Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Law

Edible Plagiarism: Reconsidering Recipe Copyright In The Digital Age, Meredith G. Lawrence Jan 2011

Edible Plagiarism: Reconsidering Recipe Copyright In The Digital Age, Meredith G. Lawrence

Vanderbilt Journal of Entertainment & Technology Law

Sharing recipes through food blogs is an increasingly popular activity. Bloggers publish their own recipes, claiming copyright protection, but they also publish others' recipes. Food publishers who distribute recipes online may be harmed when bloggers include the entire text of the food publisher's recipe on a blog without the publisher's knowledge or permission. The blogger's inclusion of an entire recipe often reduces site traffic to the food publisher's website, thereby damaging advertising revenues. Copyright law, as courts interpret it today, does not provide these publishers with recourse against bloggers who publish their recipes without permission.

This Note analyzes the various …


Along For The Ride: Gps And The Fourth Amendment, Stephen A. Josey Jan 2011

Along For The Ride: Gps And The Fourth Amendment, Stephen A. Josey

Vanderbilt Journal of Entertainment & Technology Law

With the advent of new technologies, the line as to where the Fourth Amendment forbids certain police behavior and when it does not has become increasingly blurred. Recently, the issue of whether police may use Global Positioning System (GPS) tracking devices to track individuals for prolonged periods of time without first securing a search warrant has crept its way into the limelight. The various circuits have arrived at different conclusions, and the question has now found its way onto the US Supreme Court's docket. After analyzing and weighing both Supreme Court case law and public policy considerations, this Note concludes …


Hacking Into Federal Court: Employee "Authorization" Under The Computer Fraud And Abuse Act, Thomas E. Booms Jan 2011

Hacking Into Federal Court: Employee "Authorization" Under The Computer Fraud And Abuse Act, Thomas E. Booms

Vanderbilt Journal of Entertainment & Technology Law

Few would disagree that computers play an important role in modern United States society. However, many would be surprised to discover the modest amount of legislation governing computer use. Congress began addressing computer crime in 1984 by enacting the Computer Fraud and Abuse Act (CFAA). The CFAA represented the first piece of federal legislation governing computer crimes and has undergone eight amendments to date, making it one of the most expansive criminal laws in the United States. In 1994, Congress added a civil provision opening the door for application of the statute in novel situations. Initially enacted to target crimes …


Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan Jan 2011

Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan

Vanderbilt Journal of Entertainment & Technology Law

The advent of new communications technologies has generated debate over the applicability of the Fourth Amendment's warrant requirement to communications sent through, and stored in, technologies not anticipated by the Framers. In 1986, Congress responded to perceived gaps in the protections of the warrant requirement as applied to newer technologies, such as email, by passing the Stored Communications Act (SCA). As originally enacted, the SCA attempted to balance the interests of law enforcement against individual privacy rights by dictating the mechanisms by which the government could compel a particular service provider to disclose communications stored on behalf of its customers. …


Drawing A Line In The Sand: Copyright Law And New Museums, Megan M. Carpenter Jan 2011

Drawing A Line In The Sand: Copyright Law And New Museums, Megan M. Carpenter

Vanderbilt Journal of Entertainment & Technology Law

Over the last twenty years, audience attendance at museums, galleries, and performing arts institutions in the United States has decreased dramatically. Major museums and galleries are considering ways to add engaging and meaningful value to the user experience with technology, from incorporating user-generated content to creating multimedia installations billed as "collaborative" works.

In 2010, the Dallas Museum of Art's Coastlines: Images of Land and Sea exhibition featured landscapes from 1850 to the present, as well as a sound installation composed by students and faculty at a local university, which played on speakers throughout the show and responded directly to the …


The Anti-Bootlegging Provisions: Congressional Power And Constitutional Limitations, Craig W. Dallon Jan 2011

The Anti-Bootlegging Provisions: Congressional Power And Constitutional Limitations, Craig W. Dallon

Vanderbilt Journal of Entertainment & Technology Law

Courts and scholars have considered the constitutional validity of 17 U.S.C. § 1101 (civil), and 18 U.S.C. § 2319A (criminal), known together as "the anti-bootlegging provisions." These provisions prohibit unauthorized recording, copying, and distribution of live musical performances. The provisions have been challenged in three cases, resulting in five published opinions. Two district court opinions held the provisions unconstitutional, but subsequent opinions vacated those decisions. Notwithstanding a sharp division among copyright scholars, the courts have upheld these provisions. The discussion surrounding them is part of a continuing struggle to ascertain limits on congressional power to regulate copying and distribution of …


Electronic Medical Records: A Prescription For Increased Medical Malpractice Liability?, Blake Carter Jan 2011

Electronic Medical Records: A Prescription For Increased Medical Malpractice Liability?, Blake Carter

Vanderbilt Journal of Entertainment & Technology Law

The cost and quality of health care is and most likely will continue to be one of the most important issues that the United States faces in the coming decade. Although no powerful antidote exists to cure this industry of all of its ailments, one potential suggestion to treat some of the symptoms is the introduction of electronic medical records (EMRs).

Members of the medical community, patients, and even politicians all agree that EMRs offer promising opportunities to improve the overall quality of health care. However, lost in the discussion of these opportunities, is a consideration of the potential side …


Copyright In Memoriam, Julie C. Young Jan 2011

Copyright In Memoriam, Julie C. Young

Vanderbilt Journal of Entertainment & Technology Law

Can a government infringe upon a work dedicated to the memory of its people? The February 2010 Federal Circuit decision "Gaylord v. United States" addresses that question, but any satisfaction from the decision presupposes that the government should be held liable for such an infringement. Consistent with the 1976 Copyright Act, the Gaylord decision preserves the author's rights, paying no regard to the identity of the audience or the infringer. From a policy perspective, however, the result is dubious. Arguably, if a work is a public memorial, and paid for with public funds, it should immediately enter the public domain. …


Putting The Shock Value In First Amendment Jurisprudence: When Freedom For The Citizen-Journalist Watchdog Trumps The Right Of Informational Privacy On The Internet, Clay Calvert, Mirelis Torres Jan 2011

Putting The Shock Value In First Amendment Jurisprudence: When Freedom For The Citizen-Journalist Watchdog Trumps The Right Of Informational Privacy On The Internet, Clay Calvert, Mirelis Torres

Vanderbilt Journal of Entertainment & Technology Law

This Article, which takes the July 2010 ruling by the Fourth Circuit in Ostergren v. Cuccinelli as a point of departure, explores the growing tension between the First Amendment right of Free Speech and the nascent right to online informational privacy. The Article addresses the "shock value" in First Amendment jurisprudence, stretching from Cohen v. California and Texas v. Johnson through the recent ruling in Ostergren. The Article also examines the traditional watchdog function of the press increasingly performed on the Internet by so-called citizen-journalists akin to Betty Ostergren. The Article concludes that while the Fourth Circuit's decision in Ostergren …


Is Online Copyright Enforcement Scalable?, Annemarie Bridy Jan 2011

Is Online Copyright Enforcement Scalable?, Annemarie Bridy

Vanderbilt Journal of Entertainment & Technology Law

This Article examines P2P file sharing and the copyright enforcement problem it has created through the lens of scalability. Part I traces the evolution of peer-to-peer (P2P) networks from Napster to BitTorrent, with a focus on the relative scalability of successive architectures. Part II takes up the difficult question of the scale of P2P infringement and its harms, examining the strategic number-crunching that underlies industry data on piracy, the government's credulous acceptance of that data, and the risk of letting industry hyperbole drive copyright policy and law enforcement priorities. Part III evaluates the efficacy of the Digital Millennium Copyright Act …


Keep America Exceptional! Against Adopting Japanese And European-Style Criminalization Of Contributory Copyright Infringement, Salil K. Mehra Jan 2011

Keep America Exceptional! Against Adopting Japanese And European-Style Criminalization Of Contributory Copyright Infringement, Salil K. Mehra

Vanderbilt Journal of Entertainment & Technology Law

This brief Article, written in connection with a Symposium hosted by the Vanderbilt Journal of Entertainment and Technology Law, addresses nascent criminal enforcement against contributory copyright infringement in connection with P2P file sharing. Using Judge Posner's analysis in the Aimster case as a lens, it discusses recent cases in Japan and Sweden. This Article contends that criminalization involves an inherent uncertainty involving an innovator's knowledge of, and intent for, the future uses of the platform by others. Despite the difficulty of this task, since Japan and the E.U. have seen criminal prosecutions brought against contributory infringers, it should not evoke …


Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg Jan 2011

Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg

Vanderbilt Journal of Entertainment & Technology Law

In the last decade, email spam has become more than just an annoyance for email users. Unsolicited messages now comprise more than 95 percent of all email sent worldwide. This costs US businesses billions of dollars in lost productivity each year. The US Congress passed the CAN-SPAM Act of 2003 to regulate the spam industry. Unfortunately, data show that spam only increased since the Act's passage. Part of the reason for this failure is that the Act only authorizes the Federal Trade Commission, state attorneys general, and Internet Service Providers to bring action under its provisions. Each of these authorized …


The Kindle Controversy: An Economic Analysis Of How The Amazon Kindle's Text-To-Speech Feature Violates Copyright Law, Jeremy B. Francis Jan 2011

The Kindle Controversy: An Economic Analysis Of How The Amazon Kindle's Text-To-Speech Feature Violates Copyright Law, Jeremy B. Francis

Vanderbilt Journal of Entertainment & Technology Law

In 2009, Amazon released the Kindle 2 with a text-to-speech feature. This feature allows users of the Kindle 2 to download software to the device that will read e-books aloud. Authors and publishers of e-books immediately objected to the feature, arguing that it essentially created an unauthorized audiobook. Amazon maintained the legality of the text-to-speech feature, arguing that it does not copy, perform, or create a derivative work. Amazon decided to avoid a legal battle by allowing rightsholders to decide whether to enable the text-to-speech feature for each individual title. The copyright community, however, responded swiftly and nearly unanimously, siding …


There Will Be Blood ... Testing: The Intersection Of Professional Sports And The Genetic Information Nondiscrimination Act Of 2008, Jesse A. Bland Jan 2011

There Will Be Blood ... Testing: The Intersection Of Professional Sports And The Genetic Information Nondiscrimination Act Of 2008, Jesse A. Bland

Vanderbilt Journal of Entertainment & Technology Law

Genetic testing, professional baseball, and employment discrimination seldom intersect. This Note changes that. Thanks to scientific breakthroughs in genetic research over the past half-century, genetic testing is a powerful tool for producing rich, individualized information. Progress comes at a price, however. As genetic testing has advanced and become more prevalent, so too has the potential misuse of genetic information. A recently enacted federal law--the Genetic Information Nondiscrimination Act of 2008 (GINA)--seeks to eliminate one such threat by prohibiting the improper use of genetic information in employment decisions. While the law gained congressional momentum after tales of abuse in blue-collar industries, …


Rebuilding The Prevent Defense: Why Unethical Agents Continue To Score And What Can Be Done To Change The Game, R. Alexander Payne Jan 2011

Rebuilding The Prevent Defense: Why Unethical Agents Continue To Score And What Can Be Done To Change The Game, R. Alexander Payne

Vanderbilt Journal of Entertainment & Technology Law

Despite decades of regulation, college athletics continues to face problems stemming from agents' unethical and illegal tactics in recruiting student-athletes. The NCAA, Congress, state legislatures, and professional players unions have all sought to regulate the interaction between athletes and agents in various ways, often leading to conflicts and gaps within existing laws, which some agents readily exploit. Agents frequently slip through the law's porous prevent defense while the brunt of enforcement and public opprobrium falls on unsophisticated student-athletes and their schools--who are frequently outsiders to the saga. This Note explores the causes resulting in an atmosphere of noncompliance, including the …


What's Wrong With U.S.?: Why The United States Should Have A Public Performance Right For Sound Recordings, William Henslee Jan 2011

What's Wrong With U.S.?: Why The United States Should Have A Public Performance Right For Sound Recordings, William Henslee

Vanderbilt Journal of Entertainment & Technology Law

This Article discusses the need for the United States to implement a public performance royalty for sound recordings. Under the current system, song writers are compensated for the use of their musical works, but performers on sound recordings do not receive any compensation. Radio and television stations currently pay the performing rights societies a royalty for playing the sound recordings, but they do not pay a performance royalty to the artists who perform the music and record companies that promote and release the sound recordings. Proposed legislation will add a performance royalty for artists and record companies to the current …


Information Wars And The Challenges Of Content Protection In Digital Contexts, Raymond T. Nimmer Jan 2011

Information Wars And The Challenges Of Content Protection In Digital Contexts, Raymond T. Nimmer

Vanderbilt Journal of Entertainment & Technology Law

We are in the midst of a fundamental conflict in law and policy between those who favor maintaining and expanding copyright and related rights in the digital context ("rights enhancers"), and those who favor letting rights atrophy ("rights restrictors'). This Article argues that strong intellectual property rights are essential. At minimum, they are important to support creativity in contexts where the creation, collection, or distribution of the content requires substantial investment of time and resources. The case for allowing creators' rights to weaken is both untested and structurally suspect. Copyright law must construct a balance that fully supports creative activity …


Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton Jan 2011

Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton

Vanderbilt Journal of Entertainment & Technology Law

Direct copyright infringement attracts strict liability. However, as a theoretical matter, it is not necessarily clear why. Legislatures and courts have typically imposed strict liability where: (a) a defendant has notice of a plaintiff's rights, particularly where those rights involve a property interest; (b) a mens rea requirement on the part of the defendant would create an untenable burden on the plaintiff; (c) it is easier for the defendant to avoid harming the plaintiff than it is for the plaintiff to avoid the harm; or, (d) it is more administratively or economically efficient for the defendant to bear the risk …


Digital Copyright And Confuzzling Rhetoric, Peter K. Yu Jan 2011

Digital Copyright And Confuzzling Rhetoric, Peter K. Yu

Vanderbilt Journal of Entertainment & Technology Law

For more than a decade, policymakers, industry representatives, consumer advocates, civil libertarians, academic commentators, and user communities have advanced a wide array of arguments for or against online file sharing and restrictive copyright standards. This Article begins by introducing two short stories to illustrate the rhetorical and analytical challenges in the digital copyright debate. It then examines eight unpersuasive arguments advanced by both sides of the debate--four from the industry and four from its opponents. The Article concludes by outlining six different strategies to help the industry develop more convincing proposals for digital copyright reform.


What's In A Name?: Predictably Regulating Cyberfraud To Protect The Democratic Political Process, Whitney C. Boshers Jan 2011

What's In A Name?: Predictably Regulating Cyberfraud To Protect The Democratic Political Process, Whitney C. Boshers

Vanderbilt Journal of Entertainment & Technology Law

In recent elections, political candidates have capitalized on the Internet as a central organizing resource. As a result of the low-cost, high-reward nature of campaign websites, some candidates have begun to register Web addresses--or domains--in opponents' names in order to disrupt the democratic political process. Engaging in a practice known as cyberfraud, these individuals register for domains containing the candidate's name, such as 'firstnamelastname.com." Then, instead of finding themselves on the candidate's official campaign website, voters access a website operated by the candidate's opponent that contains misleading or outright false information. Unfortunately, most political candidates have little recourse for such …


Cut In Tiny Pieces: Ensuring That Fragmented Ownership Does Not Chill Creativity, Henry H. Perritt Jr. Jan 2011

Cut In Tiny Pieces: Ensuring That Fragmented Ownership Does Not Chill Creativity, Henry H. Perritt Jr.

Vanderbilt Journal of Entertainment & Technology Law

The market for video entertainment is growing and becoming more diverse as technology reduces barriers to entry for small, independent moviemakers and distributors and increases consumers' ability to access the media of their choice. The growing complexity of the market, however, increases transaction costs for new entrants who must obtain licenses to copyrighted music, characters, storylines, or scenes that they incorporate into their movies. The entertainment bonanza offered by new technologies may not be realized in practice because of market failure. The purposes of the Copyright and Patents Clause are frustrated because creators of new works wishing to use new …


Patents As Escalators, Amelia S. Rinehart Jan 2011

Patents As Escalators, Amelia S. Rinehart

Vanderbilt Journal of Entertainment & Technology Law

High technology companies commit time, effort, and resources to innovation. Over the course of a research and development project, an innovative company may face several sequential decisions regarding whether to continue to invest in the project and whether to commercialize the discoveries that have been made. Companies often seek patents early in the research and development process to receive the right to exclude others from practicing the invention. Given a current trend toward earlier and earlier patent filing, several scholars suggest that this strategy could leave many inventions underdeveloped; companies may treat patents like real options, deciding later where to …