Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Internet Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 271 - 300 of 336

Full-Text Articles in Law

Governing Gambling In The United States, Maria E. Garcia Jan 2010

Governing Gambling In The United States, Maria E. Garcia

CMC Senior Theses

The role risk taking has played in American history has helped shape current legislation concerning gambling. This thesis attempts to explain the discrepancies in legislation regarding distinct forms of gambling. While casinos are heavily regulated by state and federal laws, most statutes dealing with lotteries strive to regulate the activities of other parties instead of those of the lottery institutions. Incidentally, lotteries are the only form of gambling completely managed by the government. It can be inferred that the United States government is more concerned with people exploiting gambling than with the actual practice of wagering.

In an effort to …


The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul Jan 2010

The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul

Canadian Journal of Law and Technology

The issue of the patentability of electromagnetic and acoustic signals has not been litigated in Canada. If, however, the issue does come forward for litigation, Canadian courts may decide differently than their American colleagues did. The Supreme Court of Canada’s ‘Harvard Mouse’ decision shows that the Canadian law on patentable subject matter differs from American law. Under the Canadian definition of manufacture, electromagnetic and acoustic signals could constitute patentable subject matter.


Book Review: E-Discovery In Canada, Robert J. Currie Jan 2010

Book Review: E-Discovery In Canada, Robert J. Currie

Canadian Journal of Law and Technology

It is not hyperbolic to say that the proliferation of electronically stored information (ESI) is probably the most prominent change-harbinger and potential havoc-wreaker in civil litigation today — second only, perhaps, to the spiralling costs of litigation itself. Indeed, the practical and legal difficulties associated with the storage, gathering, preservation, disclosure and evidentiary use of ESI have the potential to act as a Trojan Horse, causing what would previously have been ordinary cases to implode under their weight. Increasing recognition of this is evident; electronic discovery (e-discovery) cases have begun to emerge in the reports, a successful co-operative effort by …


A New Approach To Data Security Breaches, Gideon Emcee Christian Jan 2010

A New Approach To Data Security Breaches, Gideon Emcee Christian

Canadian Journal of Law and Technology

This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …


Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa Jan 2010

Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa

Canadian Journal of Law and Technology

This article considers whether the permissive disclosure provisions of the Personal Information Protection and Electronic Documents Act (PIPEDA) and its substantially similar counterparts mean that law enforcement agents have ready access to information about our movements and activities, or whether s. 8 of the Charter plays a role in limiting the circumstances in which disclosure without notice or consent may take place.


Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley Jan 2010

Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley

Canadian Journal of Law and Technology

For professional “fact-gatherers” such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a smoking gun, depending on your perspective. The personal information contained in a Facebook profile may be highly relevant to matters at issue in litigation; when dealing with claims, particularly in the personal injury context, the information contained on a Facebook page can make or break a case. It is, therefore, crucial that legal and insurance professionals stay informed of new developments in this emerging area of law. This article, written with …


Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef Jan 2010

Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef

Canadian Journal of Law and Technology

It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …


Google Adwords And Canadian Trademark Law, Reed W. Taubner Jan 2010

Google Adwords And Canadian Trademark Law, Reed W. Taubner

Canadian Journal of Law and Technology

This article aims to answer two questions: should business competitors be allowed to use each other’s goodwill in this way and, if so, can trademark law police the program without stifling competition? Part I examines the technical aspects of the AdWords program. Part II explores the underlying rationales of trademark law to start developing a normative position. Part III reviews the American jurisprudence and commentary to hone that normative position and to identify a compatible legal framework. Part IV compares that framework against Canadian law.

This article endorses the work of Misha Gregory Macaw who, unlike some trademark expansionists, argues …


A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon Jan 2010

A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon

SMU Science and Technology Law Review

No abstract provided.


Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser Jan 2010

Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser

Publications

For centuries, the fair use doctrine has been the main--if not the exclusive--bastion of user rights. Originating in the English courts of equity, the doctrine permitted users, under appropriate circumstances, to employ copyrighted content without the rightsholder's consent. In the current digital media environment, however, the uncertainty that shrouds fair use and the proliferation of technological protection measures undermine the doctrine and its role in copyright policy. Notably, the enactment of the Digital Millennium Copyright Act, which prohibits the circumvention of technological protection measures even for fair use purposes, has diminished the ability of fair use to counterbalance a copyright …


Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law: The Singapore Example, Eliza Mik Jan 2010

Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law: The Singapore Example, Eliza Mik

Research Collection Yong Pung How School Of Law

The United Nations Commission on International Trade Law (UNCITRAL) Convention on the Use of Electronic Communications in International Contracts (CUECIC or Convention) was adopted on 23 November 2005. Its essential objective is to establish uniform rules intended to “remove obstacles to the use of electronic communications in international contracts, including obstacles that might result from the operation of existing international trade law instruments, with a view to enhancing legal certainty and commercial predictability.” The Convention relies on the UNCITRAL Model Law on Electronic Commerce (MLEC), which constitutes an e-commerce flagship project dating back to 1995. It also resembles UNCITRAL’s Convention …


Updating The Electronic Transactions Act? Australia's Accession To The Un Convention On The Use Of Electronic Communications In International Contracts 2005, Eliza Karolina Mik Jan 2010

Updating The Electronic Transactions Act? Australia's Accession To The Un Convention On The Use Of Electronic Communications In International Contracts 2005, Eliza Karolina Mik

Research Collection Yong Pung How School Of Law

This article discusses the Australian Government’s proposal to accede to the United Nations Convention on the Use of Electronic Communications in International Contracts as well as certain amendments to existing Australian electronic transactions legislation, i.e. the Electronic Transactions Act (Commonwealth) 1999 (”ETA”) and its state equivalents. Without going into a detailed discussion of all suggested amendments, this article focuses on those recommendations, which affect the area of contract formation, in particular: the use of automated systems in on-line transactions and the determination of the time the contract comes into existence. A critical review of the proposed changes reveals that their …


Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Jan 2010

Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Maryland Law Review

No abstract provided.


Evolving Property Rights In Domain Names, Jeffrey R. Wiedmann Jan 2010

Evolving Property Rights In Domain Names, Jeffrey R. Wiedmann

Student Works

No abstract provided.


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


'Canada' In Electronic Evidence, Steve Coughlan Jan 2010

'Canada' In Electronic Evidence, Steve Coughlan

Articles, Book Chapters, & Popular Press

Canada is a bilingual and bi-jurisdictional country. Most provinces and territories are mainly English speaking and have common law as the basis for their legal system. The exception is the province of Quebec which is governed by civil law and where the majority speaks French. However, it must be noted that Quebec civil law has been substantially affected by common law, in particular with respect to discovery rules. The latter are closer to common law discovery rules than they are from, for instance, French civil law. Another important factor for the review of the management of digital evidence in Canada …


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


Some Optimism About Fair Use And Copyright Law, Michael J. Madison Jan 2010

Some Optimism About Fair Use And Copyright Law, Michael J. Madison

Articles

This short paper reflects on the emergence of codes of best practices in fair use, highlighting both the relationship between the best practices approach and an institutional perspective on copyright and the relationship between the best practices approach and social processes of innovation and creativity.


Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Jan 2010

Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Articles

Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social …


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton Jan 2010

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park Jan 2010

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


The Communications Decency Act And New York Times V. Sullivan: Providing Public Figure Defamation A Home On The Internet, 43 J. Marshall L. Rev. 491 (2010), Chris Williams Jan 2010

The Communications Decency Act And New York Times V. Sullivan: Providing Public Figure Defamation A Home On The Internet, 43 J. Marshall L. Rev. 491 (2010), Chris Williams

UIC Law Review

No abstract provided.


Mending The Gap: The Use Of Common Law To Supplement Virtual Mass Contracts, Floyd Morris Jan 2010

Mending The Gap: The Use Of Common Law To Supplement Virtual Mass Contracts, Floyd Morris

Student Works

No abstract provided.


Recognizing Virtual Property Rights, It's About Time, John S. Chao Jan 2010

Recognizing Virtual Property Rights, It's About Time, John S. Chao

Student Works

No abstract provided.


Defamation Of Second Life Avatars: How The Laws Of First Life People Could Be Invoked, Brian Seguin Jan 2010

Defamation Of Second Life Avatars: How The Laws Of First Life People Could Be Invoked, Brian Seguin

Student Works

No abstract provided.


An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings Jan 2010

An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings

Student Works

No abstract provided.


Overview Of Trademark Issues Presented To Businesses Owners Within Second Life, Ross J. Switkes Jan 2010

Overview Of Trademark Issues Presented To Businesses Owners Within Second Life, Ross J. Switkes

Student Works

No abstract provided.


Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton Jan 2010

Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton

Articles

The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …


Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis Jan 2010

Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis

Vanderbilt Journal of Entertainment & Technology Law

Google Books will likely become the world's most extensive book and magazine search and browsing resource, library, and bookstore--combined. However, as users necessarily reveal personal identifying information through their book searches and reading habits, this service poses a significant threat to personal privacy.

Because the Google Books Amended Settlement Agreement neglects to meaningfully address user privacy, the only available privacy protections are the limited rights bestowed by the Google Books Privacy Policy and the Google Privacy Policy. Unfortunately, these Privacy Policies protect the interests of Google at the expense of users.

The enactment of federal privacy statutes, which include provisions …