Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg Jan 2021

Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg

Faculty Scholarship

This essay explores one of the most important, but occasionally intractable, issues under the Berne Convention, the concept of Country of Origin. Article 5(4) of that treaty defines a work’s country of origin, but leaves out several situations, leaving those who interpret and apply the treaty without guidance in ascertaining the country of origin. I will call those situations the “Conundra of the country of origin,” and will explore two of them here. First, what is the country of origin of an unpublished work whose authors are nationals of different countries? Second, what is the country of origin of a …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg Jan 2020

A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg

Faculty Scholarship

To a US appraiser, article 17 of the Digital Single Market Directive suggests the EU has learned from American mistakes (and from its own) in the allocation of internet intermediaries’ liability for hosting and communicating user-posted content. Before the DSM Directive, art. 14 of the 2000 eCommerce Directive set out a notice-and-takedown system very similar to the regime provided in 17 U.S.C. section 512(c). Both regimes replaced the normal copyright default, which requires authorization to exploit works, with a limitation on the liability of service providers who complied with statutory prerequisites. Because the limitation ensured that service providers would not …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Intellectual Property In News? Why Not?, Sam Ricketson, Jane C. Ginsburg Jan 2016

Intellectual Property In News? Why Not?, Sam Ricketson, Jane C. Ginsburg

Faculty Scholarship

This Chapter addresses arguments for and against property rights in news, from the outset of national law efforts to safeguard the efforts of newsgathers, through the various unsuccessful attempts during the early part of the last century to fashion some form of international protection within the Berne Convention on literary and artistic works and the Paris Convention on industrial property. The Chapter next turns to contemporary endeavors to protect newsgatherers against “news aggregation” by online platforms. It considers the extent to which the aggregated content might be copyrightable, and whether, even if the content is protected, various exceptions set out …


"Section 5 And 'Unfair Methods Of Competition': Protecting Competition Or Increasing Uncertainty?", Tim Wu Jan 2016

"Section 5 And 'Unfair Methods Of Competition': Protecting Competition Or Increasing Uncertainty?", Tim Wu

Faculty Scholarship

Since the late 1980s, Section 5 of the FTC Act has come to center on a certain kind of case, the so-called anticompetitive “scheme” featuring extraordinary and nefarious conduct – like gaming a standards process, rigging industry tests, that sort of thing. Deception, fraud, bad-faith and oppressive action are typical. This kind of self-restraint has, to its credit, yielded a focus on cases where the conduct is extraordinary, an anticompetitive intent is obvious and the harm is substantial. At this point, the self-imposed limits on Section 5 enforcement are extensive enough that a critic could fairly accuse the agency of …


Does Google Content Degrade Google Search? Experimental Evidence, Michael Luca, Tim Wu, Sebastian Couvidat, Daniel Frank Jan 2015

Does Google Content Degrade Google Search? Experimental Evidence, Michael Luca, Tim Wu, Sebastian Couvidat, Daniel Frank

Faculty Scholarship

While Google is known primarily as a search engine, it has increasingly developed and promoted its own content as an alternative to results from other websites. By prominently displaying Google content in response to search queries, Google is able to use its dominance in search to gain customers for this content. This may reduce consumer welfare if the internal content is inferior to organic search results. In this paper, we provide a legal and empirical analysis of this practice in the domain of online reviews. We first identify the conditions under which universal search would be considered anticompetitive. We then …


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater Jan 2008

Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater

Faculty Scholarship

America's communications infrastructure is stuck at a copper wall. For the vast majority of homes, copper wires remain the principal means of getting broadband services. The deployment of fiber optic connections to the home would enable exponentially faster connections, and few dispute that upgrading to more robust infrastructure is essential to America's economic growth. However, the costs of such an upgrade are daunting for private sector firms and even for governments. These facts add up to a public policy challenge.

Our intuition is that an innovative model holds unrealized promise: household investments in fiber. Consumers may one day purchase and …


Recent Developments In Us Copyright Law – Part Ii, Caselaw: Exclusive Rights On The Ebb?, Jane C. Ginsburg Jan 2008

Recent Developments In Us Copyright Law – Part Ii, Caselaw: Exclusive Rights On The Ebb?, Jane C. Ginsburg

Faculty Scholarship

The 1976 Act announces broad exclusive rights, offset by a myriad of specific exemptions, and one wide exception for "fair use." In words and intent, the exclusive rights are capacious, but new technologies may have caused some of the general phrases to become more constraining than might have been expected from a text whose drafters took pains to make forward-looking. Thus, the scope of the reproduction right turns on the meaning of "copy;" the reach of the distribution right on "distribute copies" and "transfer of ownership;" the range of the public performance right on "public" and "perform." Entrepreneurs and users …


A Tale Of Two Platforms, Tim Wu Jan 2007

A Tale Of Two Platforms, Tim Wu

Faculty Scholarship

This paper discusses future competitions between cellular and computer platforms, in the context of a discussion of Jonathan Zittrain, The Generative Internet, 119 Harv. L. Rev. 1974 (2006).


The Pros And Cons Of Strengthening Intellectual Property Protection: Technological Protection Measures And Section 1201 Of The Us Copyright Act, Jane C. Ginsburg Jan 2007

The Pros And Cons Of Strengthening Intellectual Property Protection: Technological Protection Measures And Section 1201 Of The Us Copyright Act, Jane C. Ginsburg

Faculty Scholarship

The recent announcement (in late November 2006) of the Copyright Office's triennial rulemaking to identify "classes of works" exempt from the § 1201(a)(1) prohibition on circumvention of a technological measure controlling access to copyrighted works in part occasions this assessment of the judicial and administrative construction of this chapter of the 1998 Digital Millennium Copyright Act. The current Rulemaking appears more innovative than its predecessors, particularly in defining the exempted class of works by reference to the characteristics of the works' users. Copyright owner overreaching or misuse may also underlie the relative vigor of this Rulemaking: if producers of devices …


Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu Jan 2006

Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu

Faculty Scholarship

The best proposals for network neutrality rules are simple. They ban abusive behavior like tollboothing and outright blocking and degradation. And they leave open legitimate network services that the Bells and Cable operators want to provide, such as offering cable television services and voice services along with a neutral internet offering. They are in line with a tradition of protecting consumer's rights on networks whose instinct is just this: let customers use the network as they please. No one wants to deny companies the right to charge for their services and charge consumers more if they use more. But what …


The (New?) Right Of Making Available To The Public, Jane C. Ginsburg Jan 2004

The (New?) Right Of Making Available To The Public, Jane C. Ginsburg

Faculty Scholarship

The Berne Convention 1971 Paris Act covered the right of communication to the public incompletely and imperfectly through a tangle of occasionally redundant or self-contradictory provisions on "public performance," "communication to the public," "public communication," "broadcasting," and other forms of transmission. Worse, the scope of rights depended on the nature of the work, with musical and dramatic works receiving the broadest protection, and images the least; literary works, especially those adapted into cinematographic works, lying somewhere in between. The 1996 WIPO Copyright Treaty rationalized and synthesized protection by establishing full coverage of the communication right for all protected works of …


The International Privacy Regime, Tim Wu Jan 2004

The International Privacy Regime, Tim Wu

Faculty Scholarship

Privacy has joined one of many areas of law understandable only by reference to the results of overlapping and conflicting national agendas. What has emerged as the de facto international regime is complex. Yet based on a few simplifying principles, we can nonetheless do much to understand it and predict its operation.

First, the idea that self-regulation by the internet community will be the driving force in privacy protection must be laid to rest. The experience of the last decade shows that nation-states, powerful nation-states in particular, drive the system of international privacy. The final mix of privacy protection that …