Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2006

Internet Law

Institution
Keyword
Publication

Articles 1 - 27 of 27

Full-Text Articles in Law

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan Nov 2006

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis Oct 2006

Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis

Center and Clinic White Papers

“I believe that the Internet is a brave new world in the matter of judicial security.” – Testimony of Joan H. Lefkow, United States District Judge, before the Judiciary Committee of the United States Senate (May 18, 2005).

Your personal information may be no farther away than a mouse-click... Your name, locations of your home and workplace, your phone number and email address, details of your family members, your political leanings and many more pieces of information are available through a wide array of public and private sources. But, this is nothing new. Some personal information about you has always been ...


Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang Sep 2006

Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted ...


Policy And Management Issues Framework: Statewide Portal Project, California Research Bureau May 2006

Policy And Management Issues Framework: Statewide Portal Project, California Research Bureau

California Agencies

The purpose of this document is to identify the primary policy and management issues that California will need to address in designing and deploying a state portal or website that is focused on customer needs, secure from unauthorized access, accessible and usable by California's diverse citizenry and business communities, and flexible to accommodate changes in political or administrative environment, changing customer expectations, and new technologies.


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger Apr 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger

Law Faculty Scholarly Articles

The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and ...


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

Faculty Scholarship at Penn Law

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to ...


Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman Mar 2006

Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman

Cornell Law Faculty Publications

No abstract provided.


Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder Feb 2006

Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder

All Faculty Scholarship

No abstract provided.


Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer Jan 2006

Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer

Faculty Publications

Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts ...


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim Jan 2006

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

UIC John Marshall Law School Open Access Faculty Scholarship

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and ...


Network Neutrality And The Economics Of Congestion, Christopher S. Yoo Jan 2006

Network Neutrality And The Economics Of Congestion, Christopher S. Yoo

Faculty Scholarship at Penn Law

No abstract provided.


Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe Jan 2006

Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe

Scholarly Works

This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United ...


Co-Blogging Law, Eric Goldman Jan 2006

Co-Blogging Law, Eric Goldman

Faculty Publications

Abstract: Bloggers often work collaboratively with other bloggers, a phenomenon I call "co-blogging. " The decision to co-blog may seem casual, but it can have significant and unexpected legal consequences forthe co-bloggers. This essay looks at some of these consequences under partnership law, employment law, and copyright law and explains how each of these legal doctrines can lead to counterintuitive results. The essay then discusses some recommendations to mitigate the harshness of these results.


Rankings, Reductionism, And Responsibility, Frank Pasquale Jan 2006

Rankings, Reductionism, And Responsibility, Frank Pasquale

Faculty Scholarship

No abstract provided.


The Ethics Of Electronic Record Sharing, Barbara A. Bintliff, Georgia Briscoe Jan 2006

The Ethics Of Electronic Record Sharing, Barbara A. Bintliff, Georgia Briscoe

Articles

No abstract provided.


Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart Jan 2006

Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart

Articles

Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.


Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya Jan 2006

Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya

Articles

No abstract provided.


Internet Cookies: When Is Permission Consent?, Max Oppenheimer Jan 2006

Internet Cookies: When Is Permission Consent?, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer Jan 2006

Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer

Law Faculty Articles and Essays

This Symposium focuses in part on the ideas of Margaret Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems through ...


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Jan 2006

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Faculty Scholarship

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a ...


Anticircumvention And Anti-Anticircumvention, Peter K. Yu Jan 2006

Anticircumvention And Anti-Anticircumvention, Peter K. Yu

Faculty Scholarship

In today's debate on digital rights management systems, there is a considerable divide between the rights holders, their investors and representatives on the one hand and academics, consumer advocates, and civil libertarians on the other. These two groups often talk past each other, concocting their own doomsday scenarios while arguing for laws and policies that vindicate their positions. Unfortunately, neither side has sufficient empirical evidence to either support its position or disprove its rivals'. As the digital economy grows, the debate intensifies, and the divide between the two sides widens. Today, there has emerged an urgent need to find ...


Pervasively Distributed Copyright Enforcement, Julie E. Cohen Jan 2006

Pervasively Distributed Copyright Enforcement, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood ...


Comments On Stealth Marketing And Editorial Integrity, R. Polk Wagner Jan 2006

Comments On Stealth Marketing And Editorial Integrity, R. Polk Wagner

Faculty Scholarship at Penn Law

No abstract provided.


The World Trade Law Of Internet Filtering, Tim Wu Jan 2006

The World Trade Law Of Internet Filtering, Tim Wu

Faculty Scholarship

In 1994, when most of the world's trading nations agreed to create the WTO, they also agreed to begin to liberalize trade in services. What no one fully realized at the time (and not all realize now) is that those decisions placed the WTO in the midst of internet regulation. Much internet content can be reached from anywhere, making nearly everyone on the internet a potential importer or exporter of services (and sometimes goods). Hence, almost by accident, the WTO has put itself in an oversight position for most of the national laws and practices that regulate the internet ...


Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu Jan 2006

Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu

Faculty Scholarship

The best proposals for network neutrality rules are simple. They ban abusive behavior like tollboothing and outright blocking and degradation. And they leave open legitimate network services that the Bells and Cable operators want to provide, such as offering cable television services and voice services along with a neutral internet offering. They are in line with a tradition of protecting consumer's rights on networks whose instinct is just this: let customers use the network as they please. No one wants to deny companies the right to charge for their services and charge consumers more if they use more. But ...


The World Trade Law Of Censorship And Internet Filtering, Tim Wu Jan 2006

The World Trade Law Of Censorship And Internet Filtering, Tim Wu

Faculty Scholarship

Consider the following events, all from the last five years: (1) An American newsmagazine, Barron's, posts an unflattering profile of an Australian billionaire named Joseph Gutnick on its web site – the publisher, Dow Jones, Inc., is sued in Australia and forced to settle; (2) Mexico's incumbent telephone company, Telmex, blocks Mexicans from reaching the web site of the Voice-over-IP firm Skype; (3) the United States begins a major crackdown on web gambling services, causing serious economic damage to several small Caribbean economies; (4) the Chinese government prevents its citizens from using various foreign Internet services, including foreign e-mail ...