Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Law

Performance Anxiety: The Internet And Copyright's Vanishing Performance/Distribution Distinction, Jonah M. Knobler Nov 2007

Performance Anxiety: The Internet And Copyright's Vanishing Performance/Distribution Distinction, Jonah M. Knobler

Jonah M. Knobler

This article attempts to answer two related questions on the subject of copyright law in the Internet age: First: Under present U.S. copyright law, does the delivery of a digital music file over the Internet as a “download” necessarily implicate the copyright holder’s right of public performance, above and beyond the obviously implicated rights of distribution and reproduction, as the music industry claims it does? This article examines the recent decision in United States v. ASCAP (S.D.N.Y. 2007), which held that it does not. The article also independently applies the major techniques of statutory interpretation to the relevant portions of …


Towards A Functional Definition Of Publication In Copyright Law, Thomas F. Cotter Sep 2007

Towards A Functional Definition Of Publication In Copyright Law, Thomas F. Cotter

Thomas F. Cotter

The questions of whether, when, and where an author has “published” her work of authorship traditionally has given rise to, and continues to give rise to, numerous consequences, including the protectability of the work under U.S. copyright law; the running of various time periods, including a grace period for registering the copyright and the termination of copyright in works made for hire; the applicability of fair use and other exceptions to copyright liability; and the imposition of the duty to deposit two copies of the work with the Library of Congress. Although the 1976 Copyright Act, unlike its predecessors, includes …


Internet Packet Sniffing And Its Impact On The Balance Of Power , Robert M. Frieden Aug 2007

Internet Packet Sniffing And Its Impact On The Balance Of Power , Robert M. Frieden

Rob Frieden

Internet Packet Sniffing and Its Impact on the Balance of Power Between Intellectual Property Creators and Consumers Rob Frieden Professor, Penn State University 102 Carnegie Building University Park, Pennsylvania 16802 (814) 863-7996; rmf5@psu.edu web site: http://www.personal.psu.edu/faculty/r/m/rmf5/ Previously Internet Service Providers (“ISPs”) had little incentive or technological capability to deviate from plain vanilla best efforts routing for content without examining the nature and type of traffic. Serving as a neutral conduit also provided the means to qualify for a safe harbor exemption from liability for carrying copyright infringing traffic provided by Section 512 of the Digital Millennium Copyright Act. Operators of …


Neither Fish Nor Fowl: New Strategies For Selective Regulation Of Information Services, Robert M. Frieden Aug 2007

Neither Fish Nor Fowl: New Strategies For Selective Regulation Of Information Services, Robert M. Frieden

Rob Frieden

Neither Fish Nor Fowl: New Strategies for Selective Regulation of Information Services Rob Frieden Professor, Penn State University 102 Carnegie Building University Park, Pennsylvania 16802 (814) 863-7996; rmf5@psu.edu web site: http://www.personal.psu.edu/faculty/r/m/rmf5/ The Federal Communications Commission (“FCC”) has created a dichotomy between telecommunications and information services with an eye toward limiting traditional common carrier regulation to the former category. This regulatory dichotomy provides the basis for exempting most Internet-mediated services from traditional telephony regulation that requires carriers to provide nondiscriminatory network interconnection even with competitors. To support its deregulatory mission the FCC has found ways to subordinate the telecommunications components in …


The Public Network, Thomas B. Nachbar Aug 2007

The Public Network, Thomas B. Nachbar

Thomas B Nachbar

This article addresses the timely yet persistent question of how best to regulate access to telecommunications networks. Concerns that private firms may use their ownership of communications networks to their own economic advantage has led many to propose restrictions, variously referred to as “network neutrality” or “open access” proposals, on network operators. To date, the network neutrality debate has focused almost exclusively on economic arguments for or against such regulation. Taking a step back from current debates, this paper seeks to derive from established law the accepted bases for imposing nondiscrimination rules and then to work forward to ask whether …


Online Postings Can Be Nightmare For Recruits: In Acting On Google Search Results, However, Law Firms Should Proceed With Caution, Michael D. Mann Jun 2007

Online Postings Can Be Nightmare For Recruits: In Acting On Google Search Results, However, Law Firms Should Proceed With Caution, Michael D. Mann

Michael D. Mann

No abstract provided.


Google Your Applicants: Prospective Employers Are Increasingly Vetting Candidates' Web Pages, Michael D. Mann Jun 2007

Google Your Applicants: Prospective Employers Are Increasingly Vetting Candidates' Web Pages, Michael D. Mann

Michael D. Mann

No abstract provided.


Some Job Hunters Are What They Post, Michael D. Mann Apr 2007

Some Job Hunters Are What They Post, Michael D. Mann

Michael D. Mann

Plug a prospective employee's name into an Internet search engine, and you might be surprised at what you find. Web pages may tell hiring attorneys that the person they just interviewed wrote for an undergraduate newspaper or belonged to a specific sorority, but the Web may also reveal the recent interviewee's drink of choice and dating status. Law firms can use the Internet for their own recruiting needs, says attorney Michael D. Mann, but they should take what they read on the Web with a grain of salt.


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton Mar 2007

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton

Jacqueline D Lipton

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton Mar 2007

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton

Jacqueline D Lipton

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


To Mark Or Not To Mark: Application Of The Patent Marking Statute To Websites And The Internet , Eugene Goryunov, Mark V. Polyakov Mar 2007

To Mark Or Not To Mark: Application Of The Patent Marking Statute To Websites And The Internet , Eugene Goryunov, Mark V. Polyakov

Mark V Polyakov

The Marking Statute expressly limits the patent owner’s recovery of damages if the patent owner itself, anyone making, offering for sale, or selling failed to mark its patented invention, sold within the United States, with the associated patent number. In these cases, damages must be limited to those that accrue after the infringer is provided actual notice of infringement. The authors suggest that, in light of relevant jurisprudence and the purpose of the Marking Statute, owners of patents that are directed to any business activities on the Internet should mark their own websites, and require their licensees to mark their …


Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes Feb 2007

Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes

Allyson Haynes Stuart

Individuals disclose personal information to websites in the course of everyday transactions. The treatment of that personal information is of great importance, as highlighted by the recent spate of data breaches and the surge in identity theft. When websites share such personal information with third parties, the threat of its use for illegal purposes increases. The current law allows website companies to protect themselves from liability for sharing or selling visitors’ personal information to third parties by focusing on disclosures in privacy policies, not on substantive treatment of personal information. Because of the low likelihood that a visitor will read …


A Listener’S Free Speech, A Reader’S Copyright, Malla Pollack Jan 2007

A Listener’S Free Speech, A Reader’S Copyright, Malla Pollack

Malla Pollack

Despite the Supreme Court’s repeated use of free speech doctrine to derail media reforms, some reform is possible. As Jerome A. Barron recognized, the Court’s central error is hypothesizing a romanticized speaker. The Court’s copyright jurisprudence is similarly marred by its congruent focus on a romanticized author. The original and continuing central purpose of both copyright and free speech is the wide distribution of material to citizens – especially when politically relevant information and opinions are involved. The Constitution’s copyright clause, Article I, section 8, clause 8, allows Congress the power to enact only such statutes as encourage the “progress” …


The Ethical Obligations Of Lawyers, Law Students And Law Professors Telling Stories On Web Logs, Anna Hemingway Dec 2006

The Ethical Obligations Of Lawyers, Law Students And Law Professors Telling Stories On Web Logs, Anna Hemingway

Anna P. Hemingway

This article examines how blogging has developed and considers the ethics of blogging and its impact on the legal profession. It examines blog entries from lawyers, law professors and law students and suggests that the rules of the Bar may be colliding with the manner of online storytelling occurring by legal professionals. The article takes an in-depth look at how blogging has impacted legal education and the relationship between faculty and students. It proposes ways in which incorporating blogging assignments into law school courses can assist students in developing ethical story-telling on web logs.


Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Dec 2006

Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Ann Bartow

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Introducing A Take-Down For Trade Secrets On The Internet, Elizabeth A. Rowe Dec 2006

Introducing A Take-Down For Trade Secrets On The Internet, Elizabeth A. Rowe

Elizabeth A Rowe

When a trade secret owner discovers its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually through a temporary restraining order or a preliminary injunction. In an earlier article I explored and analyzed the tremendous danger to trade secrets that have been posted on the Internet. Indeed, the trade secret status is most often lost forever. Accordingly, upon discovering a posting of secret information, trade secret owners …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds Dec 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds

Juliet M. Moringiello

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.