Sinanian

Michigan Telecommunications & Technology Law Review

Autonomous and connected vehicles (ACVs) are a transformational force for humanity. It is highly likely that some owners of ACVs will circumvent their vehicle software to expose unauthorized functionality, known as “jailbreaking”. This would trigger copyright liability, the extent of which would be dependent upon the copyright system’s various rulemaking processes and common law interpretations. This note explores the world of software “jailbreaking”, with its roots in smartphone unlocking, and extrapolates that to ACVs. Some compelling (and at times dangerous) scenarios are contemplated, and recommendations are made for consumers, technologists, manufacturers, and policy makers.


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage Sep 2015

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Antibiotic Resistance, Jessica D. Litman Jan 2012

Antibiotic Resistance, Jessica D. Litman

Articles

Ten years ago, when I wrote War Stories,' copyright lawyers were fighting over the question whether unlicensed personal, noncommercial copying, performance or display would be deemed copyright infringement. I described three strategies that lawyers for book publishers, record labels, and movie studios had deployed to try to assure that the question was answered the way they wanted it to be. First, copyright owners were labeling all unlicensed uses as "piracy" on the ground that any unlicensed use might undermine copyright owners' control. That epithet helped to obscure the difference between unlicensed uses that invaded defined statutory exclusive rights and other …


On Communication, John Greenman Jan 2008

On Communication, John Greenman

Michigan Law Review

Everybody knows that communication is important, but nobody knows how to define it. The best scholars refer to it. Free-speech law protects it. But no one-no scholar or judge-has successfully captured it. Few have even tried. This is the first article to define communication under the law. In it, I explain why some activities-music, abstract painting, and parading-are considered communicative under the First Amendment, while others-sex, drugs, and subliminal advertising-are not. I argue that the existing theories of communication, which hold that communicative behaviors are expressive or convey ideas, fail to explain what is going on in free-speech cases. Instead, …


Fair Use And The Digital Millennium Copyright Act, Thomas J. Loos Jan 2007

Fair Use And The Digital Millennium Copyright Act, Thomas J. Loos

Michigan Telecommunications & Technology Law Review

In the last decade of the 20th Century, more than 200 years after the first Copyright Act of 1790, the rights of copyright owners have increased relative to those of the public. The Visual Artists Rights Act of 1990 provided a limited right to visual artists to control their work; even after sold, limiting first use rights. The first copyright act had a 28 year term; in 1998, the term of copyright was increased to the life of the author plus 70 years. The Digital Millennium Copyright Act (DMCA) of 1998 dramatically shrank the fair use rights provided under 17 …


Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola Oct 2004

Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola

Michigan Telecommunications & Technology Law Review

Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …


From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans Apr 2004

From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans

Michigan Telecommunications & Technology Law Review

If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Paradigm Shifts And Access Controls: An Economic Analysis Of The Anticircumvention Provisions Of The Digital Millennium Copyright Act, Melissa A. Kern Jun 2002

Paradigm Shifts And Access Controls: An Economic Analysis Of The Anticircumvention Provisions Of The Digital Millennium Copyright Act, Melissa A. Kern

University of Michigan Journal of Law Reform

This Note addresses the broadened scope of protection granted to copyright holders under the anticircumvention provisions of the Digital Millennium Copyright Act of 1998 (DMCA). This broadened scope extends to copyright holders the right to control access to their works, diminishing the consumer's 'fair use" of those works that previously served as a defense to alleged copyright infringements. While access controls are supported by economists who believe they are useful in correcting market inefficiencies and excluding free riders, this Note suggests that access controls cannot correct all market inefficiencies. Furthermore, such access controls deny access and use of copyrighted material …


Toward A "New Deal" For Copyright In The Information Age, Pamela Samuelson Jan 2002

Toward A "New Deal" For Copyright In The Information Age, Pamela Samuelson

Michigan Law Review

Jessica Litman believes the public needs a very good copyright lawyer, and if I have not mistaken her intentions, she is volunteering for the job (pp. 70-73). A century of Congressional deference to industry-negotiated compromises has produced, she argues, a copyright law that is both incomprehensible and unfair. This incomprehensibility might be tolerable if copyright law governed only commercial relations among industry participants, all of whom have copyright counsel. To the extent that copyright law applies to the conduct of ordinary persons, its incomprehensibility presents serious difficulties. Moreover, to the extent that copyright law makes illegal many ordinary activities of …


Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz Jun 2000

Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz

Michigan Telecommunications & Technology Law Review

...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …