Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (3)
- University of Colorado Law School (3)
- University of Pennsylvania Carey Law School (3)
- University of Pittsburgh School of Law (3)
- Columbia Law School (2)
-
- Texas A&M University School of Law (2)
- UIC School of Law (2)
- Brooklyn Law School (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Cornell University Law School (1)
- Georgetown University Law Center (1)
- Golden Gate University School of Law (1)
- University of Baltimore Law (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- Washington University in St. Louis (1)
- William & Mary Law School (1)
- Keyword
-
- Internet (10)
- Adwords (2)
- Google (2)
- Privacy (2)
- Trademark (2)
-
- 2004 (1)
- AALL OBS-SIS (1)
- Access Rights (1)
- Access to government information (1)
- Administrative law (1)
- Alasdair MacIntyre (1)
- American Indians (1)
- Artifacts (1)
- Blogging (1)
- Blogs (1)
- Broadband (1)
- CNG (1)
- Catalog records (1)
- Chicago Journal of International Law (1)
- China (1)
- Co-blogging (1)
- Cognitive science (1)
- Commoditization (1)
- Common carriage (1)
- Computer software (1)
- Confusion (1)
- Cookies (1)
- Copyright (1)
- Copyright law (1)
- Corrective counter speech (1)
- Publication
-
- All Faculty Scholarship (5)
- Faculty Scholarship (5)
- Articles (4)
- Faculty Publications (3)
- Publications (3)
-
- Rosetta Stone v. Google (Joint Appendix) (2)
- California Agencies (1)
- Cornell Law Faculty Publications (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Scholarly Articles (1)
- Scholarly Works (1)
- Scholarship@WashULaw (1)
- UIC Law Open Access Faculty Scholarship (1)
- UIC Law White Papers (1)
Articles 1 - 30 of 31
Full-Text Articles in Law
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis
Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis
UIC Law White Papers
“I believe that the Internet is a brave new world in the matter of judicial security.” – Testimony of Joan H. Lefkow, United States District Judge, before the Judiciary Committee of the United States Senate (May 18, 2005).
Your personal information may be no farther away than a mouse-click... Your name, locations of your home and workplace, your phone number and email address, details of your family members, your political leanings and many more pieces of information are available through a wide array of public and private sources. But, this is nothing new. Some personal information about you has always …
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Anticircumvention And Anti-Anticircumvention, Peter K. Yu
Anticircumvention And Anti-Anticircumvention, Peter K. Yu
Faculty Scholarship
In today's debate on digital rights management systems, there is a considerable divide between the rights holders, their investors and representatives on the one hand and academics, consumer advocates, and civil libertarians on the other. These two groups often talk past each other, concocting their own doomsday scenarios while arguing for laws and policies that vindicate their positions. Unfortunately, neither side has sufficient empirical evidence to either support its position or disprove its rivals'. As the digital economy grows, the debate intensifies, and the divide between the two sides widens. Today, there has emerged an urgent need to find the …
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Faculty Publications
In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …
Policy And Management Issues Framework: Statewide Portal Project, California Research Bureau
Policy And Management Issues Framework: Statewide Portal Project, California Research Bureau
California Agencies
The purpose of this document is to identify the primary policy and management issues that California will need to address in designing and deploying a state portal or website that is focused on customer needs, secure from unauthorized access, accessible and usable by California's diverse citizenry and business communities, and flexible to accommodate changes in political or administrative environment, changing customer expectations, and new technologies.
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger
Law Faculty Scholarly Articles
The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and the accompanying disappearance of rational justifications …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
All Faculty Scholarship
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes
Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes
Faculty Scholarship
The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Cornell Law Faculty Publications
No abstract provided.
Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder
Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder
All Faculty Scholarship
No abstract provided.
Rankings, Reductionism, And Responsibility, Frank Pasquale
Rankings, Reductionism, And Responsibility, Frank Pasquale
Faculty Scholarship
No abstract provided.
Internet Cookies: When Is Permission Consent?, Max Oppenheimer
Internet Cookies: When Is Permission Consent?, Max Oppenheimer
All Faculty Scholarship
No abstract provided.
Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim
Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim
UIC Law Open Access Faculty Scholarship
It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …
Co-Blogging Law, Eric Goldman
Co-Blogging Law, Eric Goldman
Faculty Publications
Abstract: Bloggers often work collaboratively with other bloggers, a phenomenon I call "co-blogging. " The decision to co-blog may seem casual, but it can have significant and unexpected legal consequences forthe co-bloggers. This essay looks at some of these consequences under partnership law, employment law, and copyright law and explains how each of these legal doctrines can lead to counterintuitive results. The essay then discusses some recommendations to mitigate the harshness of these results.
Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer
Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer
Faculty Publications
Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …
The Ethics Of Electronic Record Sharing, Barbara A. Bintliff, Georgia Briscoe
The Ethics Of Electronic Record Sharing, Barbara A. Bintliff, Georgia Briscoe
Publications
No abstract provided.
Social Software, Groups, And Governance, Michael J. Madison
Social Software, Groups, And Governance, Michael J. Madison
Articles
Formal groups play an important role in the law. Informal groups largely lie outside it. Should the law be more attentive to informal groups? The paper argues that this and related questions are appearing more frequently as a number of computer technologies, which I collect under the heading social software, increase the salience of groups. In turn, that salience raises important questions about both the significance and the benefits of informal groups. The paper suggests that there may be important social benefits associated with informal groups, and that the law should move towards a framework for encouraging and recognizing them. …
The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison
The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison
Articles
This Essay was written as part of a Symposium on open access publishing for legal scholarship. It makes the claim that open access publishing models will succeed, or not, to the extent that they account for the existing economy of prestige that drives law reviews and legal scholarship. What may seem like a lot of uncharitable commentary is intended instead as an expression of guarded optimism: Imaginative reuse of some existing tools of scholarly publishing (even by some marginalized members of the prestige economy - or perhaps especially by them) may facilitate the emergence of a viable open access norm.
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Publications
No abstract provided.
Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart
Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart
Publications
Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Articles
This Article is a contribution to a Symposium that focuses on the ideas of Margaret Jane Radin as a point of departure, and particularly on her analyses of propertization and commodification. While Radin focuses on the harms associated with commodification of the person, relying on Hegel's idea of alienation, we argue that objectification, and in particular objectification of various features of the digital environment, may have important system benefits. We present an extended critique of Radin's analysis, basing the critique in part on Gadamer's argument that meaning and application are interrelated and that meaning changes with application. Central to this …
Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian
Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian
Scholarship@WashULaw
Forty years ago, Professor Jerome Barron made the classic case that the First Amendment requires not merely protection of speech against government interference but provision of access to the means of mass communication. The Supreme Court in the ensuing decades has largely rejected Barron's approach. In this article, Professor Magarian defends Barron's case for access rights against the two theoretical critiques that have underwritten its doctrinal rejection. The libertarian critique attacks the normative underpinnings of access rights, maintaining that the First Amendment insulates market-driven distributions of expressive opportunities. Professor Magarian demonstrates that politically progressive and conservative libertarian critics of access …
Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer
Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer
Law Faculty Articles and Essays
This Symposium focuses in part on the ideas of Margaret Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems through …
Network Neutrality And The Economics Of Congestion, Christopher S. Yoo
Network Neutrality And The Economics Of Congestion, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe
Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe
Scholarly Works
This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United States v. American …
The World Trade Law Of Censorship And Internet Filtering, Tim Wu
The World Trade Law Of Censorship And Internet Filtering, Tim Wu
Faculty Scholarship
Consider the following events, all from the last five years: (1) An American newsmagazine, Barron's, posts an unflattering profile of an Australian billionaire named Joseph Gutnick on its web site – the publisher, Dow Jones, Inc., is sued in Australia and forced to settle; (2) Mexico's incumbent telephone company, Telmex, blocks Mexicans from reaching the web site of the Voice-over-IP firm Skype; (3) the United States begins a major crackdown on web gambling services, causing serious economic damage to several small Caribbean economies; (4) the Chinese government prevents its citizens from using various foreign Internet services, including foreign e-mail and …
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski
Articles
This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment.
The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …
Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu
Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu
Faculty Scholarship
The best proposals for network neutrality rules are simple. They ban abusive behavior like tollboothing and outright blocking and degradation. And they leave open legitimate network services that the Bells and Cable operators want to provide, such as offering cable television services and voice services along with a neutral internet offering. They are in line with a tradition of protecting consumer's rights on networks whose instinct is just this: let customers use the network as they please. No one wants to deny companies the right to charge for their services and charge consumers more if they use more. But what …
Pervasively Distributed Copyright Enforcement, Julie E. Cohen
Pervasively Distributed Copyright Enforcement, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …