Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Law

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen Jan 2019

Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

"Writing at the dawn of the digital era, John Perry Barlow proclaimed cyberspace to be a new domain of pure freedom. Addressing the nations of the world, he cautioned that their laws, which were “based on matter,” simply did not speak to conduct in the new virtual realm. As both Barlow and the cyberlaw scholars who took up his call recognized, that was not so much a statement of fact as it was an exercise in deliberate utopianism. But it has proved prescient in a way that they certainly did not intend. The “laws” that increasingly have no meaning in …


Who Runs The Internet?, Anupam Chander Jan 2017

Who Runs The Internet?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

There is no single answer to the question of who runs the Internet. Is it the United States, often seen as the hegemon of the Internet, home to so many of the world’s leading Internet enterprises? Is it China, which erects a “Great Firewall” to assert control over the portion of the Internet available in China? Is it the European Union, which extends its power globally through its data protection regime, designating countries as “adequate” or (implicitly) “inadequate” to receive its data? Is it ICANN, the California not-for-profit organization that controls how Internet addresses are allocated? Is it the World …


Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen Jan 2014

Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen

Faculty Scholarship

This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.


The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble Jan 2012

The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble

Scholarly Works

Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …


Pornography, Coercion, And Copyright Law 2.0, Ann Bartow Jan 2008

Pornography, Coercion, And Copyright Law 2.0, Ann Bartow

Law Faculty Scholarship

The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their …


The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman Dec 2007

The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman

All Faculty Scholarship

The treatment of customary practices has been widely debated in many areas of the law, but there has been virtually no discussion of how custom is and should be treated in the context of intellectual property (IP). Nevertheless, customs have a profound impact on both de facto and de jure IP law. The unarticulated incorporation of custom threatens to swallow up IP law, and replace it with industry-led IP regimes that give the public and other creators more limited rights to access and use intellectual property than were envisioned by the Constitution and Congress. This article presents a powerful critique …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …


Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck Jan 2005

Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck

Articles & Chapters

Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable, and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an online avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new "social software" technology that enables communities from eBay to …


The Hegemony Of The Copyright Treatise, Ann Bartow Jan 2004

The Hegemony Of The Copyright Treatise, Ann Bartow

Law Faculty Scholarship

This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.

Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …


The Narratives Of Cyberspace Law (Or, Learning From Casablanca), Michael J. Madison Jan 2004

The Narratives Of Cyberspace Law (Or, Learning From Casablanca), Michael J. Madison

Articles

Cyberspace scholars have wrestled extensively with the question of the "right" metaphorical approach to the Internet, in order to guide legal and policy decisions. Literary theorists have wrestled with the perception that cyberspace undermines conventional ideas about narrative. This Essay suggests that each group could learn from the other. Cyberspace tells a better story than literary scholars believe, and the lawyers should pay more attention to the narrative attributes of cyberspace. To illustrate the argument, the Essay proposes a specific story framework for cyberspace: the film Casablanca.


Current Developments In Cyberspace, Eric Easton Apr 2001

Current Developments In Cyberspace, Eric Easton

All Faculty Scholarship

No abstract provided.


On-Line Tutorial Project: Intellectual Property In E-Commerce, William J. Murphy Jan 2001

On-Line Tutorial Project: Intellectual Property In E-Commerce, William J. Murphy

Law Faculty Scholarship

Copyrights, Trademarks and Patents make up most of the area of law known as Intellectual Property. Intellectual Property's importance in Electronic Commerce is difficult to overstate. The Internet has been defined as a global network of networks through which computers communicate by sending information in packets, and each network consists of computers connected by cables or wireless links. It is the Intellectual Property laws of Copyright, Trademark and Patents that are attempting to harmonize the effects that E-Commerce and the Internet have had on the individual's ability to access and use this information. It should be remembered that most countries …


Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito May 1999

Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito

Continuing Legal Education Materials

Materials from the Computer Law Institute held by UK/CLE in May 1999.


In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer Jan 1999

In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Fencing Cyberspace: Drawing Borders In A Virtual World, Maureen A. O'Rourke Jan 1998

Fencing Cyberspace: Drawing Borders In A Virtual World, Maureen A. O'Rourke

Faculty Scholarship

In the last few years, the Internet has increasingly become a source of information even for the historically computer illiterate. The growing popularity of the Internet has been driven in large part by the World Wide Web (web). The web is a system that facilitates use of the Internet by helping users sort through the great mass of information available on it. The web uses software that allows one document to link to and access another, and so on, despite the fact that the documents may reside on different machines in physically remote locations. The dispersion of data that is …


Foucault In Cyberspace: Surveillance, Sovereignty, And Hardwired Censors, James Boyle Jan 1997

Foucault In Cyberspace: Surveillance, Sovereignty, And Hardwired Censors, James Boyle

Faculty Scholarship

This is an essay about law in cyberspace. I focus on three interdependent phenomena: a set of political and legal assumptions that I call the jurisprudence of digital libertarianism, a separate but related set of beliefs about the state's supposed inability to regulate the Internet, and a preference for technological solutions to hard legal issues on-line. I make the familiar criticism that digital libertarianism is inadequate because of its blindness towards the effects of private power, and the less familiar claim that digital libertarianism is also surprisingly blind to the state's own power in cyberspace. In fact, I argue that …