Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Internet

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 67

Full-Text Articles in Law

Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan Dec 2007

Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan

Federal Communications Law Journal

The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.


Performance Anxiety: The Internet And Copyright's Vanishing Performance/Distribution Distinction, Jonah M. Knobler Nov 2007

Performance Anxiety: The Internet And Copyright's Vanishing Performance/Distribution Distinction, Jonah M. Knobler

Jonah M. Knobler

This article attempts to answer two related questions on the subject of copyright law in the Internet age: First: Under present U.S. copyright law, does the delivery of a digital music file over the Internet as a “download” necessarily implicate the copyright holder’s right of public performance, above and beyond the obviously implicated rights of distribution and reproduction, as the music industry claims it does? This article examines the recent decision in United States v. ASCAP (S.D.N.Y. 2007), which held that it does not. The article also independently applies the major techniques of statutory interpretation to the relevant portions of …


Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono Nov 2007

Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono

San Diego International Law Journal

Part I of this comment will examine the history and application of freedom of expression in Japanese case law and the evolution of the public welfare concept and its circumscribing effect on individual freedoms. Part II will explore the recent local regulatory efforts and the historical underpinnings for these laws that place restrictions on materials to children. Part III will compare the Japanese legislative endeavors with their American counterparts and highlight the reasons why United States laws will continue to be struck down by courts. Part IV will analyze the response of the video game industry to the onslaught of …


Net Neutrality: An International Policy For The United States, Frederick W. Pfister Nov 2007

Net Neutrality: An International Policy For The United States, Frederick W. Pfister

San Diego International Law Journal

Consider this scenario: Alex and John still are avid video game players and play hours a day, each connecting from the same town through different ISPs. However, since it is a peak Internet traffic time, it may be difficult for them to play. While Alex has the "Diamond" package from his ISP that ensures he has guaranteed high-bandwidth connection, John's ISP does not offer anything other than regular residential service. John must compete with everyone else in his local area for bandwidth, including a few who constantly watch high-definition video-on-demand and subsequently constrain bandwidth for other users. Would it not …


Towards A Functional Definition Of Publication In Copyright Law, Thomas F. Cotter Sep 2007

Towards A Functional Definition Of Publication In Copyright Law, Thomas F. Cotter

Thomas F. Cotter

The questions of whether, when, and where an author has “published” her work of authorship traditionally has given rise to, and continues to give rise to, numerous consequences, including the protectability of the work under U.S. copyright law; the running of various time periods, including a grace period for registering the copyright and the termination of copyright in works made for hire; the applicability of fair use and other exceptions to copyright liability; and the imposition of the duty to deposit two copies of the work with the Library of Congress. Although the 1976 Copyright Act, unlike its predecessors, includes …


Internet Packet Sniffing And Its Impact On The Balance Of Power , Robert M. Frieden Aug 2007

Internet Packet Sniffing And Its Impact On The Balance Of Power , Robert M. Frieden

Rob Frieden

Internet Packet Sniffing and Its Impact on the Balance of Power Between Intellectual Property Creators and Consumers Rob Frieden Professor, Penn State University 102 Carnegie Building University Park, Pennsylvania 16802 (814) 863-7996; rmf5@psu.edu web site: http://www.personal.psu.edu/faculty/r/m/rmf5/ Previously Internet Service Providers (“ISPs”) had little incentive or technological capability to deviate from plain vanilla best efforts routing for content without examining the nature and type of traffic. Serving as a neutral conduit also provided the means to qualify for a safe harbor exemption from liability for carrying copyright infringing traffic provided by Section 512 of the Digital Millennium Copyright Act. Operators of …


Neither Fish Nor Fowl: New Strategies For Selective Regulation Of Information Services, Robert M. Frieden Aug 2007

Neither Fish Nor Fowl: New Strategies For Selective Regulation Of Information Services, Robert M. Frieden

Rob Frieden

Neither Fish Nor Fowl: New Strategies for Selective Regulation of Information Services Rob Frieden Professor, Penn State University 102 Carnegie Building University Park, Pennsylvania 16802 (814) 863-7996; rmf5@psu.edu web site: http://www.personal.psu.edu/faculty/r/m/rmf5/ The Federal Communications Commission (“FCC”) has created a dichotomy between telecommunications and information services with an eye toward limiting traditional common carrier regulation to the former category. This regulatory dichotomy provides the basis for exempting most Internet-mediated services from traditional telephony regulation that requires carriers to provide nondiscriminatory network interconnection even with competitors. To support its deregulatory mission the FCC has found ways to subordinate the telecommunications components in …


The Public Network, Thomas B. Nachbar Aug 2007

The Public Network, Thomas B. Nachbar

Thomas B Nachbar

This article addresses the timely yet persistent question of how best to regulate access to telecommunications networks. Concerns that private firms may use their ownership of communications networks to their own economic advantage has led many to propose restrictions, variously referred to as “network neutrality” or “open access” proposals, on network operators. To date, the network neutrality debate has focused almost exclusively on economic arguments for or against such regulation. Taking a step back from current debates, this paper seeks to derive from established law the accepted bases for imposing nondiscrimination rules and then to work forward to ask whether …


Slides: Meaningful Engagement: The Public's Role In Resource Decisions, Mark Squillace Jun 2007

Slides: Meaningful Engagement: The Public's Role In Resource Decisions, Mark Squillace

The Future of Natural Resources Law and Policy (Summer Conference, June 6-8)

Presenter: Mark Squillace, Director, Natural Resources Law Center, University of Colorado Law School

22 slides


Online Postings Can Be Nightmare For Recruits: In Acting On Google Search Results, However, Law Firms Should Proceed With Caution, Michael D. Mann Jun 2007

Online Postings Can Be Nightmare For Recruits: In Acting On Google Search Results, However, Law Firms Should Proceed With Caution, Michael D. Mann

Michael D. Mann

No abstract provided.


Google Your Applicants: Prospective Employers Are Increasingly Vetting Candidates' Web Pages, Michael D. Mann Jun 2007

Google Your Applicants: Prospective Employers Are Increasingly Vetting Candidates' Web Pages, Michael D. Mann

Michael D. Mann

No abstract provided.


Who Controls The Internet? A Review, Deborah J. Salons Jun 2007

Who Controls The Internet? A Review, Deborah J. Salons

Federal Communications Law Journal

Book Review: Who Controls the Internet? Illusions of a Borderless World, Jack Goldsmith and Tim Wu, Oxford University Press 2006.

Ms. Salons reviews Who Controls the Internet? Illusions of a Borderless World, Oxford University Press, 2006. Authored by Jack Goldsmith and Tim Wu, the book provides a history of the Internet and analyzes the nexus between globalization and government coercion. The book focuses on how these agents have shaped and developed the Internet as we are familiar with it today.


Bosley Medical Institute V. Kremer: The Winds Shift To Protect Cybergripers And A Circuit Split Blows Into Town, Anita Bhushan Jun 2007

Bosley Medical Institute V. Kremer: The Winds Shift To Protect Cybergripers And A Circuit Split Blows Into Town, Anita Bhushan

Georgia State University Law Review

No abstract provided.


Some Job Hunters Are What They Post, Michael D. Mann Apr 2007

Some Job Hunters Are What They Post, Michael D. Mann

Michael D. Mann

Plug a prospective employee's name into an Internet search engine, and you might be surprised at what you find. Web pages may tell hiring attorneys that the person they just interviewed wrote for an undergraduate newspaper or belonged to a specific sorority, but the Web may also reveal the recent interviewee's drink of choice and dating status. Law firms can use the Internet for their own recruiting needs, says attorney Michael D. Mann, but they should take what they read on the Web with a grain of salt.


Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


On Virtual Worlds: Copyright And Contract Law At The Dawn Of The Virtual Age, Erez Reuveni Apr 2007

On Virtual Worlds: Copyright And Contract Law At The Dawn Of The Virtual Age, Erez Reuveni

Indiana Law Journal

This Article argues that copyright law can and should apply to artistic and literary creations occurring entirely in virtual worlds. First, the Article introduces the concept of virtual worlds as places millions of people visit not only for entertainment but also for life and work. Second, the Article reviews the philosophical justifications for copyright, examines objections to applying copyright to virtual, rather than real, creative works, and concludes that neither precludes copyright for virtual creations. Third, the Article articulates how copyright law would function within virtual spaces and reviews copyrightable creations from the perspective of both game developers and players. …


The Anarchist In The Coffee House: A Brief Consideration Of Local Culture, The Free Culture Movement, And Prospects For A Global Public Sphere, Siva Vaidhyanathan Apr 2007

The Anarchist In The Coffee House: A Brief Consideration Of Local Culture, The Free Culture Movement, And Prospects For A Global Public Sphere, Siva Vaidhyanathan

Law and Contemporary Problems

Jürgen Habermas' influential historical work, The Structural Transformation of the Public Sphere, describes a moment in the social and political history of Europe in which a rising bourgeoisie was able to gather in salons and cafes to discuss matters of public concern. The public sphere represented a set of sites and conventions in the eighteenth century in which (almost exclusively male) members of the bourgeoisie could forge a third space to mediate between domestic concerns and matters of state. Here, Vaidhyanathan examines one particular Public Sphere experiment--the rise of a global Free Culture Movement that aims to limit the spread …


The Telecommunications Act And Statutory Interpretation: National Cable & Telecommunications Association V. Brand X Internet Services, Mark B. Grebel Mar 2007

The Telecommunications Act And Statutory Interpretation: National Cable & Telecommunications Association V. Brand X Internet Services, Mark B. Grebel

Saint Louis University Law Journal

No abstract provided.


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton Mar 2007

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton

Jacqueline D Lipton

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton Mar 2007

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton

Jacqueline D Lipton

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


To Mark Or Not To Mark: Application Of The Patent Marking Statute To Websites And The Internet , Eugene Goryunov, Mark V. Polyakov Mar 2007

To Mark Or Not To Mark: Application Of The Patent Marking Statute To Websites And The Internet , Eugene Goryunov, Mark V. Polyakov

Mark V Polyakov

The Marking Statute expressly limits the patent owner’s recovery of damages if the patent owner itself, anyone making, offering for sale, or selling failed to mark its patented invention, sold within the United States, with the associated patent number. In these cases, damages must be limited to those that accrue after the infringer is provided actual notice of infringement. The authors suggest that, in light of relevant jurisprudence and the purpose of the Marking Statute, owners of patents that are directed to any business activities on the Internet should mark their own websites, and require their licensees to mark their …


Dude, Where's My Wine? The Potential Effect Of Granholm V. Heald On Georgia Direct Wine Shipment Regulations, Shri M. Abhyankar Mar 2007

Dude, Where's My Wine? The Potential Effect Of Granholm V. Heald On Georgia Direct Wine Shipment Regulations, Shri M. Abhyankar

Georgia State University Law Review

No abstract provided.


Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes Feb 2007

Online Privacy Policies: Contracting Away Control Over Personal Information?, Allyson W. Haynes

Allyson Haynes Stuart

Individuals disclose personal information to websites in the course of everyday transactions. The treatment of that personal information is of great importance, as highlighted by the recent spate of data breaches and the surge in identity theft. When websites share such personal information with third parties, the threat of its use for illegal purposes increases. The current law allows website companies to protect themselves from liability for sharing or selling visitors’ personal information to third parties by focusing on disclosures in privacy policies, not on substantive treatment of personal information. Because of the low likelihood that a visitor will read …


Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden Feb 2007

Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden

ExpressO

What Internet Service Providers (“ISPs”) can and cannot do to diversify services lies at the core of the debate over network neutrality. In prior generations ISPs had little incentive or technological capability to deviate from plain vanilla best efforts routing for content providers and from standard “all you can eat” subscription terms for consumer access to the World Wide Web. The next generation Internet has the technological capability and ISPs have the commercial motivation to offer “better than best efforts” routing and premium services for both content providers and consumers seeking higher quality of service and more reliable traffic delivery. …


Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias Jan 2007

Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias

ExpressO

The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.

Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.

Despite accelerating technological …


Protecting The New Face Of Entrepreneurship: Online Appropriate Dispute Resolution And International Consumer-To-Consumer Online Transactions, Ivonnely Colón-Fung Jan 2007

Protecting The New Face Of Entrepreneurship: Online Appropriate Dispute Resolution And International Consumer-To-Consumer Online Transactions, Ivonnely Colón-Fung

Fordham Journal of Corporate & Financial Law

No abstract provided.


Copyright And Youtube: Pirate's Playground Or Fair Use Forum?, Kurt Hunt Jan 2007

Copyright And Youtube: Pirate's Playground Or Fair Use Forum?, Kurt Hunt

Michigan Telecommunications & Technology Law Review

The entertainment industry has a history of framing new technology as piracy that threatens its very existence, regardless of the potential benefits of the technology or the legal limits of copyright rights. In the case of YouTube, copyright owners' attempts to retain content control negatively impact the public's ability to discuss culture in an online world. This implicates the basic policy behind fair use: to prevent copyright law from "stifl[ing] the very creativity which that law is designed to foster." The internet has become a powerful medium for expression. It is a vital tool in today's world for sharing original …


Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini Jan 2007

Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini

Michigan Telecommunications & Technology Law Review

As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …