Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2002

Internet Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 120

Full-Text Articles in Law

Mom & Pop V. Dot-Com: A Disparity In Taxation Based On How You Shop?, Jaime Klima Dec 2002

Mom & Pop V. Dot-Com: A Disparity In Taxation Based On How You Shop?, Jaime Klima

Duke Law & Technology Review

With the extension of the Internet Tax Freedom Act, concern has resurfaced over whether and when shoppers will be forced to pay state sales taxes on purchases made over the Internet. In fact, consumers should be paying sales tax on all Internet purchases, though few actually do. This iBrief explores the current law on taxation of e-commerce purchases and argues that small modifications by state tax administrators will align the tax treatment of mom & pop stores and e-retailers.


The U.S. Supreme Court Addresses The Child Pornography Prevention Act And Child Online Protection Act In Ashcroft V. Free Speech Coalition And Ashcroft V. American Civil Liberties Union, Sue Ann Mota Dec 2002

The U.S. Supreme Court Addresses The Child Pornography Prevention Act And Child Online Protection Act In Ashcroft V. Free Speech Coalition And Ashcroft V. American Civil Liberties Union, Sue Ann Mota

Federal Communications Law Journal

Both the Child Pornography Prevention Act ("CPPA") and the Child Online Protection Act ("COPA") were intended by Congress to protect minors. The CPPA was intended to protect minors from the harmful effects of virtual child pornography. The COPA was intended to protect minors from pornography currently available commercially on the World Wide Web. However, in 2002, the U.S. Supreme Court addressed the constitutionality of both statutes: The Court struck down sections of the CPPA as overbroad and unconstitutional in Ashcroft v. Free Speech Coalition. In Ashcroft v. ACLU, the Court upheld some sections of COPA as not unconstitutionally overbroad, but …


What’S In A Name?, Jonathan Zittrain Dec 2002

What’S In A Name?, Jonathan Zittrain

Federal Communications Law Journal

Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.

A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …


Western Frontier Or Feudal Society? Metaphors And Perceptions Of Cyberspace, Alfred C. Yen Nov 2002

Western Frontier Or Feudal Society? Metaphors And Perceptions Of Cyberspace, Alfred C. Yen

Alfred C. Yen

The Article examines how metaphors influence perceptions of cyberspace. Among other things, the Article studies the comparison of cyberspace to the American western frontier and the metaphor's construction cyberspace as a "place" whose natural characteristics guarantee freedom and opportunity. This supports an often-made claim that cyberspace is different from real space, and that government should generally refrain from regulating the Internet.

The Article surveys the basis of the western frontier metaphor in academic history and popular culture and concludes that the metaphor misleads people to overestimate cyberspace's "natural" ability to guarantee freedom and opportunity. The Article accomplishes this in part …


Music Piracy And The Audio Home Recording Act, Tia Hall Nov 2002

Music Piracy And The Audio Home Recording Act, Tia Hall

Duke Law & Technology Review

In spite of the guidance provided by the Audio Home Recording Act (AHRA) of 1992, music companies are once again at odds with consumer electronics manufacturers. This time around, the dispute is over certain information technology products that enable consumers to copy digital music and transfer them to different formats, or exchange them over the Internet. This article will discuss anti-piracy measures being taken by digital content owners and the United States legislature to combat piracy and evaluate them in light of the AHRA.


Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean Nov 2002

Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Online Brokers And The Sec: Still Working Out The Glitches, Philip J. Bezanson Nov 2002

Online Brokers And The Sec: Still Working Out The Glitches, Philip J. Bezanson

Duke Law & Technology Review

Common sense dictates that some customers of an on-line brokerage service are bound to have some of the same difficulties in conducting business but that does not mean all customers or even many customers had the same problems. In addition, as to customers who may have had problems executing buy and/or sell orders, there are many variables regarding the circumstances and conditions for each customer's transaction. Variables such as, but not limited to, account status, time of order, i.e., time of day and day of the week, and the customer's computer modem capabilities and internet service provider. Plaintiffs fail to …


Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


The Future Of Wireless Spam, Evan Cramer Oct 2002

The Future Of Wireless Spam, Evan Cramer

Duke Law & Technology Review

Though US cellular networks currently lack the capacity for widespread distribution of unsolicited wireless advertising (wireless spam), these advertisements are already well known in Japan and Europe, where they have proven to be a significant burden on cellular users. This iBrief examines the recently ratified legislation in Japan and Asia that have attempted to stop the glut of wireless advertisements, as a foreshadowing of the problems and questions that will soon have to be addressed in the United States.


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


"Greening" The Constitution - Harmonizing Environmental And Constitutional Values, Robert V. Percival Oct 2002

"Greening" The Constitution - Harmonizing Environmental And Constitutional Values, Robert V. Percival

Faculty Scholarship

No abstract provided.


Virtual Child Pornography On The Internet: A “Virtual” Victim?, Dannielle Cisneros Sep 2002

Virtual Child Pornography On The Internet: A “Virtual” Victim?, Dannielle Cisneros

Duke Law & Technology Review

Child pornography is an exception to First Amendment freedoms because it exploits and abuses our nation's youth. The latest trend in that industry is "virtual child" pornography. "Virtual child" pornography does not use real children or images of real identifiable children. When the object of desire is not a child, but merely a combination of millions of computer pixels crafted by a skilled artist, can the government ban this allegedly victimless creation?


New “Unbundling” Rules: Will The Fcc Finally Open Up Cable Broadband?, Sarah North Sep 2002

New “Unbundling” Rules: Will The Fcc Finally Open Up Cable Broadband?, Sarah North

Duke Law & Technology Review

This iBrief discusses a recent Court of Appeals decision remanding FCC rules on the "unbundling" of Internet services by telephone exchange carriers. These rules ordered many Internet service providers to share their equipment with competitors, so that consumers could choose their providers instead of having to accept all services from the company who installed the physical Internet connection. Cable Internet providers are not included in these rules. This iBrief predicts that cable broadband operators will soon be governed by the same "unbundling" provisions as other ISPs.


Microsoft And The European Union Face Off Over Internet Privacy Concerns, Seagrumn Smith Aug 2002

Microsoft And The European Union Face Off Over Internet Privacy Concerns, Seagrumn Smith

Duke Law & Technology Review

Amidst what appears to be a multi-faceted attack by the European Union on Microsoft, the newest angle is the European Commission's announcement last month that it was considering a formal investigation of Microsoft's .Net Passport data processing system for possible violations of the European Union Data Privacy Directive. This iBrief explores the European Data Privacy Directive and seeks to explain why the European Commission believes .Net Passport may be in violation of its privacy policies and a case for further investigation.


Open Source, Open Arms: An Open-Ended Question, Alana Maurushat Aug 2002

Open Source, Open Arms: An Open-Ended Question, Alana Maurushat

Canadian Journal of Law and Technology

This paper is structured to address several aspects and challenges to the open source movement. Beginning with an outline of the historical and cultural components of the open source movement, the paper will move on to explore the economic and philosophical underpinnings of intellectual property. It will be demonstrated that open source finds itself uniquely situated within these theories and doctrines. The questions that open source poses for intellectual property will then be examined. My arguments will stem from the general premise that open source is threatened by three mechanisms: the uncertainty of the validity of open source licenses, potentially …


The New Singapore Domain Name Dispute Resolution Policy: The Context Of The Common Law And Icann's Udrp, Richard Wu Aug 2002

The New Singapore Domain Name Dispute Resolution Policy: The Context Of The Common Law And Icann's Udrp, Richard Wu

Canadian Journal of Law and Technology

In this article, I will analyse the salient features of the Policy and evaluate the extent to which they match international practice. I will focus, in particular, upon the Uniform Domain Name Dispute Resolution Policy (UDRP) and the rules made under the UDRP. The Internet Corporation for Assigned Names and Numbers (ICANN), the international body responsible for domain name management, adopted both in 1999. As the nature of domain name disputes and dispute resolution rules are very similar in different countries, domain name disputes are becoming a global phenomenon, leading to the development of a kind of ‘‘Internet common law’’. …


M-Commerce: The Notion Of Consumer Consent In Receiving Location-Based Advertising, Eloïse Gratton Aug 2002

M-Commerce: The Notion Of Consumer Consent In Receiving Location-Based Advertising, Eloïse Gratton

Canadian Journal of Law and Technology

The development of location-based advertising, for all its convenience and usefulness, introduces new and heightened privacy risks for consumers that must be addressed. The portability of wireless devices and the ubiquity of their applications, coupled with an ability to pinpoint the location of wireless users and reveal it to others, could produce a system where the everyday activities and movements of these users are tracked and recorded. Wireless users would receive unanticipated advertising messages on their wireless device, commonly referred to as ‘‘wireless spam’’, generally considered a form of privacy violation.

In order to obtain a valid consent from the …


Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele Aug 2002

Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele

Canadian Journal of Law and Technology

This paper provides an overview of trade-related aspects of electronic commerce, and examines three approaches for regulating international trade in cyber- space. A model which integrates these approaches is then proposed, emphasizing private standards of self-regula- tion within a broader public framework of minimal background standards. A summary of potential areas of conflict between competing regulatory approaches fol- lows, and the paper concludes that both the WTO and the OECD have important roles to play in the develop- ment of international consensus towards a harmonized framework for the regulation of global TRECs.


The Personal Information Protection And Electronic Documents Act: A Comprehensive Guide By William Charnetski, Patrick Flaherty And Jeremy Robinson (Toronto Canada Law Book Inc., 2001), Teresa Scassa Aug 2002

The Personal Information Protection And Electronic Documents Act: A Comprehensive Guide By William Charnetski, Patrick Flaherty And Jeremy Robinson (Toronto Canada Law Book Inc., 2001), Teresa Scassa

Canadian Journal of Law and Technology

The Personal Information Protection and Electronic Documents Act: A Comprehensive Guide (the Guide) is the second book to be published in English in Canada dealing expressly with the Personal Information Protec- tion and Electronic Documents Act (PIPEDA). The Guide is different from the earlier work, in that it is not a section by section discussion or annotation of the provisions of PIPEDA. Rather, it is organized into eight chapters, each addressing a distinct theme or topic. The Guide is also aimed at a more professional audience than the earlier work. In its introduction, and in its choice of content, it …


Solving Legal Issues In Electronic Government: Jurisdiction, Regulation, Governance, John D. Gregory Aug 2002

Solving Legal Issues In Electronic Government: Jurisdiction, Regulation, Governance, John D. Gregory

Canadian Journal of Law and Technology

This paper looks at who can be governed, what can be governed, and how it can be governed in an electronic world. Whether law aims to be enabling (i.e., confirming the ground rules and the legal effectiveness of general conduct) or normative (i.e., imposing standards of conduct on more or less willing subjects), the new media presents difficulties for its rational evolution.

These are distinct questions from those raised by government online. Electronic service delivery issues tend to focus on how government can carry on its traditional programs using electronic means and how the law can support it in doing …


The Patriation Of .Ca, Gregory R. Hagen, Kim G. Von Arx Aug 2002

The Patriation Of .Ca, Gregory R. Hagen, Kim G. Von Arx

Canadian Journal of Law and Technology

Country code top level domains (‘‘ccTLD’’s), such as .ca, are distinct from generic top-level domains (‘‘gTLD’’s), such as .com, in that they are generally conceived to be associated with a specific country. In Canada, the authority to operate the technical functions of the .ca domain name registry has been delegated to the Canadian Internet Registration Authority (‘‘CIRA’’) by a United States non-profit corporation, the Internet Corporation for Assigned Names and Numbers (‘‘ICANN’’). The authority to make policy regarding the .ca has purportedly been delegated to CIRA by the Government of Canada. There is an issue, however, as to whether ICANN’s …


The First International Competition For Online Dispute Resolution: Is This Big, Different And New?, Benjamin G. Davis, Franklin G. Snyder, Kay Elkins Elliott, Peter B. Manzo, Alan Gaitenby, David Allen Larson Aug 2002

The First International Competition For Online Dispute Resolution: Is This Big, Different And New?, Benjamin G. Davis, Franklin G. Snyder, Kay Elkins Elliott, Peter B. Manzo, Alan Gaitenby, David Allen Larson

Faculty Scholarship

In February of 2002, the International Competition for Online Dispute Resolution (ICODR) was held to address the issue of new uses of technology is dispute resolution. This article describes the competition with individual presentations from the perspectives of a problem drafter, a coach, a participant, the evaluators, and an organizer. In the conclusion, the author presents some observations on why this International Competition for Online Dispute Resolution is big, different, and new.


Law And Order On The Wild, Wild West (Www), Jeffrey J. Look Jul 2002

Law And Order On The Wild, Wild West (Www), Jeffrey J. Look

University of Arkansas at Little Rock Law Review

No abstract provided.


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Standard-Form Contracting In The Electronic Age, Robert A. Hillman, Jeffrey J. Rachlinski May 2002

Standard-Form Contracting In The Electronic Age, Robert A. Hillman, Jeffrey J. Rachlinski

Cornell Law Faculty Publications

The development of the Internet as a medium for consumer transactions creates a new question for contract law. In this Article, Professors Robert Hillman and Jeffrey Rachlinski address whether the risks imposed on consumers by Internet boilerplate requires a new lens through which courts should view these types of contracts. Their analysis of boilerplate in paper and Internet contracts examines the social, cognitive, and rational factors that affect consumers' comprehension of boilerplate and compares business strategies in presenting it. The authors conclude that the influence of these factors in Internet transactions is similar to that in proper transactions. Although the …


Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion May 2002

Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion

Federal Communications Law Journal

While we credit employers that provide employees with free Internet access, such access comes at a price to the public because employers are one of the traditional defendents in defamation suits. Complicating matters, Congress enacted the Communications Decency Act. Its section 230 provides broad federal immunity for ISPs when defamatory material of a third party is published using their services. With the passage of section 230, Congress rendered employers immune for the same tort which they are so closely associated. Some argue that employers should not be capable of invoking the immunity because it would allow employers to defame with …


Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson May 2002

Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson

Federal Communications Law Journal

The information revolution has led to technological innovations in the movement, storage, and dissemination of information. The Internet allows a person, with good or bad intent, to distribute information to millions of people. This ability raises serious implications when trade secret information is the subject of Internet postings. Once a trade secret becomes publicly available, it loses its legal secrecy, and special legal protection. Additionally, competitors and everyone else on the Internet can gain access to the information. For those who rely on trade secret protection to guard their inventions, this presents a growing concern.

This Note will illustrate the …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Arkansas Surfers And Their Privacy, Or Lack Thereof: Does The Common Law Invasion Of Privacy Tort Prohibit E-Tailers' Use Of "Cookies"?, Bryan T. Mckinney, Dwayne Whitten Apr 2002

Arkansas Surfers And Their Privacy, Or Lack Thereof: Does The Common Law Invasion Of Privacy Tort Prohibit E-Tailers' Use Of "Cookies"?, Bryan T. Mckinney, Dwayne Whitten

University of Arkansas at Little Rock Law Review

No abstract provided.