Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (23)
- Schulich School of Law, Dalhousie University (16)
- New York Law School (13)
- University of Richmond (12)
- Chicago-Kent College of Law (10)
-
- Duke Law (10)
- Santa Clara Law (8)
- Columbia Law School (7)
- Selected Works (6)
- Maurer School of Law: Indiana University (4)
- Mercer University School of Law (4)
- University of Washington School of Law (4)
- SelectedWorks (3)
- University of Baltimore Law (3)
- University of Pittsburgh School of Law (3)
- Vanderbilt University Law School (3)
- Villanova University Charles Widger School of Law (3)
- American University Washington College of Law (2)
- Boston University School of Law (2)
- Notre Dame Law School (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Dayton (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Massachusetts Amherst (2)
- University of Michigan Law School (2)
- University of Pennsylvania Carey Law School (2)
- Brigham Young University Law School (1)
- Georgetown University Law Center (1)
- Loyola University Chicago, School of Law (1)
- Pace University (1)
- Keyword
-
- Internet (29)
- First Amendment (14)
- Censorship (10)
- Privacy (9)
- Child welfare (8)
-
- Copyright (8)
- Google (8)
- Adwords (7)
- Parental rights (6)
- 2004 (5)
- Case comment (5)
- ECommerce (5)
- Law (5)
- Technology (5)
- Trademark policy (5)
- Cyberspace (4)
- Libraries (4)
- Obscenity (4)
- Online (4)
- Technology Law (4)
- Telecommunications (4)
- Domain names (3)
- Freedom of speech (3)
- Intellectual Property Law (3)
- Intellectual property (3)
- Internet filters (3)
- Media & Communications (3)
- Personal jurisdiction (3)
- Property (3)
- Regulation (3)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Canadian Journal of Law and Technology (16)
- Faculty Scholarship (11)
- NYLS Law Review (11)
- Chicago-Kent Law Review (10)
-
- Duke Law & Technology Review (10)
- Richmond Journal of Law & Technology (9)
- Rosetta Stone v. Google (Joint Appendix) (8)
- All Faculty Scholarship (5)
- Articles (4)
- Federal Communications Law Journal (4)
- Mercer Law Review (4)
- UIC Law Review (3)
- Articles & Chapters (2)
- Daniel Lyons (2)
- Jeffrey S. Moorad Sports Law Journal (2)
- Journal Articles (2)
- Laura Quilter (2)
- Michigan Telecommunications & Technology Law Review (2)
- Scholarly Articles (2)
- School of Law Faculty Publications (2)
- University of Richmond Law Review (2)
- Washington Law Review (2)
- Amicus Briefs (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Chapters in Books and Other Contributions to Scholarly Works (1)
- Brigham Young University Journal of Public Law (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Faculty Articles (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Publication Type
- File Type
Articles 1 - 30 of 164
Full-Text Articles in Law
Canning Spam: Consumer Protection Or A Lid On Free Speech?, Grant C. Yang
Canning Spam: Consumer Protection Or A Lid On Free Speech?, Grant C. Yang
Duke Law & Technology Review
The United States Congress recently passed the first federal legislation to curb the influx of spam. However, the Controlling the Assault of Non-Solicited Pornography and Marketing Act ("CAN-SPAM Act") left some measures to be enacted by the Federal Trade Commission ("FTC"), and some consumers are calling for the Act to have a broader reach and for the creation of a Do-Not-E-Mail registry. Conversely, the FTC decided to delay the creation of a registry and opted to assist in the development of a new technological authentication system. This iBrief looks at the current state of spam and explains that it is …
1984 Is Still Fiction: Electronic Monitoring In The Workplace And U.S. Privacy Law, Christopher Pearson Fazekas
1984 Is Still Fiction: Electronic Monitoring In The Workplace And U.S. Privacy Law, Christopher Pearson Fazekas
Duke Law & Technology Review
Electronic monitoring in the workplace has been the subject of relentless public criticism. Privacy advocates argue that technological advancements have given overbearing employers powerful tools to abuse employee dignity in the name of productivity and that new legislation should bolster workplace privacy rights. This iBrief contends that current U.S. legal doctrine governing electronic monitoring in the workplace is fair given the nature and purpose of the workplace, and potential employer liability for employee misconduct.
An Introduction To Lessigian Thought, Russ Taylor
An Introduction To Lessigian Thought, Russ Taylor
Federal Communications Law Journal
Book Review: Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity, Lawrence Lessig, New York: Penguin Press, 2004, 306 pages.
A review of Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity by Lawrence Lessig. Lawrence Lessig is a frequent commentator and prolific writer on media and communications topics. His body of work touches copyright issues, radio spectrum policy, media ownership issues, and legal ownership and control of the physical platforms that deliver broadband content. In this 2004 publication, he focuses on copyright policy. …
An Architecture For Spam Regulation, David Dickinson
An Architecture For Spam Regulation, David Dickinson
Federal Communications Law Journal
Junk email, commonly referred to as "spam," is the current scourge of the Internet. In late 2004, unwanted email messages were being delivered at a rate of 12.4 billion per day. The variety of tools used to combat spam have failed to make a significant impact. Legislative efforts, such as the CAN-SPAM Act of 2003, met with substantial enforcement complications. The communications industry responded with a variety of technical advances, such as filters and blacklists, but those innovations are still unable to reliably distinguish between wanted and unwanted messages. Real coordination between legislative and technical spam control tactics has yet …
Uncle Sam Is Watching You, David Cole
Uncle Sam Is Watching You, David Cole
Georgetown Law Faculty Publications and Other Works
No abstract provided.
Crossed Signals In A Wireless World: The Seventh Circuit’S Misapplication Of The Complete Preemption Doctrine, Matthew J. Kleiman
Crossed Signals In A Wireless World: The Seventh Circuit’S Misapplication Of The Complete Preemption Doctrine, Matthew J. Kleiman
Duke Law & Technology Review
As the number of wireless telephone users continues to proliferate, so does the number of lawsuits against wireless service providers. While consumers seek to utilize various consumer-friendly state law causes of action, the wireless industry continues to push for a uniform federal regulatory regime. Ambiguous language in the Federal Communications Act of 1934 ("FCA") and disagreement among the federal circuits has led to much confusion over whether state law claims affecting wireless rates and market entry are removable to federal court by way of "complete preemption." This iBrief argues that FCA's preemption power is limited by its savings clause, failure …
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Laura Quilter
Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Amicus Briefs
Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Peter Jaszi
The Trade Of Cross-Border Gambling And Betting: The Wto Dispute Between Antigua And The United States, James D. Thayer
The Trade Of Cross-Border Gambling And Betting: The Wto Dispute Between Antigua And The United States, James D. Thayer
Duke Law & Technology Review
The first ecommerce dispute to come before the World Trade Organization ("WTO") was billed to be one of David and Goliath proportion. The tiny twin-island nation-state of Antigua and Barbuda challenged the United States' ban on cross-border Internet gambling and betting. As a result of the dispute, the WTO issued a private final report against the United States finding that the ban violates the United States' commitments under the WTO. Shortly before the public release of the final report, both parties petitioned the WTO to indefinitely postpone its release so that the parties could engage in private negotiations. The final …
Case Comment On F. Hoffman-Laroche Ltd. V. Empagran S.A. In 'The Supreme Court 2003 Term: Leading Cases. Iii Federal Statutes And Regulations: E. Foreign Trade Antitrust Improvement Act', Daniel Lyons
Daniel Lyons
No abstract provided.
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Laura Quilter
No abstract provided.
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Jennifer M. Urban
No abstract provided.
Privacy, Free Speech & The Garden Grove Cyber Café Experiment, Brett Stohs
Privacy, Free Speech & The Garden Grove Cyber Café Experiment, Brett Stohs
Duke Law & Technology Review
In response to gang violence at local "cyber cafés," the City Council of Garden Grove, California, passed an ordinance requiring cyber cafés to install video surveillance systems. The constitutionality of the provision was subsequently challenged, and a California Court of Appeal determined that the video surveillance requirement did not violate free speech or privacy protections under either the federal or California Constitutions. This decision was immediately challenged, by commentators and a dissenting judge, as opening the door to Orwellian-type, government intrusions into individuals' personal lives. This iBrief analyzes the appellate court's decision and concludes that not only did the majority …
The Origins Of Cctld Policymaking, Peter K. Yu
The Origins Of Cctld Policymaking, Peter K. Yu
Faculty Scholarship
Extract:
A long time ago in a galaxy not so far away, there was a decentralized global network of computers. These computers shared information with each other regardless of how far apart they were and whether there was any direct line of communication between them. In the very beginning, this network was used exclusively by government and military agencies, educational and research institutions, government contractors, scientists, and technology specialists. Instead of the domain names we use today, such as “www. amazon.com,” users typed in numeric addresses, such as “123.45.67.89,” and, later, host names to send information to other computers.
This …
Internet Pharmacies: Why State Regulatory Solutions Are Not Enough, Linda C. Fentiman
Internet Pharmacies: Why State Regulatory Solutions Are Not Enough, Linda C. Fentiman
Elisabeth Haub School of Law Faculty Publications
Internet pharmacies are an economic and communications miracle--and a regulatory nightmare. It is estimated that Americans spent some $3.2 billion in 2003 on medications from the Internet, but Internet pharmacies permit consumers to evade long-standing regulatory protections, particularly those that rely on the oversight of drug prescribing and dispensing by licensed physicians and pharmacists.
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan
Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 58 - Deposition Of Rose Hagan From Geico V. Google (Google Managing Counsel Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
A Manifesto On Wipo And The Future Of Intellectual Property, James Boyle
A Manifesto On Wipo And The Future Of Intellectual Property, James Boyle
Duke Law & Technology Review
In this Manifesto, Professor Boyle claims that there are systematic errors in contemporary intellectual property policy and that WIPO has an important role in helping to correct them.
Privacy Concerns Regarding The Monitoring Of Instant Messaging In The Workplace: Is It Big Brother Or Just Business?, Ira David
Nevada Law Journal
No abstract provided.
Virtual Shareholder Meetings, Elizabeth Boros
Virtual Shareholder Meetings, Elizabeth Boros
Duke Law & Technology Review
Electronic communication impacts how widely-held corporations conduct shareholder meetings. For example, technology has facilitated such options as electronic proxy voting, remote electronic voting, and "virtual meetings." This iBrief examines the idea of "virtual meetings" and argues that they should not entirely replace physical meetings unless an electronic solution can be devised which replicates the face-to-face accountability of management to retail shareholders.
Case Comment: Society Of Composers, Authors And Music Publishers Of Canada V. Canadian Association Of Internet Service Providers, Barry Sookman
Case Comment: Society Of Composers, Authors And Music Publishers Of Canada V. Canadian Association Of Internet Service Providers, Barry Sookman
Canadian Journal of Law and Technology
The exponential growth of the Internet has raised serious issues related to liability for copyright infringement. Who should compensate authors and publishers for the use of their works? What activities constitute infringement? Are Internet intermediaries such as Internet service providers (ISPs) liable for infringement when they provide connectivity to subscribers, when they provide hosting services, or when they use caching technologies? Where does infringement occur? Is the scope of the Copyright Act limited to acts of infringement that occur wholly within Canada or does the Act apply to acts that take place partly in Canada and partly outside of Canada? …
Three Years Under The Pipeda: A Disappointing Beginning, Christopher Berzins
Three Years Under The Pipeda: A Disappointing Beginning, Christopher Berzins
Canadian Journal of Law and Technology
As of January 1, 2004, after a three-year phase-in period, the Personal Information Protection and Electronic Documents Act (PIPEDA) came fully into force. Although considerable uncertainty currently prevails due to unanticipated events such as the resignation and replacement of Commissioner George Radwanski and the late constitutional challenge by Quebec, there is now sufficient experience with the legislation to begin to assess how the PIPEDA is working. It is also a timely juncture to do so with the extension of the legislation to the provincially regulated private sector.
Privacy Of Genetic Information In Canada: A Brief Examination Of The Legal And Ethical Tools That Should Frame Canada's Regulatory Response, Stephen Orr
Canadian Journal of Law and Technology
This article investigates the legal and ethical tools that should inform Canada's regulation of the privacy of genetic information. We are the first generation faced with resolving the unique challenges presented by genetic information. Unfortunately, the patchwork of instruments that could regulate genetic information in Canada is insufficient. The prospect of Canadians increasingly generating genetic information without a satisfactory structure for protecting the information is rather alarming. It is therefore important that we commit to reexamining regulations regarding genetic information. Different loci of governance will likely be required. Canada should look to international law and comparative law for inspiration regarding …
Video Surveillance, Evidence And Pipeda: A Comment On Ferenszy V. Mci Medical Clinic, Anne Uteck
Video Surveillance, Evidence And Pipeda: A Comment On Ferenszy V. Mci Medical Clinic, Anne Uteck
Canadian Journal of Law and Technology
One of the most common uses of surveillance is in the area of evidence gathering for investigation by litigators. Private investigators have long been retained for this purpose, and law enforcement officers routinely utilize surveillance devices to assist in the prosecution of a crime. The admissibility of video surveillance evidence obtained by private and government investigators is obviously not a new issue. What has come to the fore- front is the application of the Personal Information Protection and Electronic Documents Act in the context of video surveillance evidence, and its impact on civil litigators. Privacy interests inherent in the collection, …
No Lego, Yes Logo: The Federal Court Of Appeal Protects Innovation In Kirkbi Ag And Lego Canada Inc. V. Ritvik Holdings Inc., Sean Robertson
No Lego, Yes Logo: The Federal Court Of Appeal Protects Innovation In Kirkbi Ag And Lego Canada Inc. V. Ritvik Holdings Inc., Sean Robertson
Canadian Journal of Law and Technology
This article will discuss the case at the trial and appellate levels. It will specifically address the underlying policy debate between the majority and the dissenting decisions at the Federal Court of Appeal. The author will compare this debate to two similar international cases involving Lego’s infamous intellectual property litigation. With this recent finding in the 40-year-old saga of international case law surrounding Lego’s trade-mark enforcement strategy, the Appeal Division of the Federal Court of Canada joins the ranks of several other courts that have similarly excluded protection for Lego based on the doctrine of functionality. The comment concludes with …
The Law Of Privacy In Canada (Student Edition) By Barbara A. Mcisaac, Rick Shields, Kris Klein (Toronto: Thomson Carswell, 2004), John D. Gregory
The Law Of Privacy In Canada (Student Edition) By Barbara A. Mcisaac, Rick Shields, Kris Klein (Toronto: Thomson Carswell, 2004), John D. Gregory
Canadian Journal of Law and Technology
To help lawyers advise their clients on their rights and obligations in this complex and novel field, the various legal publishers have offered an array of guides and textbooks analyzing the law of privacy. Thomson/Carswell turned for its book to the national law firm of McCarthy Tétrault. Three McCarthy lawyers (Barbara McIsaac, Rick Shields, and Kris Klein) are listed as authors of The Law of Privacy in Canada, and several others have contributed significant parts of the text, and they have done a creditable job in pulling it all together. It seems to be the only thorough and up-to-date analysis …
Restoring A Public Interest Vision Of Law In The Age Of The Internet, Marc Rotenberg
Restoring A Public Interest Vision Of Law In The Age Of The Internet, Marc Rotenberg
Duke Law & Technology Review
In November 2003, Mr. Marc Rotenberg, Executive Director of the Electronic Privacy Information Center, lectured at Duke Law School on the importance of protecting individual privacy. In his remarks, Mr. Rotenberg recounted the successful campaign against the government's Clipper Chip proposal. He argued that successful public interest advocacy in the Internet age requires the participation of experts from many fields, public engagement, and a willingness to avoid a simple "balancing" analysis. He further concluded that privacy may be one of the defining issues of a free society in the twenty-first century.
Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck
Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?