Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1999

Journal

Internet Law

Institution
Keyword
Publication

Articles 1 - 30 of 73

Full-Text Articles in Law

Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller Dec 1999

Strike Two: An Analysis Of The Child Online Protection Act’S Constitutional Failures, Heather L. Miller

Federal Communications Law Journal

Congress's first attempt to regulate minors' access to sexually explicit material via the Internet failed. Congress responded with the Child Online Protection Act, which, despite its narrower scope, cannot withstand constitutional scrutiny. This Notes delves into the constitutionality of Congress's second attempt by addressing the difficulty of applying the vague "harmful to minors" definition to the Internet medium and the economic and technological unavailability of the Act's affirmative defenses. This Note concludes with an explanation as to why legislation is an ineffective mechanism to address the problem of minors' access to online pornography.


Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick Nov 1999

Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick

Michigan Law Review

Speech, it is said, divides into three sorts - (1) speech that everyone has a right to (political speech, speech about public affairs); (2) speech that no one has a right to (obscene speech, child porn); and (3) speech that some have a right to but others do not (in the United States, Ginsberg speech, or speech that is "harmful to minors," to which adults have a right but kids do not). Speech-protective regimes, on this view, are those where category (1) speech predominates; speech-repressive regimes are those where categories (2) and (3) prevail. This divide has meaning for speech …


Privacy And Democracy In Cyberspace, Paul M. Schwartz Nov 1999

Privacy And Democracy In Cyberspace, Paul M. Schwartz

Vanderbilt Law Review

In this Article, Professor Schwartz depicts the widespread, silent collection of personal information in cyberspace. At present, it is impossible to know the fate of the personal data that one generates online. Professor Schwartz argues that this state of affairs degrades the health of a deliberative democracy; it cloaks in dark uncertainty the transmutation of Internet activity into personal information that will follow one into other areas and discourage civic participation. This situation also will have a negative impact on individual self- determination by deterring individuals from engaging in the necessary thinking out loud and deliberation with others upon which …


The Virtual Wild, Wild West (Www): Intellectual Property Issues In Cyberspace—Trademarks, Service Marks, Copyrights, And Domain Names, Jeffrey J. Look Oct 1999

The Virtual Wild, Wild West (Www): Intellectual Property Issues In Cyberspace—Trademarks, Service Marks, Copyrights, And Domain Names, Jeffrey J. Look

University of Arkansas at Little Rock Law Review

No abstract provided.


Protecting The Digital Consumer: The Limits Of Cyberspace Utopianism, John Rothchild Jul 1999

Protecting The Digital Consumer: The Limits Of Cyberspace Utopianism, John Rothchild

Indiana Law Journal

No abstract provided.


Trademark Issues In Cyberspace: The Brave New Frontier, Sally M. Abel Jun 1999

Trademark Issues In Cyberspace: The Brave New Frontier, Sally M. Abel

Michigan Telecommunications & Technology Law Review

Cyberspace raises a variety of thought-provoking trademark and trademark-related issues. While many of the issues and problems that arise may be analyzed and resolved from the vantage point of traditional notions of trademark law, others present thornier questions requiring greater sensitivity to the practical effect of cyberspace on the commercial marketplace. The cyberspace trademark issue that continues to get the most press is the domain name controversy. Is a domain a trademark? When does use of a domain infringe trademark rights? If someone else registers a company's name or trademark as their domain, what can the company do? Beyond domains …


Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman Jun 1999

Building A Community Through Workplace E-Mail: The New Privacy Frontier, Peter Schnaitman

Michigan Telecommunications & Technology Law Review

The relatively new technology of electronic mail (e-mail) presents an entirely new issue of workplace privacy. Currently, whether a person has a privacy interest in their workplace e-mail communications is as unsettled an issue as it has been since the technology emerged in the early part of this decade as the preferred mode of communication in the workplace. Indeed, e-mail may soon be the preferred mode of communication in general. This comment will argue that all e-mail users have a privacy interest in workplace e-mail communications and that the current law does not afford e-mail users any type of protection …


Internet Framing: Complement Or Hijack , Raymond Chan Jun 1999

Internet Framing: Complement Or Hijack , Raymond Chan

Michigan Telecommunications & Technology Law Review

Currently, the technology of "framing" allows a web site to: (1) pull in the contents of an external site into the local site; (2) "chop" up the contents of the external site into different "frames" or parts; and (3) display only the frames that are beneficial to the framing site. When an advertisements is blocked off by a frame, an advertiser who paid to advertise at an external (framed) site may cease to purchase advertising space from that external site if the framing activities of another web site prevent the advertisement from reaching prospective viewers. From the perspective of the …


False Alarm?, Henry H. Perritt, Jr., Margaret G. Stewart May 1999

False Alarm?, Henry H. Perritt, Jr., Margaret G. Stewart

Federal Communications Law Journal

No abstract provided.


The Copyright Dilemma Involving Online Service Providers: Problem Solved . . . For Now, Christian C.M. Beams May 1999

The Copyright Dilemma Involving Online Service Providers: Problem Solved . . . For Now, Christian C.M. Beams

Federal Communications Law Journal

The Internet environment has presented copyright law with a development unlike any other this century. The illegal trading of copyrighted works has become easier than ever. Until recently, it was possible to hold online service providers strictly liable for the infringing actions of their users, regardless of whether the provider had knowledge of any infringing activity. While promoting the policy of copyright law, upholding such a standard had the potential to limit Internet speech and retard its growth. Seeing this, Congress began to debate on legislation that would protect innocent service providers from this liability. This Note argues that with …


The Common Law In Cyberspace, Tom W. Bell May 1999

The Common Law In Cyberspace, Tom W. Bell

Michigan Law Review

Wrong in interesting ways, counts for high praise among academics. Peter Huber's stirring new book, Law and Disorder in Cyberspace, certainly merits acclaim by that standard. The very subtitle of the book, Abolish the FCC and Let Common Law Rule the Telecosm, announces the daring arguments to follow. A book so bold could hardly fail to make some stimulating errors, the most provocative of which this review discusses. Thanks to his willingness to challenge musty doctrines of telecommunications law and policy, moreover, Huber gets a great deal right. Law and Disorder in Cyberspace argues at length that the Federal Communications …


State Regulatory Jurisdiction And The Internet: Letting The Dormant Commerce Clause Lie, James E. Gaylord May 1999

State Regulatory Jurisdiction And The Internet: Letting The Dormant Commerce Clause Lie, James E. Gaylord

Vanderbilt Law Review

Cyberspace seems to pose a dual threat to "Our Federalism." Only one aspect of this threat, however, has captured the scholarly imagination. Commentators have devoted a great deal of attention to the problems of horizontal federalism raised by the new technology. Cyberspace, they point out, is a profoundly integrative social and economic force. As a result, local legislation touching on cyberspace is likely to produce effects beyond local borders. State laws like a recently deceased Georgia statute that arguably would have prohibited all Internet users from "falsely identifying" themselves on- lines convince observers that the information superhighway is a dangerous …


Legitimacy And Authority In Internet Coordination: A Domain Name Case Study, Joseph P. Liu Apr 1999

Legitimacy And Authority In Internet Coordination: A Domain Name Case Study, Joseph P. Liu

Indiana Law Journal

No abstract provided.


The First Amendment Case Against Fcc Ip Telephony Regulation, Tuan N. Samahon Mar 1999

The First Amendment Case Against Fcc Ip Telephony Regulation, Tuan N. Samahon

Federal Communications Law Journal

This Comment argues that IP telephony, like handbills and traditional print media, deserves First Amendment protection against FCC regulatory authority. After briefly reviewing the IP telephony phenomenon within the larger context of "digital convergence," the Comment examines the FCC and Supreme Court’s technologically driven First Amendment jurisprudence—particularly, the First Amendment’s conspicuous absence from the IP telephony dialogue, and, correspondingly, the prominence of assurances of regulatory forbearance in Congress, the courts, and the FCC. In response, the Author offers First Amendment content-based and content-neutral arguments against the proposed telephony regulations. At the very least, the affordability and innovation IP telephony offers …


Are You My Mommy, Or My Big Brother? Comparing Internet Censorship In Singapore And The United States, Lewis S. Malakoff Mar 1999

Are You My Mommy, Or My Big Brother? Comparing Internet Censorship In Singapore And The United States, Lewis S. Malakoff

Washington International Law Journal

Governments across the globe are grappling to find an appropriate and effective way to regulate Internet activity. Singapore's experience with Internet regulation is particularly instructive, illustrating the inherent tension when a government simultaneously champions the Net's commercial, educational, and social potential while attempting to protect its population from material that offends the community's normative sensibility. Singapore has enacted regulations that require Internet Service Providers to filter content at the network level through the use of proxy servers. In addition, Singapore has issued an Internet Code of Practice that establishes the framework for acceptable speech in cyberspace. In the United States, …


Playing The Name Game: A Glimpse At The Future Of The Internet Domain Name System, Rebecca W. Gole Mar 1999

Playing The Name Game: A Glimpse At The Future Of The Internet Domain Name System, Rebecca W. Gole

Federal Communications Law Journal

As the Internet continues to expand into the top global medium for commerce, education, and communication, individuals and businesses are racing to claim their own unique Internet address or domain name. Unlike the three-dimensional world, where many entities may share the same name, on the Internet each domain name must be unique. As a result of this uniqueness requirement, a variety of disputes and trademark issues have arisen as individuals and entities compete for lucrative domain names on the Internet market. These disputes have led to the submission of two proposals for the overhaul of the current domain name system. …


Employer Liability For Employee Online Criminal Acts, Jeffrey S. Nowak Mar 1999

Employer Liability For Employee Online Criminal Acts, Jeffrey S. Nowak

Federal Communications Law Journal

While the computer and Internet have served as the foundation for a more efficient and effective workplace, they have also wreaked havoc on employers. Employees are increasingly using work-related time to enter the Information Superhighway to commit criminal acts upon third parties outside the employer’s business. Can an employer be held liable for such acts when they are committed using the employer’s computer and Internet system? While the doctrine of respondeat superior may shield employers from liability, the theory of negligent retention or supervision may allow injured parties a second bite at the employer liability apple. Because legislatures and courts …


To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan Mar 1999

To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan

Federal Communications Law Journal

Internet access has become almost commonplace, as has the unfettered exchange of ideas through cyberspace. Several nations, Singapore among them, have attempted to control their citizens’ Internet access in order to preserve and protect a desired national culture. A brief overview of the technological means of Internet censorship reveals a hidden truth: If Singapore truly wishes to become the technological giant of the East, the government will have to sacrifice its desire to control Internet content.


Products Liability In The New Millennium: Products Liability And The Y2k Crisis, Philip J. Landau Jan 1999

Products Liability In The New Millennium: Products Liability And The Y2k Crisis, Philip J. Landau

Richmond Journal of Law & Technology

Imagine the following scenario. It's December 31, 1999 and two minutes until midnight. The champagne has just been poured and everyone is joyfully preparing to welcome in the new millennium. The clock ticks and the countdown begins. While millions of New Yorkers push and shove, millions more gather around television sets to catch a glimpse of the famous "ball" as it begins its descent in Times Square. Five . . . Four . . . Three . . . Two . . . One . . . "Happy New Year!!!" Little does the crowd know, that as they disperse and …


Ethical Issues For Lawyers On The Internet And World-Wide Web, J. T. Westermeier Jan 1999

Ethical Issues For Lawyers On The Internet And World-Wide Web, J. T. Westermeier

Richmond Journal of Law & Technology

The Internet is experiencing explosive growth. The global World Wide Web and Internet are being embraced by the legal community at a phenomenal pace. More and more lawyers are using the Web to promote their practices, disseminate information, communicate with clients and prospective clients, conduct legal research, and carry on the practice of law. This growing use of the Web by lawyers, both nationally and internationally, is raising numerous complex ethical questions.


Computer Software: Patentable Subject Matter Jurisprudence Comes Of Age, 18 J. Marshall J. Computer & Info. L. 113 (1999), Indira Saladi Jan 1999

Computer Software: Patentable Subject Matter Jurisprudence Comes Of Age, 18 J. Marshall J. Computer & Info. L. 113 (1999), Indira Saladi

UIC John Marshall Journal of Information Technology & Privacy Law

The Federal Circuit's ruling in State Street Bank Trust Co. v. Signature Financial Group, Inc. represented a paradigm shift in subject matter jurisprudence. Historically, software has been unpatentable because it included a mathematical algorithm, could not pass the physicality test, and was subject to the business methods exception. The State Street ruling expanded the scope of patentable subject matters by focusing on other aspects of patentability such as novelty, nonobviousness, and utility. State Street refreshingly modernizes patent law for improved application to today's evolving high technology industries. In "Computer Software: Patentable Subject Matter Jurisprudence Comes of Age," the author examines …


Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin Jan 1999

Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Yesterday's Love Letters Are Today's Best Sellers: Fair Use & The War Among Authors, 18 J. Marshall J. Computer & Info. L.141 (1999), Sonali R. Kolhatkar Jan 1999

Yesterday's Love Letters Are Today's Best Sellers: Fair Use & The War Among Authors, 18 J. Marshall J. Computer & Info. L.141 (1999), Sonali R. Kolhatkar

UIC John Marshall Journal of Information Technology & Privacy Law

This Comment will analyze how courts should interpret the four statutory factors in determining a fair use defense for once private documents, such as love letters, and how the courts need to add First Amendment and public policy concerns in deciding whether to allow the fair use. First, this Comment addresses the current definition of the fair use doctrine and its impact on unpublished works. This Comment will also address the need to create a new fair use defense test to include the First Amendment concerns of secondary authors who cannot create their works without the copyrighted information. Secondly, this …


Ucita: A 1990'S Vision Of E-Commerce, 18 J. Marshall J. Computer & Info. L. 323 (2000), Stephen Y. Chow Jan 1999

Ucita: A 1990'S Vision Of E-Commerce, 18 J. Marshall J. Computer & Info. L. 323 (2000), Stephen Y. Chow

UIC John Marshall Journal of Information Technology & Privacy Law

This article begins with a comparison of UCITA and UCC Article 2 and shows how much less restraint the drafters had while drafting the UCITA in early 1995. It was during this time that UCC Article 2 was still undergoing revision. This article continues with the author's detailed examination of the underlying major structural and policy defects in UCITA that require the drafters' attention before it is made into law. The author defines the scope of UCITA as being too broad. Furthermore, the author deconstructs and criticizes various sections of UCITA.


1999 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 18 J. Marshall J. Computer & Info. L. 195 (1999), Harry Apostolakopoulos, Hunter M. Barrow, Kristi Belt Jan 1999

1999 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 18 J. Marshall J. Computer & Info. L. 195 (1999), Harry Apostolakopoulos, Hunter M. Barrow, Kristi Belt

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


1999 John Marshall National Moot Court Competition In Information Technology And Privacy Lawbrief For The Respondent, 18 J. Marshall J. Computer & Info. L. 235 (1999), Alice Sum, Christine Lent, Kimberly Gilyard Jan 1999

1999 John Marshall National Moot Court Competition In Information Technology And Privacy Lawbrief For The Respondent, 18 J. Marshall J. Computer & Info. L. 235 (1999), Alice Sum, Christine Lent, Kimberly Gilyard

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


1999 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 18 J. Marshall J. Computer & Info. L. 181 (1999), George B. Trubow, Ann Liebschutz, Maria Pope Jan 1999

1999 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 18 J. Marshall J. Computer & Info. L. 181 (1999), George B. Trubow, Ann Liebschutz, Maria Pope

UIC John Marshall Journal of Information Technology & Privacy Law

Every year The Center for Information Technology and Privacy Law of the John Marshall Law School hosts a moot court competition. This year's topic dealt with Internet hacking and subsequent harassment from personal information displayed on the web. The respondent, an Internet company that specializes in displaying pages from hacked websites, published a hacked page that contained personal information about the petitioner. The personal information included his social security number, home telephone number, and home address. Petitioner claimed invasion of privacy. The decision, from which the petitioner appeals, granted summary judgment in favor of the respondent. The issues presented in …


The Use Of Electronic Agents Questioned Under Contractual Law: Suggested Solutions On A European American Level, 18 J. Marshall J. Computer & Info. L. 403 (2000), Jean-Francois Lerouge Jan 1999

The Use Of Electronic Agents Questioned Under Contractual Law: Suggested Solutions On A European American Level, 18 J. Marshall J. Computer & Info. L. 403 (2000), Jean-Francois Lerouge

UIC John Marshall Journal of Information Technology & Privacy Law

This article recognizes the legal issues associated with the emergence of Electronic commerce and the roles of "electronic agents" between interactions of users and web-based companies. The author proposes legal solutions found in both common and civil laws when electronic agents are used. In addition, this article fully dissects the validity of contracts conducted by "electronic agents." The author begins by addressing the relevant technical issues and then looks at the legal questions involved in the use of electronic agents. Next, the author suggests minor changes to the present law which may actually offer possible solutions. The author further discusses …


The Uniform Computer Information Transactions Act: A Practitioner's View, 18 J. Marshall J. Computer & Info. L. 279 (2000), John A. Chanin Jan 1999

The Uniform Computer Information Transactions Act: A Practitioner's View, 18 J. Marshall J. Computer & Info. L. 279 (2000), John A. Chanin

UIC John Marshall Journal of Information Technology & Privacy Law

This article helps to clarify the reader's understanding of issues and concepts relating to UCITA in the midst of legislative drafting efforts to give "birth" to section 2B of the UCITA. Concepts such as the ability to "opt-in" or "out" of the Act, "manifestation of assent," electronic signatures, use of the electronic agent, "mass-market" are fully analyzed and discussed. This article first attempts to outline the drafting process followed by the UCITA drafting committee. Next, the author lays out the objectives of the drafters of the UCITA as it appears in the Prefatory Notes. The author further moves into the …


Ucita: Helping David Face Goliath, 18 J. Marshall J. Computer & Info. L. 365 (2000), Micalyn S. Harris Jan 1999

Ucita: Helping David Face Goliath, 18 J. Marshall J. Computer & Info. L. 365 (2000), Micalyn S. Harris

UIC John Marshall Journal of Information Technology & Privacy Law

The author explains the significance and benefits of UCITA and its major role in clarifying contractual agreements as it responds to the technological age of computer information. The author articulates that the benefits of UCITA are many and advantageous, especially for individuals and small businesses. The benefits of contract formation in UCITA are further elaborated upon in this article. Furthermore, the author delves into the concepts of Rules of Construction and Warranties. Other topics of discussion include transfers of interests and rights, financing arrangements, performance, breach of contract, mass market v. non-mass market transactions, and finally, remedies.