Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García Nov 2010

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García

Bruno L. Costantini García

De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …


A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer Sep 2010

A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer

Matthew Rimmer

This essay provides a critical assessment of the Fair Use Project based at the Stanford Center for Internet and Society. In evaluating the efficacy of the Fair Use Project, it is worthwhile considering the litigation that the group has been involved in, and evaluating its performance. Part 1 outlines the history of the Stanford Center for Internet and Society, and the aims and objectives of the Fair Use Project. Part 2 considers the litigation in Shloss v. Sweeney over a biography concerning Lucia Joyce, the daughter of the avant-garde literary great, James Joyce. Part 3 examines the dispute over the …


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García Jul 2010

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García Jun 2010

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas May 2010

New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

On 25 November 2009, the European Parliament and Council adopted a new legislation to revise the regulatory framework for the electronic communications sector. This new “package” of Directives includes Directive 2009/136/EC, which amends earlier Directive 2002/58/EC in the fields of 1. mandatory notification of personal data security breaches 2. consent requirements for cookies and 3. anti-spamming measures by ISPs. The scope of the Directive is to enhance the protection of consumers privacy and personal data in the electronic communications sector, through strengthened security-related provisions and improved enforcement mechanisms by the NRAs. In particular Τhe provisions of the new directive require …


The World Of Bits, Andrew D. Murray May 2010

The World Of Bits, Andrew D. Murray

Professor Andrew D Murray

This is Chapter One of my forthcoming book Information Technology Law: The Law and Society to be published by Oxford University Press in May 2010. It is made available as a limited preview.


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez Apr 2010

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Derecho De La Seguridad Social En México, Bruno L. Costantini García Feb 2010

Derecho De La Seguridad Social En México, Bruno L. Costantini García

Bruno L. Costantini García

Breve presentación del Derecho de la Segurida Social en México.

¿Qué es?

¿Cómo funciona?

¿Su aplicación?


The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer Jan 2010

The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer

Matthew Rimmer

After much hue and cry, the Copenhagen negotiations over intellectual property and climate change ended in a stalemate and an impasse. There was a gulf between the views of intellectual property maximalists who demanded strong protection of intellectual property rights in respect of clean technologies; and nation states and civil society groups calling for special measures to facilitate technology transfer. As a result, the Copenhagen Accord did contain any text on intellectual property and climate change. Nonetheless, the Copenhagen Accord does, though, contain an important compromise. The text provides for a technology mechanism, which envisages a network of Climate Innovation …


Legal Processing Outsourcing: Is The Lack Of A Regulatory Framework One Of The Challenges Facing The Lpo Industry In India?, Mubashshir Sarshar Jan 2010

Legal Processing Outsourcing: Is The Lack Of A Regulatory Framework One Of The Challenges Facing The Lpo Industry In India?, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Case Study: 1950-1970 Section- 6, The Transfer Of Property Act, 1882, Mubashshir Sarshar Jan 2010

Case Study: 1950-1970 Section- 6, The Transfer Of Property Act, 1882, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Amartya Sen's Theory Of Poverty, Mubashshir Sarshar Jan 2010

Amartya Sen's Theory Of Poverty, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Professional Communication And Confidential Communication, Mubashshir Sarshar Jan 2010

Professional Communication And Confidential Communication, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Sociological Study Of Children (Pledging Of Labour) Act, 1933, Mubashshir Sarshar Jan 2010

Sociological Study Of Children (Pledging Of Labour) Act, 1933, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Hindu Religious And Charitable Endowments, Mubashshir Sarshar Jan 2010

Hindu Religious And Charitable Endowments, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


The Doctrine Of Proportionality, Mubashshir Sarshar Jan 2010

The Doctrine Of Proportionality, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


C.P.C., 1908 Order Xx (Rules 10-20): A Case Study 1990-2010(July), Mubashshir Sarshar Jan 2010

C.P.C., 1908 Order Xx (Rules 10-20): A Case Study 1990-2010(July), Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Patriarchy- The Indian Experience, Mubashshir Sarshar Jan 2010

Patriarchy- The Indian Experience, Mubashshir Sarshar

Mubashshir Sarshar

No abstract provided.


Civil Procedures For A World Of Shared And User-Generated Content, Ira Nathenson Jan 2010

Civil Procedures For A World Of Shared And User-Generated Content, Ira Nathenson

Ira Steven Nathenson

Scholars often focus on the substance of copyrights as opposed to the procedures used to enforce them. Yet copyright enforcement procedures are at the root of significant overreach and deserve greater attention in academic literature. This Article explores three types of private enforcement procedures: direct enforcement (cease-and-desist practice); indirect enforcement (DMCA takedowns); and automated enforcement (YouTube’s Content ID filtering program). Such procedures can produce a “substance-procedure-substance” feedback loop that causes significant de facto overextensions of copyrights, particularly against those creating and sharing User-Generated Content (UGC). To avoid this feedback, the Article proposes descriptive and normative frameworks aimed towards the creation …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


Fixing Ram Copies, Aaron K. Perzanowski Jan 2010

Fixing Ram Copies, Aaron K. Perzanowski

Aaron K. Perzanowski

Scholars, litigants, and courts have debated the status of so-called “RAM copies” - instantiations of copyrighted works in the random access memory of computing devices - for decades. The Second Circuit’s decision in Cartoon Network v. CSC Holdings has recently reignited the controversy over these putative copies. There the court held that CSC did not create copies within the meaning of the Copyright Act when it buffered fleeting segments of television programs. In many respects, the Second Circuit’s holding is a straightforward application of the Act’s nested definitions of “copies” and “fixed.” But because the court declined to apply the …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …


An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson Jan 2010

An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson

Gregory M Dickinson

Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.

This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …