Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Internet Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 199

Full-Text Articles in Law

T-Mobile Usa Inc. V. Department Of Finance For Baltimore City: What The Latest Salvo In Disproportional Cellular Phone Taxation Means For The Future, Daniel P. Slowey Dec 2006

T-Mobile Usa Inc. V. Department Of Finance For Baltimore City: What The Latest Salvo In Disproportional Cellular Phone Taxation Means For The Future, Daniel P. Slowey

Duke Law & Technology Review

Seventeen percent of the average monthly cellular phone bill in 2004 was comprised of federal, state, and local taxes. As the number of wireless subscribers across the nation continues to increase, states, cities, and counties are increasingly seizing upon cellular taxation as a panacea for budget shortfalls. The Maryland Tax Court’s recent decision in T-Mobile USA, Inc. v. Department of Finance for Baltimore City held state and county taxes on the sale of individual cellular lines as legal excise taxes rather than illegal sales taxes. This iBrief will highlight the origins of telecommunications taxation, examine the ruling in T-Mobile in …


The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong Dec 2006

The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong

Federal Communications Law Journal

This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware's functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note …


Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan Nov 2006

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran Nov 2006

Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran

ExpressO

Electronic agreements continue to fortify their presence in the digital commercial marketplace. Whether used to sell goods or services, or simply to define relationships, standardized electronic agreements have appeared in abundance in business-to-business or business-to-consumer transactions. Standardized electronic agreements, like their physical counterparts, offer the ability to address multiple concerns in a simple, efficient fashion. Although electronic contracts and electronic signatures have been accepted and promoted by federal and state governments, many fundamental aspects of contract law have been left for the courts to wrestle with when disputes arise.

Today, there are essentially two types of standardized electronic agreements—the click-through …


Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens Nov 2006

Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens

ExpressO

Electronic contractual arrangements have raised complex legal issues unprecedented in the law. Technology s impact on traditional contract law doctrines is readily apparent in the dilemmas generated by recent developments in computer software, hardware, and Internet transactions. In such transactions, sellers have increasingly begun utilizing “clickwrap” agreements, whereby standard terms and conditions are displayed on the computer screen when the user attempts to access the seller’s services. Not surprisingly, the enforceability of clickwrap terms, which are often not known to the user until after payment, has become a subject of much debate in the courts. Because many of the clickwrap …


Hit And Miss: Leverage, Sacrifice, And Refusal To Deal In The Supreme Court Decision In Trinko, Nicholas Economides Oct 2006

Hit And Miss: Leverage, Sacrifice, And Refusal To Deal In The Supreme Court Decision In Trinko, Nicholas Economides

ExpressO

Under the rules of the Telecommunications Act of 1996, incumbent local exchange carriers, including Verizon, were obligated to lease parts of their local telecommunications network to any firm at “cost plus a reasonable profit” prices which could combine them at will, add retailing services and sell local telecommunication service as a rival to the incumbent. AT&T, an entrant in local telecommunications, leased parts of Verizon’s network. Trinko, a local telecommunications services customer of AT&T, sued Verizon alleging various anti-competitive actions of Verizon against AT&T, including that Verizon raised the costs of AT&T, its downstream retail rival. The Supreme Court held …


Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García Oct 2006

Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García

Bruno L. Costantini García

Ponencia sobre la Ley Federal del Procedimiento Contencioso Administrativo, impartida por Bruno L. Costantini García.


The Measure Of The Doubt: Dissent, Indeterminacy, And Interpretation At The Federal Circuit, Jeffrey A. Lefstin Oct 2006

The Measure Of The Doubt: Dissent, Indeterminacy, And Interpretation At The Federal Circuit, Jeffrey A. Lefstin

ExpressO

The law of patent claim interpretation articulated by the United States Court of Appeals for the Federal Circuit is commonly supposed to be markedly indeterminate, and to be responsible for a lack of certainty and predictability in patent infringement litigation. But there has been no attempt to measure objectively the indeterminacy associated with patent claim interpretation, or, for that matter, of any other field of law. This Article shows that under appropriate conditions the indeterminacy of a legal regime may be measured empirically by the frequency of judicial dissents. Application of this method to the Federal Circuit's jurisprudence demonstrates that …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


When Is Employee Blogging Protected By Section 7 Of The Nlra?, Katherine M. Scott Oct 2006

When Is Employee Blogging Protected By Section 7 Of The Nlra?, Katherine M. Scott

Duke Law & Technology Review

The National Labor Relations Act forbids employers from retaliating against certain types of employee speech or intimidating those who engage in it. This iBrief examines how blogging fits into the current statutory framework and recommends how the National Labor Relations Board and the courts should address the unique features of employee blogs.


Three Reactions To Mgm V. Grokster, Pamela Samuelson Oct 2006

Three Reactions To Mgm V. Grokster, Pamela Samuelson

Michigan Telecommunications & Technology Law Review

It was prescient of the Michigan Telecommunications and Technology Law Review to have organized a conference to discuss the Supreme Court's decision in Metro-Goldwyn-Mayer, Inc. v. Grokster, Inc. As the articles in this issue reveal, commentators have had somewhat mixed reactions to the Grokster decision. Perhaps I am the most mixed (or mixed up) about Grokster among its commentators, for I have had not just one but three reactions to the Grokster decision. My first reaction was to question whether MGM and its co-plaintiffs really won the Grokster case, or at least won it in the way they had hoped. …


File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber Oct 2006

File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber

Michigan Telecommunications & Technology Law Review

Much economic, political, judicial and legal attention has been showered on the significant changes currently taking place within the music production and distribution business forced by the use of the Internet for both file sharing (of unauthorized copyrighted material) and more recent online (legal) music distribution. The strong demand for music, coupled with the low cost of distributing illegal copies via peer-to-peer (P2P) systems, is unraveling the business model by which music has traditionally been created, developed, and distributed. Application of traditional copyright law has been ineffective in stopping the loss of business in the traditional channels. Producers have implemented …


The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher Oct 2006

The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher

Michigan Telecommunications & Technology Law Review

Google's major new initiative is to undertake the task of digitizing the world's collection of books so as to make them searchable. The very idea is audacious, but what is more so is that Google plans to copy without first seeking the permission of the owners of these works. Google Print would make available what is, by conventional measures at least, the highest grade of information--books produced by millions of the world's leading scholars. This is in stark contrast to the inconsistent quality spectrum one encounters through other online sources such as peer-to-peer networks and blogs, where there currently exists …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Oct 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

Michigan Telecommunications & Technology Law Review

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Intellectual Property - Copyright & Internet Law - "The Big Chill": The Supreme Court Adopts An Inducement Standard For Third-Party Copyright Infringement Liability, Leaving Innovation In The Cold Metro-Goldwyn-Mayer Studios, Inc. V. Grokster, Ltd., 125 S. Ct. 2764 (2005)., Darrin Keith Henning Oct 2006

Intellectual Property - Copyright & Internet Law - "The Big Chill": The Supreme Court Adopts An Inducement Standard For Third-Party Copyright Infringement Liability, Leaving Innovation In The Cold Metro-Goldwyn-Mayer Studios, Inc. V. Grokster, Ltd., 125 S. Ct. 2764 (2005)., Darrin Keith Henning

University of Arkansas at Little Rock Law Review

A key feature of an effective copyright system is to provide protection against infringement that is consistent with a copyright's goal: to "promote . . . useful Arts." Thus, for the overall public good, it is vital to achieve a proper balance between protecting authors' works as an incentive to create and the public's interest in accessing both creative works and new technology. The outcome of Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd. (Grosker III) and the resulting business and legal developments created ambiguity and doubt regarding potential liability in the copyright system that is having a deleterious effect on technical …


Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis Oct 2006

Protecting Your Personal Privacy: A Self-Help Guide For Judges And Their Families (2006), Chicago Bar Association’S Privacy Task Force, John Marshall Law School Center For Information Technology & Privacy Law, Leslie Ann Reis

UIC Law White Papers

“I believe that the Internet is a brave new world in the matter of judicial security.” – Testimony of Joan H. Lefkow, United States District Judge, before the Judiciary Committee of the United States Senate (May 18, 2005).

Your personal information may be no farther away than a mouse-click... Your name, locations of your home and workplace, your phone number and email address, details of your family members, your political leanings and many more pieces of information are available through a wide array of public and private sources. But, this is nothing new. Some personal information about you has always …


Copyright's Empire: Why The Law Matters , Alina Ng Sep 2006

Copyright's Empire: Why The Law Matters , Alina Ng

ExpressO

Two separate and distinct movements have colonized research in the field of intellectual property. Law and economics has deepened our understanding of the justification for granting monopoly rights over intellectual property. In recent years, economic theories have been used to support the growth of the commons – the free environment, where intellectual property plays little role in generating new creative works and innovation. The second movement is law and technology that has sought to increase understanding of intellectual property through the exploration of how technologies either provide freedoms or impose limitations to how creative works and innovation are created and …


The Constitutionality Of Wipo’S Broadcasting Treaty: The Originality And Limited Times Requirements Of The Copyright Clause, Adam R. Tarosky Sep 2006

The Constitutionality Of Wipo’S Broadcasting Treaty: The Originality And Limited Times Requirements Of The Copyright Clause, Adam R. Tarosky

Duke Law & Technology Review

Because the proposed WIPO Broadcasting Treaty extends perpetual copyright-like protections to unoriginal information, its implementation would violate at least two fundamental limitations on Congress’s Copyright Clause power: the originality and "limited times" requirements. But Congress has a trump card--the Commerce Clause. This iBrief argues that to give proper effect to the limitations of the Copyright Clause, Congress should not be allowed to implement copyright-like legislation under the less restrictive Commerce Clause.


Decoding Cyberproperty, Francis G. Lastowka Sep 2006

Decoding Cyberproperty, Francis G. Lastowka

ExpressO

This article examines recent developments in both the doctrine and theory of legal cyberproperty rights. The first part of this article looks primarily at two seminal cases that might be considered bookends to the story of cyberproperty: Thrifty-Tel, Inc. v. Bezenek and Intel v. Hamidi. The second part of this article challenges two assumptions that act as theoretical and rhetorical engines driving arguments for cyberproperty. The first is the assumption that legal prohibitions against interactions with privately owned computing machinery are analogous, from a standpoint of law and policy, to traditional rights of exclusion from the use of or entry …


Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang Sep 2006

Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Distance Education In Law School: The Train Has Left The Station, Diana L. Gleason Sep 2006

Distance Education In Law School: The Train Has Left The Station, Diana L. Gleason

ExpressO

Distance Education in Law Schools: The Train has Left the Station posits the idea that law schools are getting left behind a national trend to add distance education to the higher education curriculum to the detriment of legal education and law students. Approximately half the article describes reasons for the growth in distance education in non-law academia, followed by reasons why distance education has not impacted law schools. The remainder of the article discusses three changes taking place that will bring distance education to law schools. Specifically, students expect more, students are seeking a less expensive alternative to the brick …


Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden Sep 2006

Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden

ExpressO

Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.

While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …


Brain Imaging And Privacy: How Recent Advances In Neuroimaging Implicate Privacy Concerns , David P. Finn Sep 2006

Brain Imaging And Privacy: How Recent Advances In Neuroimaging Implicate Privacy Concerns , David P. Finn

ExpressO

This paper deals with recent advances in neuroimaging technologies which could begin to implicate privacy concerns in the near future.


Cash, Credit Or Cell Phone? How To Influence Public Preferences About Payment Systems, Sarah E. Waldeck, Erik Lillquist Sep 2006

Cash, Credit Or Cell Phone? How To Influence Public Preferences About Payment Systems, Sarah E. Waldeck, Erik Lillquist

ExpressO

The paper examines how the government can influence the public’s choice of a particular payment system: not only existing systems like credit and debit cards, but innovative products such as stored value cards, electronic checks and electronic money. The success or failure of a new payment system can have a large economic impact, with shifts toward electronic payment options in particular having the potential to save up to one percent of a nation’s gross domestic product. For the United States, that translates to approximately one hundred billion dollars worth of savings.

Whether a new payment system succeeds or fails depends …


Information Privacy As A Function Of Facial Recognition Technology And Wearable Computers, Woodrow Barfield Sep 2006

Information Privacy As A Function Of Facial Recognition Technology And Wearable Computers, Woodrow Barfield

ExpressO

As technological advances are made in the design of smart sensors, the issue of privacy in public places, first discussed by Warren and Brandeis in 1890, becomes an important topic for law and policy. This paper examines issues of privacy that are impacted when an individual’s image is recorded by a video-based wearable computer, analyzed using facial recognition software, and uploaded to the internet. While the Constitutional basis of search and seizure law for individual’s placed under video surveillance is reviewed, a particular focus of the paper is on a less investigated but emerging area of concern, the video recording …


Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs Sep 2006

Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs

ExpressO

The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …


Cyberstalking, A New Crime: Evaluating The Effectiveness Of Current State And Federal Laws, Naomi Harlin Goodno Sep 2006

Cyberstalking, A New Crime: Evaluating The Effectiveness Of Current State And Federal Laws, Naomi Harlin Goodno

ExpressO

Imagine a distressed woman discovering the following message on the Internet that was falsely attributed to her: “Female International Author, no limits to imagination and fantasies, prefers group macho/sadistic interaction . . . stop by my house at [current address] . . . . Will take calls day or night at [current telephone number] . . . I promise you everything you ever dreamt about. Serious responses only.” This is an example of cyberstalking – which involves the use of the Internet, e-mail, or other means of electronic communication to stalk another individual. Current statistics suggest that tens of thousands …


Anticircumvention And Anti-Anticircumvention, Peter K. Yu Sep 2006

Anticircumvention And Anti-Anticircumvention, Peter K. Yu

Faculty Scholarship

In today's debate on digital rights management systems, there is a considerable divide between the rights holders, their investors and representatives on the one hand and academics, consumer advocates, and civil libertarians on the other. These two groups often talk past each other, concocting their own doomsday scenarios while arguing for laws and policies that vindicate their positions. Unfortunately, neither side has sufficient empirical evidence to either support its position or disprove its rivals'. As the digital economy grows, the debate intensifies, and the divide between the two sides widens. Today, there has emerged an urgent need to find the …


Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck Aug 2006

Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck

ExpressO

The Energy Research Advisory Board, the group of external scientific advisors that provided impartial expert advice to the Secretary of Energy since 1978, was disbanded this May. The Administration, like its predecessors, regularly replaces experts on agency advisory panels with ideologues and political allies. We are at the nadir of a historical progression since World War II away from trust in and use of scientific expertise in policymaking. This shift however, has not been countered with greater public participation. Instead, administrative law and theory have developed a model of the managerial administrative authority. The "expertocratic" agency relies on internal expertise …