Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Countering Islamic State Exploitation Of The Internet, David P. Fidler Jan 2015

Countering Islamic State Exploitation Of The Internet, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney Jan 2015

Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney

Articles by Maurer Faculty

Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …


Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler Jan 2014

Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Lessons From The Trademark Use Debate, Mark D. Janis, Graeme B. Dinwoodie Jan 2007

Lessons From The Trademark Use Debate, Mark D. Janis, Graeme B. Dinwoodie

Articles by Maurer Faculty

In their response to our article Confusion Over Use: Contextualism in Trademark Law, Professors Dogan and Lemley discard more all-encompassing versions of the trademark use requirement. Instead, they seek to delineate and defend a "more surgical form" of trademark use doctrine. In this reply, we demonstrate that the language of the Lanham Act does not impose a trademark use requirement even when that requirement is defined "surgically" and sections 32 and 43(a) are read "fluidly," as Dogan and Lemley suggest. Moreover, their interpretation still renders section 33(b)(4) redundant and unduly limits appropriate common law development of trademark law. We also …


Confusion Over Use: Contextualism In Trademark Law, Mark D. Janis, Graeme B. Dinwoodie Jan 2007

Confusion Over Use: Contextualism In Trademark Law, Mark D. Janis, Graeme B. Dinwoodie

Articles by Maurer Faculty

This paper tackles an intellectual property theory that many scholars regard as fundamental to future policy debates over the scope of trademark protection: the trademark use theory. We argue that trademark use theory is flawed and should be rejected. The adoption of trademark use theory has immediate practical implications for disputes about the use of trademarks in online advertising, merchandising, and product design, and has long-term consequences for other trademark generally. We critique the theory both descriptively and prescriptively. We argue that trademark use theory over-extends the search costs rationale for the trademark system, and that it unhelpfully elevates formalism …


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield Jan 2004

Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield

Articles by Maurer Faculty

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Principles Of Internet Privacy, Fred H. Cate Jan 2000

Principles Of Internet Privacy, Fred H. Cate

Articles by Maurer Faculty

The definition of privacy developed by Brandeis and Warren and Prosser, and effectively codified by Alan Westin in 1967 - the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others - worked well in a world in which most privacy concerns involved physical intrusions (usually by the government) or public disclosures (usually by the media), which, by their very nature, were comparatively rare and usually discovered.

But that definition's exclusive focus on individual control has grown incomplete in a world in which most privacy concerns involve …


From International Treaties To Internet Norms: The Evolution Of International Trademark Disputes In The Internet Age, Ajay K. Mehrotra, Marcelo Halpern Jan 2000

From International Treaties To Internet Norms: The Evolution Of International Trademark Disputes In The Internet Age, Ajay K. Mehrotra, Marcelo Halpern

Articles by Maurer Faculty

In today's dynamic, digital economy, there is a global clash between geographically bounded intellectual property rights and the limitless reach of the Internet. Traditionally, discrepancies in international intellectual property rights, such as trademark disputes, have been resolved through time-consuming, multilateral state-to-state treaty negotiations that have global harmonization as the primary goal.

With the explosion of e-commerce and the birth of a New Economy, however, such a traditional process is no longer economically viable. Instead, a new approach towards international intellectual property is fast emerging - one that rests not on treaties between multiple states, but on the private contracting of …


The First Amendment, Children, The Internet, And America's Public Libraries, Fred H. Cate Jan 1998

The First Amendment, Children, The Internet, And America's Public Libraries, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


The Technological Transformation Of Copyright Law, Fred H. Cate Jan 1996

The Technological Transformation Of Copyright Law, Fred H. Cate

Articles by Maurer Faculty

Both statutory and case law clearly recognize the constitutional interest in promoting, not restricting, expression. Digital technologies, however, are rapidly changing the application of copyright law to prohibit access, protect ideas and facts, and dramatically expand the monopoly granted to copyright holders.

Whether on a disk or network, digital expression cannot be accessed without being copied into computer memory, as well as onto a hard drive, floppy disk, or magnetic tape if it is to be retained after the computer is switched off. This necessarily violates the exclusive right to reproduce that copyright law grants to copyright holders.

Moreover, to …


Law In Cyberspace, Fred H. Cate Jan 1996

Law In Cyberspace, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


The First Amendment And The National Information Infrastructure, Fred H. Cate Jan 1995

The First Amendment And The National Information Infrastructure, Fred H. Cate

Articles by Maurer Faculty

What the First Amendment status of electronic information should be is a fundamental question which must be addressed in any attempt to arrive at appropriate legal standards to protect the multifarious interests of the users of cyberspace. Yet, despite its importance, the First Amendment has largely been ignored in the debate surrounding what sort of legal framework should control the emerging National Information Infrastructure. Professor Cate surveys the current terrain of First Amendment jurisprudence and describes the different analytical approaches which may be taken. Doctrinal anomalies such as the law of common carriage indicate that at times the courts have …


The Top Fives: An Internet Pathfinder For Law Librarians, Yolanda Patrice Jones Jan 1995

The Top Fives: An Internet Pathfinder For Law Librarians, Yolanda Patrice Jones

Articles by Maurer Faculty

Many law librarians are currently beginning to explore the Internet as a source of legal information. One of the most frequently asked questions after one gets an Internet connection is "Where do I go from here?" The following pathfinder is a list of what I consider to be the most important resources which will lead the legal researcher to the widest possible amount of legal information on the Internet.

This list is purely subjective, and certainly not complete. I tried to stick to the 'top five' format as much as possible, but every so often I couldn't help myself from …