Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet

2010

Discipline
Institution
Publication

Articles 1 - 16 of 16

Full-Text Articles in Law

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Acta And The Specter Of Graduated Response, Annemarie Bridy Sep 2010

Acta And The Specter Of Graduated Response, Annemarie Bridy

Joint PIJIP/TLS Research Paper Series

This short paper, prepared for a workshop on the Anti-Counterfeiting Trade Agreement (ACTA) and the Public Interest at American University’s Washington College of Law, considers the draft Internet provisions of ACTA in the context of concerns raised in the media that the treaty will require signatories to mandate graduated response regimes (à la France’s controversial HADOPI system) for online copyright enforcement. Although the Consolidated Text of ACTA, released in late April, confirms that mandatory graduated response is off the table for the treaty’s negotiators, the treaty in its current form both accommodates and promotes the adoption of graduated response. Moreover, …


Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow Apr 2010

Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow

Faculty Publications

Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …


Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth Mar 2010

Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth

Faculty Scholarship

Marketplace technology is (inadvertently) chipping away at the effectiveness of consumption taxes – the Japanese Consumption Tax (CT), the European value added tax (VAT), and the American sales tax (ST) are all affected. Frequently a technology-patch or a law change can repair the tax-damage, but sometimes even though a patch or a change is known the design of the levy (or the politics behind the design) impedes application. This paper assesses these consumption taxes by considering the impact that virtual travel agents have had on revenue yields. The paper draws specific conclusions for the Japanese CT, because this consumption tax …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman Jan 2010

Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman

Faculty Publications

This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …


A Portrait Of The Internet As A Young Man, Ann Bartow Jan 2010

A Portrait Of The Internet As A Young Man, Ann Bartow

Law Faculty Scholarship

In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …


That Guy's A Batterer!: A Scarlet Letter Approach To Domestic Violence In The Information Age, Elaine M. Chiu Jan 2010

That Guy's A Batterer!: A Scarlet Letter Approach To Domestic Violence In The Information Age, Elaine M. Chiu

Faculty Publications

(Excerpt)

We have all seen the ads and heard the jingles. Some of us may have even visited the websites. "Come meet your soul mate, come meet your future spouse, come find true love, at Match.com, at eHarmony.com, at Yahoo." Internet dating is a booming business. In 2005, an estimated sixteen million Americans spent more than $245 million looking for love on the Internet. Approximately ten-million Americans are current online daters. In addition to these digital matchmakers, social networking sites like Facebook and MySpace and You Tube offer amazing online communities where folks can advertise their best features. Then, there …


Ramifications Of Joint Infringement Theory On Emerging Technology Patents, W. Keith Robinson Jan 2010

Ramifications Of Joint Infringement Theory On Emerging Technology Patents, W. Keith Robinson

Faculty Journal Articles and Book Chapters

Two cases decided by the U.S. Court of Appeals for the Federal Circuit articulate the standards for joint infringement. In BMC Resources, Inc. v. Paymentech, L.P., the court ruled that to find liability in situations where steps of a method claim are performed by multiple parties, the entire method must be performed at the control or direction of the alleged direct infringer — the mastermind. Approximately one year later, in Muniauction, Inc. v. Thomson Corp., the Federal Circuit clarified that “the control or direction standard is satisfied in situations where the law would traditionally hold the accused direct infringer vicariously …


Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton Jan 2010

Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton

Articles

The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …


The Technology Of Law, Bernard J. Hibbitts Jan 2010

The Technology Of Law, Bernard J. Hibbitts

Articles

This paper argues that contemporary fascination with the law of technology (IP, cyberlaw, etc.) has led us to overlook the fundamental impact of the "technology of law," and offers suggestions for creating "neterate" lawyers more comfortable with and cognizant of technology itself. The author describes how the legal news service JURIST implements many of these suggestions and provides a unique learning experience for its law student staffers.


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


Review: Ethics Of Internet Research: A Rhetorical Case-Based Approach, Andrew Whelan Jan 2010

Review: Ethics Of Internet Research: A Rhetorical Case-Based Approach, Andrew Whelan

Faculty of Law, Humanities and the Arts - Papers (Archive)

Ethics of Internet Research is the 59th volume in the Digital Formations series published by Peter Lang and the first volume in that series dedicated to research ethics, a subject not substantively addressed by Digital Formations since 2003's Online Social Research. It is a good companion piece to Digital Media Ethics by Charles Ess, also released in 2009 but published by Polity Press, which concentrates on more 'structural' issues, such as copyright.


The Digital Broadband Migration And The Federal Trade Commission: Building The Competition And Consumer Protection Agency Of The Future, William E. Kovacic Jan 2010

The Digital Broadband Migration And The Federal Trade Commission: Building The Competition And Consumer Protection Agency Of The Future, William E. Kovacic

GW Law Faculty Publications & Other Works

Three areas of the FTC’s fairly extraordinary portfolio of policymaking responsibilities that affect the development of the internet stand out: (1) competition issues, (2) consumer protection issues, and (3) privacy and data protection. These three areas are linked by the FTC’s creation of policy by experimentation, assessment, and refinement, which ensures the FTC makes wise choices in the face of dramatic technological changes that characterize the internet. The three areas are also linked by institutional multiplicity, which may need to be reconfigured for internet-commerce policy.

Effective policy for internet-commerce requires investment in institutional building and implementation because the degree of …


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss Jan 2010

Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss

Faculty Scholarship

It is a quarter century since I began telling my Administrative Law students that they had better be watching the Internet and how agencies of interest to them were using it, as they entered an Information Age career. The changes since then have been remarkable. Rulemaking, where the pace has perhaps been slowest, is now accelerating into the Internet, driven by a President committed to openness and consultation. This paper seeks little more than to point the reader toward the places where she can find the changes and watch them for herself.