Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 17 of 17
Full-Text Articles in Law
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Articles
In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
"Writing at the dawn of the digital era, John Perry Barlow proclaimed cyberspace to be a new domain of pure freedom. Addressing the nations of the world, he cautioned that their laws, which were “based on matter,” simply did not speak to conduct in the new virtual realm. As both Barlow and the cyberlaw scholars who took up his call recognized, that was not so much a statement of fact as it was an exercise in deliberate utopianism. But it has proved prescient in a way that they certainly did not intend. The “laws” that increasingly have no meaning in …
Who Runs The Internet?, Anupam Chander
Who Runs The Internet?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
There is no single answer to the question of who runs the Internet. Is it the United States, often seen as the hegemon of the Internet, home to so many of the world’s leading Internet enterprises? Is it China, which erects a “Great Firewall” to assert control over the portion of the Internet available in China? Is it the European Union, which extends its power globally through its data protection regime, designating countries as “adequate” or (implicitly) “inadequate” to receive its data? Is it ICANN, the California not-for-profit organization that controls how Internet addresses are allocated? Is it the World …
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Faculty Scholarship
This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
Scholarly Works
Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …
Pornography, Coercion, And Copyright Law 2.0, Ann Bartow
Pornography, Coercion, And Copyright Law 2.0, Ann Bartow
Law Faculty Scholarship
The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their …
The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman
The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman
All Faculty Scholarship
The treatment of customary practices has been widely debated in many areas of the law, but there has been virtually no discussion of how custom is and should be treated in the context of intellectual property (IP). Nevertheless, customs have a profound impact on both de facto and de jure IP law. The unarticulated incorporation of custom threatens to swallow up IP law, and replace it with industry-led IP regimes that give the public and other creators more limited rights to access and use intellectual property than were envisioned by the Constitution and Congress. This article presents a powerful critique …
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
Faculty Publications
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck
Articles & Chapters
Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable, and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an online avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new "social software" technology that enables communities from eBay to …
The Hegemony Of The Copyright Treatise, Ann Bartow
The Hegemony Of The Copyright Treatise, Ann Bartow
Law Faculty Scholarship
This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.
Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …
The Narratives Of Cyberspace Law (Or, Learning From Casablanca), Michael J. Madison
The Narratives Of Cyberspace Law (Or, Learning From Casablanca), Michael J. Madison
Articles
Cyberspace scholars have wrestled extensively with the question of the "right" metaphorical approach to the Internet, in order to guide legal and policy decisions. Literary theorists have wrestled with the perception that cyberspace undermines conventional ideas about narrative. This Essay suggests that each group could learn from the other. Cyberspace tells a better story than literary scholars believe, and the lawyers should pay more attention to the narrative attributes of cyberspace. To illustrate the argument, the Essay proposes a specific story framework for cyberspace: the film Casablanca.
Current Developments In Cyberspace, Eric Easton
Current Developments In Cyberspace, Eric Easton
All Faculty Scholarship
No abstract provided.
On-Line Tutorial Project: Intellectual Property In E-Commerce, William J. Murphy
On-Line Tutorial Project: Intellectual Property In E-Commerce, William J. Murphy
Law Faculty Scholarship
Copyrights, Trademarks and Patents make up most of the area of law known as Intellectual Property. Intellectual Property's importance in Electronic Commerce is difficult to overstate. The Internet has been defined as a global network of networks through which computers communicate by sending information in packets, and each network consists of computers connected by cables or wireless links. It is the Intellectual Property laws of Copyright, Trademark and Patents that are attempting to harmonize the effects that E-Commerce and the Internet have had on the individual's ability to access and use this information. It should be remembered that most countries …
Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito
Computer Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law, Charles R. Keeton, Jay E. Ingle, J. Mark Grundy, Robert F. Duncan, Kenneth J. Tuggle, Joel T. Beres, Bill E. Webb, Stephen J. Davidson, Cynthia L. Stewart, Judge B. Wilson Ii, David J. Beyer, Kurt X. Metzmeier, Shaun E. Esposito
Continuing Legal Education Materials
Materials from the Computer Law Institute held by UK/CLE in May 1999.
In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer
In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer
All Faculty Scholarship
No abstract provided.
Fencing Cyberspace: Drawing Borders In A Virtual World, Maureen A. O'Rourke
Fencing Cyberspace: Drawing Borders In A Virtual World, Maureen A. O'Rourke
Faculty Scholarship
In the last few years, the Internet has increasingly become a source of information even for the historically computer illiterate. The growing popularity of the Internet has been driven in large part by the World Wide Web (web). The web is a system that facilitates use of the Internet by helping users sort through the great mass of information available on it. The web uses software that allows one document to link to and access another, and so on, despite the fact that the documents may reside on different machines in physically remote locations. The dispersion of data that is …
Foucault In Cyberspace: Surveillance, Sovereignty, And Hardwired Censors, James Boyle
Foucault In Cyberspace: Surveillance, Sovereignty, And Hardwired Censors, James Boyle
Faculty Scholarship
This is an essay about law in cyberspace. I focus on three interdependent phenomena: a set of political and legal assumptions that I call the jurisprudence of digital libertarianism, a separate but related set of beliefs about the state's supposed inability to regulate the Internet, and a preference for technological solutions to hard legal issues on-line. I make the familiar criticism that digital libertarianism is inadequate because of its blindness towards the effects of private power, and the less familiar claim that digital libertarianism is also surprisingly blind to the state's own power in cyberspace. In fact, I argue that …