Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 14 of 14
Full-Text Articles in Law
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Lessons From The Trademark Use Debate, Mark D. Janis, Graeme B. Dinwoodie
Lessons From The Trademark Use Debate, Mark D. Janis, Graeme B. Dinwoodie
Articles by Maurer Faculty
In their response to our article Confusion Over Use: Contextualism in Trademark Law, Professors Dogan and Lemley discard more all-encompassing versions of the trademark use requirement. Instead, they seek to delineate and defend a "more surgical form" of trademark use doctrine. In this reply, we demonstrate that the language of the Lanham Act does not impose a trademark use requirement even when that requirement is defined "surgically" and sections 32 and 43(a) are read "fluidly," as Dogan and Lemley suggest. Moreover, their interpretation still renders section 33(b)(4) redundant and unduly limits appropriate common law development of trademark law. We also …
Confusion Over Use: Contextualism In Trademark Law, Mark D. Janis, Graeme B. Dinwoodie
Confusion Over Use: Contextualism In Trademark Law, Mark D. Janis, Graeme B. Dinwoodie
Articles by Maurer Faculty
This paper tackles an intellectual property theory that many scholars regard as fundamental to future policy debates over the scope of trademark protection: the trademark use theory. We argue that trademark use theory is flawed and should be rejected. The adoption of trademark use theory has immediate practical implications for disputes about the use of trademarks in online advertising, merchandising, and product design, and has long-term consequences for other trademark generally. We critique the theory both descriptively and prescriptively. We argue that trademark use theory over-extends the search costs rationale for the trademark system, and that it unhelpfully elevates formalism …
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield
Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield
Articles by Maurer Faculty
Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.
A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …
Principles Of Internet Privacy, Fred H. Cate
Principles Of Internet Privacy, Fred H. Cate
Articles by Maurer Faculty
The definition of privacy developed by Brandeis and Warren and Prosser, and effectively codified by Alan Westin in 1967 - the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others - worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.
But that definition's exclusive focus on individual control has grown incomplete in a world in which most privacy concerns involve …
From International Treaties To Internet Norms: The Evolution Of International Trademark Disputes In The Internet Age, Ajay K. Mehrotra, Marcelo Halpern
From International Treaties To Internet Norms: The Evolution Of International Trademark Disputes In The Internet Age, Ajay K. Mehrotra, Marcelo Halpern
Articles by Maurer Faculty
In today's dynamic, digital economy, there is a global clash between geographically bounded intellectual property rights and the limitless reach of the Internet. Traditionally, discrepancies in international intellectual property rights, such as trademark disputes, have been resolved through time-consuming, multilateral state-to-state treaty negotiations that have global harmonization as the primary goal.
With the explosion of e-commerce and the birth of a New Economy, however, such a traditional process is no longer economically viable. Instead, a new approach towards international intellectual property is fast emerging - one that rests not on treaties between multiple states, but on the private contracting of …
The First Amendment, Children, The Internet, And America's Public Libraries, Fred H. Cate
The First Amendment, Children, The Internet, And America's Public Libraries, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
The Technological Transformation Of Copyright Law, Fred H. Cate
The Technological Transformation Of Copyright Law, Fred H. Cate
Articles by Maurer Faculty
Both statutory and case law clearly recognize the constitutional interest in promoting, not restricting, expression. Digital technologies, however, are rapidly changing the application of copyright law to prohibit access, protect ideas and facts, and dramatically expand the monopoly granted to copyright holders.
Whether on a disk or network, digital expression cannot be accessed without being copied into computer memory, as well as onto a hard drive, floppy disk, or magnetic tape if it is to be retained after the computer is switched off. This necessarily violates the exclusive right to reproduce that copyright law grants to copyright holders.
Moreover, to …
Law In Cyberspace, Fred H. Cate
The First Amendment And The National Information Infrastructure, Fred H. Cate
The First Amendment And The National Information Infrastructure, Fred H. Cate
Articles by Maurer Faculty
What the First Amendment status of electronic information should be is a fundamental question which must be addressed in any attempt to arrive at appropriate legal standards to protect the multifarious interests of the users of cyberspace. Yet, despite its importance, the First Amendment has largely been ignored in the debate surrounding what sort of legal framework should control the emerging National Information Infrastructure. Professor Cate surveys the current terrain of First Amendment jurisprudence and describes the different analytical approaches which may be taken. Doctrinal anomalies such as the law of common carriage indicate that at times the courts have …
The Top Fives: An Internet Pathfinder For Law Librarians, Yolanda Patrice Jones
The Top Fives: An Internet Pathfinder For Law Librarians, Yolanda Patrice Jones
Articles by Maurer Faculty
Many law librarians are currently beginning to explore the Internet as a source of legal information. One of the most frequently asked questions after one gets an Internet connection is "Where do I go from here?" The following pathfinder is a list of what I consider to be the most important resources which will lead the legal researcher to the widest possible amount of legal information on the Internet.
This list is purely subjective, and certainly not complete. I tried to stick to the 'top five' format as much as possible, but every so often I couldn't help myself from …