Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

2006

Institution
Keyword
Publication

Articles 1 - 30 of 31

Full-Text Articles in Law

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan Nov 2006

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis Oct 2006

Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis

UIC Law White Papers

“I believe that the Internet is a brave new world in the matter of judicial security.” – Testimony of Joan H. Lefkow, United States District Judge, before the Judiciary Committee of the United States Senate (May 18, 2005).

Your personal information may be no farther away than a mouse-click... Your name, locations of your home and workplace, your phone number and email address, details of your family members, your political leanings and many more pieces of information are available through a wide array of public and private sources. But, this is nothing new. Some personal information about you has always …


Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang Sep 2006

Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Anticircumvention And Anti-Anticircumvention, Peter K. Yu Sep 2006

Anticircumvention And Anti-Anticircumvention, Peter K. Yu

Faculty Scholarship

In today's debate on digital rights management systems, there is a considerable divide between the rights holders, their investors and representatives on the one hand and academics, consumer advocates, and civil libertarians on the other. These two groups often talk past each other, concocting their own doomsday scenarios while arguing for laws and policies that vindicate their positions. Unfortunately, neither side has sufficient empirical evidence to either support its position or disprove its rivals'. As the digital economy grows, the debate intensifies, and the divide between the two sides widens. Today, there has emerged an urgent need to find the …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Policy And Management Issues Framework: Statewide Portal Project, California Research Bureau May 2006

Policy And Management Issues Framework: Statewide Portal Project, California Research Bureau

California Agencies

The purpose of this document is to identify the primary policy and management issues that California will need to address in designing and deploying a state portal or website that is focused on customer needs, secure from unauthorized access, accessible and usable by California's diverse citizenry and business communities, and flexible to accommodate changes in political or administrative environment, changing customer expectations, and new technologies.


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger Apr 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger

Law Faculty Scholarly Articles

The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and the accompanying disappearance of rational justifications …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Apr 2006

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Faculty Scholarship

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …


Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman Mar 2006

Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman

Cornell Law Faculty Publications

No abstract provided.


Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder Feb 2006

Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder

All Faculty Scholarship

No abstract provided.


Rankings, Reductionism, And Responsibility, Frank Pasquale Jan 2006

Rankings, Reductionism, And Responsibility, Frank Pasquale

Faculty Scholarship

No abstract provided.


Internet Cookies: When Is Permission Consent?, Max Oppenheimer Jan 2006

Internet Cookies: When Is Permission Consent?, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim Jan 2006

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

UIC Law Open Access Faculty Scholarship

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


Co-Blogging Law, Eric Goldman Jan 2006

Co-Blogging Law, Eric Goldman

Faculty Publications

Abstract: Bloggers often work collaboratively with other bloggers, a phenomenon I call "co-blogging. " The decision to co-blog may seem casual, but it can have significant and unexpected legal consequences forthe co-bloggers. This essay looks at some of these consequences under partnership law, employment law, and copyright law and explains how each of these legal doctrines can lead to counterintuitive results. The essay then discusses some recommendations to mitigate the harshness of these results.


Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer Jan 2006

Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer

Faculty Publications

Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …


The Ethics Of Electronic Record Sharing, Barbara A. Bintliff, Georgia Briscoe Jan 2006

The Ethics Of Electronic Record Sharing, Barbara A. Bintliff, Georgia Briscoe

Publications

No abstract provided.


Social Software, Groups, And Governance, Michael J. Madison Jan 2006

Social Software, Groups, And Governance, Michael J. Madison

Articles

Formal groups play an important role in the law. Informal groups largely lie outside it. Should the law be more attentive to informal groups? The paper argues that this and related questions are appearing more frequently as a number of computer technologies, which I collect under the heading social software, increase the salience of groups. In turn, that salience raises important questions about both the significance and the benefits of informal groups. The paper suggests that there may be important social benefits associated with informal groups, and that the law should move towards a framework for encouraging and recognizing them. …


The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison Jan 2006

The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison

Articles

This Essay was written as part of a Symposium on open access publishing for legal scholarship. It makes the claim that open access publishing models will succeed, or not, to the extent that they account for the existing economy of prestige that drives law reviews and legal scholarship. What may seem like a lot of uncharitable commentary is intended instead as an expression of guarded optimism: Imaginative reuse of some existing tools of scholarly publishing (even by some marginalized members of the prestige economy - or perhaps especially by them) may facilitate the emergence of a viable open access norm.


Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya Jan 2006

Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya

Publications

No abstract provided.


Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart Jan 2006

Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart

Publications

Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.


Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison Jan 2006

Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison

Articles

This Article is a contribution to a Symposium that focuses on the ideas of Margaret Jane Radin as a point of departure, and particularly on her analyses of propertization and commodification. While Radin focuses on the harms associated with commodification of the person, relying on Hegel's idea of alienation, we argue that objectification, and in particular objectification of various features of the digital environment, may have important system benefits. We present an extended critique of Radin's analysis, basing the critique in part on Gadamer's argument that meaning and application are interrelated and that meaning changes with application. Central to this …


Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian Jan 2006

Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian

Scholarship@WashULaw

Forty years ago, Professor Jerome Barron made the classic case that the First Amendment requires not merely protection of speech against government interference but provision of access to the means of mass communication. The Supreme Court in the ensuing decades has largely rejected Barron's approach. In this article, Professor Magarian defends Barron's case for access rights against the two theoretical critiques that have underwritten its doctrinal rejection. The libertarian critique attacks the normative underpinnings of access rights, maintaining that the First Amendment insulates market-driven distributions of expressive opportunities. Professor Magarian demonstrates that politically progressive and conservative libertarian critics of access …


Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer Jan 2006

Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer

Law Faculty Articles and Essays

This Symposium focuses in part on the ideas of Margaret Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems through …


Network Neutrality And The Economics Of Congestion, Christopher S. Yoo Jan 2006

Network Neutrality And The Economics Of Congestion, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe Jan 2006

Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe

Scholarly Works

This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United States v. American …


The World Trade Law Of Censorship And Internet Filtering, Tim Wu Jan 2006

The World Trade Law Of Censorship And Internet Filtering, Tim Wu

Faculty Scholarship

Consider the following events, all from the last five years: (1) An American newsmagazine, Barron's, posts an unflattering profile of an Australian billionaire named Joseph Gutnick on its web site – the publisher, Dow Jones, Inc., is sued in Australia and forced to settle; (2) Mexico's incumbent telephone company, Telmex, blocks Mexicans from reaching the web site of the Voice-over-IP firm Skype; (3) the United States begins a major crackdown on web gambling services, causing serious economic damage to several small Caribbean economies; (4) the Chinese government prevents its citizens from using various foreign Internet services, including foreign e-mail and …


Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski Jan 2006

Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski

Articles

This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment.

The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …


Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu Jan 2006

Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu

Faculty Scholarship

The best proposals for network neutrality rules are simple. They ban abusive behavior like tollboothing and outright blocking and degradation. And they leave open legitimate network services that the Bells and Cable operators want to provide, such as offering cable television services and voice services along with a neutral internet offering. They are in line with a tradition of protecting consumer's rights on networks whose instinct is just this: let customers use the network as they please. No one wants to deny companies the right to charge for their services and charge consumers more if they use more. But what …


Pervasively Distributed Copyright Enforcement, Julie E. Cohen Jan 2006

Pervasively Distributed Copyright Enforcement, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …