Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (74)
- Selected Works (40)
- Schulich School of Law, Dalhousie University (24)
- SelectedWorks (24)
- UIC School of Law (23)
-
- Maurer School of Law: Indiana University (21)
- University of Maryland Francis King Carey School of Law (13)
- University of Pittsburgh School of Law (12)
- University of Richmond (12)
- Seton Hall University (11)
- University of Michigan Law School (7)
- Duke Law (6)
- Singapore Management University (6)
- Georgetown University Law Center (5)
- Boston University School of Law (4)
- University of Colorado Law School (4)
- Vanderbilt University Law School (4)
- Cornell University Law School (3)
- University of Dayton (3)
- American University Washington College of Law (2)
- Boise State University (2)
- Chicago-Kent College of Law (2)
- Columbia Law School (2)
- New York Law School (2)
- University of Kentucky (2)
- University of Missouri School of Law (2)
- University of Nevada, Las Vegas (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Washington School of Law (2)
- Keyword
-
- Google (58)
- Adwords (48)
- Rosetta Stone (31)
- Internet (25)
- Trademark (24)
-
- Copyright (16)
- Consumer confusion (14)
- Rosetta (13)
- Information privacy (10)
- Intellectual property (10)
- Social media (10)
- Keyword (9)
- Counterfeit (8)
- Cyberspace Law (8)
- Privacy (8)
- Technology (8)
- Internet Governance (7)
- Regulation (7)
- Software (7)
- Trademarked terms (7)
- Cyberlaw (6)
- First Amendment (6)
- Law and Technology (6)
- Trademark infringement (6)
- Web 2.0 (6)
- Civil rights (5)
- Constitutional law (5)
- Cyberspace (5)
- Cyberspace law (5)
- DMCA (5)
- Publication
-
- Rosetta Stone v. Google (Joint Appendix) (73)
- Canadian Journal of Law and Technology (23)
- Federal Communications Law Journal (20)
- UIC John Marshall Journal of Information Technology & Privacy Law (17)
- Faculty Scholarship (16)
-
- Student Works (11)
- Articles (10)
- Henry L Hu (9)
- Mubashshir Sarshar (9)
- Richmond Journal of Law & Technology (9)
- Danielle Keats Citron (8)
- Daniel Lyons (6)
- Duke Law & Technology Review (6)
- Research Collection Yong Pung How School Of Law (6)
- Bruno L. Costantini García (5)
- All Faculty Scholarship (4)
- Publications (4)
- Cornell Law Faculty Publications (3)
- Faculty Publications (3)
- Maryland Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Testimony Before Congress (3)
- UIC Review of Intellectual Property Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Book Chapters (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Germán M. Teruel Lozano (2)
- James Grimmelmann (2)
- Kentucky Law Journal (2)
- Law Student Publications (2)
- Publication Type
- File Type
Articles 271 - 300 of 336
Full-Text Articles in Law
Governing Gambling In The United States, Maria E. Garcia
Governing Gambling In The United States, Maria E. Garcia
CMC Senior Theses
The role risk taking has played in American history has helped shape current legislation concerning gambling. This thesis attempts to explain the discrepancies in legislation regarding distinct forms of gambling. While casinos are heavily regulated by state and federal laws, most statutes dealing with lotteries strive to regulate the activities of other parties instead of those of the lottery institutions. Incidentally, lotteries are the only form of gambling completely managed by the government. It can be inferred that the United States government is more concerned with people exploiting gambling than with the actual practice of wagering.
In an effort to …
The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul
The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul
Canadian Journal of Law and Technology
The issue of the patentability of electromagnetic and acoustic signals has not been litigated in Canada. If, however, the issue does come forward for litigation, Canadian courts may decide differently than their American colleagues did. The Supreme Court of Canada’s ‘Harvard Mouse’ decision shows that the Canadian law on patentable subject matter differs from American law. Under the Canadian definition of manufacture, electromagnetic and acoustic signals could constitute patentable subject matter.
Book Review: E-Discovery In Canada, Robert J. Currie
Book Review: E-Discovery In Canada, Robert J. Currie
Canadian Journal of Law and Technology
It is not hyperbolic to say that the proliferation of electronically stored information (ESI) is probably the most prominent change-harbinger and potential havoc-wreaker in civil litigation today — second only, perhaps, to the spiralling costs of litigation itself. Indeed, the practical and legal difficulties associated with the storage, gathering, preservation, disclosure and evidentiary use of ESI have the potential to act as a Trojan Horse, causing what would previously have been ordinary cases to implode under their weight. Increasing recognition of this is evident; electronic discovery (e-discovery) cases have begun to emerge in the reports, a successful co-operative effort by …
A New Approach To Data Security Breaches, Gideon Emcee Christian
A New Approach To Data Security Breaches, Gideon Emcee Christian
Canadian Journal of Law and Technology
This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …
Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa
Information Privacy In Public Space: Location Data, Data Protection And The Reasonable Expectation Of Privacy, Teresa Scassa
Canadian Journal of Law and Technology
This article considers whether the permissive disclosure provisions of the Personal Information Protection and Electronic Documents Act (PIPEDA) and its substantially similar counterparts mean that law enforcement agents have ready access to information about our movements and activities, or whether s. 8 of the Charter plays a role in limiting the circumstances in which disclosure without notice or consent may take place.
Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley
Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley
Canadian Journal of Law and Technology
For professional “fact-gatherers” such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a smoking gun, depending on your perspective. The personal information contained in a Facebook profile may be highly relevant to matters at issue in litigation; when dealing with claims, particularly in the personal injury context, the information contained on a Facebook page can make or break a case. It is, therefore, crucial that legal and insurance professionals stay informed of new developments in this emerging area of law. This article, written with …
Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef
Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef
Canadian Journal of Law and Technology
It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …
Google Adwords And Canadian Trademark Law, Reed W. Taubner
Google Adwords And Canadian Trademark Law, Reed W. Taubner
Canadian Journal of Law and Technology
This article aims to answer two questions: should business competitors be allowed to use each other’s goodwill in this way and, if so, can trademark law police the program without stifling competition? Part I examines the technical aspects of the AdWords program. Part II explores the underlying rationales of trademark law to start developing a normative position. Part III reviews the American jurisprudence and commentary to hone that normative position and to identify a compatible legal framework. Part IV compares that framework against Canadian law.
This article endorses the work of Misha Gregory Macaw who, unlike some trademark expansionists, argues …
A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon
A Hole In The Need Of Mending: Copyright And The Individual Marking Of Advertisements Published In Collective Works, Randy Gordon
SMU Science and Technology Law Review
No abstract provided.
Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser
Beyond Fair Use, Gideon Parchomovsky, Philip J. Weiser
Publications
For centuries, the fair use doctrine has been the main--if not the exclusive--bastion of user rights. Originating in the English courts of equity, the doctrine permitted users, under appropriate circumstances, to employ copyrighted content without the rightsholder's consent. In the current digital media environment, however, the uncertainty that shrouds fair use and the proliferation of technological protection measures undermine the doctrine and its role in copyright policy. Notably, the enactment of the Digital Millennium Copyright Act, which prohibits the circumvention of technological protection measures even for fair use purposes, has diminished the ability of fair use to counterbalance a copyright …
Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law: The Singapore Example, Eliza Mik
Research Collection Yong Pung How School Of Law
The United Nations Commission on International Trade Law (UNCITRAL) Convention on the Use of Electronic Communications in International Contracts (CUECIC or Convention) was adopted on 23 November 2005. Its essential objective is to establish uniform rules intended to “remove obstacles to the use of electronic communications in international contracts, including obstacles that might result from the operation of existing international trade law instruments, with a view to enhancing legal certainty and commercial predictability.” The Convention relies on the UNCITRAL Model Law on Electronic Commerce (MLEC), which constitutes an e-commerce flagship project dating back to 1995. It also resembles UNCITRAL’s Convention …
Updating The Electronic Transactions Act? Australia's Accession To The Un Convention On The Use Of Electronic Communications In International Contracts 2005, Eliza Karolina Mik
Updating The Electronic Transactions Act? Australia's Accession To The Un Convention On The Use Of Electronic Communications In International Contracts 2005, Eliza Karolina Mik
Research Collection Yong Pung How School Of Law
This article discusses the Australian Government’s proposal to accede to the United Nations Convention on the Use of Electronic Communications in International Contracts as well as certain amendments to existing Australian electronic transactions legislation, i.e. the Electronic Transactions Act (Commonwealth) 1999 (”ETA”) and its state equivalents. Without going into a detailed discussion of all suggested amendments, this article focuses on those recommendations, which affect the area of contract formation, in particular: the use of automated systems in on-line transactions and the determination of the time the contract comes into existence. A critical review of the proposed changes reveals that their …
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Maryland Law Review
No abstract provided.
Evolving Property Rights In Domain Names, Jeffrey R. Wiedmann
Evolving Property Rights In Domain Names, Jeffrey R. Wiedmann
Student Works
No abstract provided.
Government Speech 2.0, Danielle K. Citron, Helen Norton
Government Speech 2.0, Danielle K. Citron, Helen Norton
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
'Canada' In Electronic Evidence, Steve Coughlan
'Canada' In Electronic Evidence, Steve Coughlan
Articles, Book Chapters, & Popular Press
Canada is a bilingual and bi-jurisdictional country. Most provinces and territories are mainly English speaking and have common law as the basis for their legal system. The exception is the province of Quebec which is governed by civil law and where the majority speaks French. However, it must be noted that Quebec civil law has been substantially affected by common law, in particular with respect to discovery rules. The latter are closer to common law discovery rules than they are from, for instance, French civil law. Another important factor for the review of the management of digital evidence in Canada …
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Faculty Scholarship
For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).
The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …
Some Optimism About Fair Use And Copyright Law, Michael J. Madison
Some Optimism About Fair Use And Copyright Law, Michael J. Madison
Articles
This short paper reflects on the emergence of codes of best practices in fair use, highlighting both the relationship between the best practices approach and an institutional perspective on copyright and the relationship between the best practices approach and social processes of innovation and creativity.
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Articles
Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social …
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Articles
“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Publications
In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).
Citing the scholarship that has criticized the third-party …
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Management Faculty Publications and Presentations
Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.
The Communications Decency Act And New York Times V. Sullivan: Providing Public Figure Defamation A Home On The Internet, 43 J. Marshall L. Rev. 491 (2010), Chris Williams
UIC Law Review
No abstract provided.
Mending The Gap: The Use Of Common Law To Supplement Virtual Mass Contracts, Floyd Morris
Mending The Gap: The Use Of Common Law To Supplement Virtual Mass Contracts, Floyd Morris
Student Works
No abstract provided.
Recognizing Virtual Property Rights, It's About Time, John S. Chao
Recognizing Virtual Property Rights, It's About Time, John S. Chao
Student Works
No abstract provided.
Defamation Of Second Life Avatars: How The Laws Of First Life People Could Be Invoked, Brian Seguin
Defamation Of Second Life Avatars: How The Laws Of First Life People Could Be Invoked, Brian Seguin
Student Works
No abstract provided.
An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings
An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings
Student Works
No abstract provided.
Overview Of Trademark Issues Presented To Businesses Owners Within Second Life, Ross J. Switkes
Overview Of Trademark Issues Presented To Businesses Owners Within Second Life, Ross J. Switkes
Student Works
No abstract provided.
Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton
Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton
Articles
The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …
Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis
Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis
Vanderbilt Journal of Entertainment & Technology Law
Google Books will likely become the world's most extensive book and magazine search and browsing resource, library, and bookstore--combined. However, as users necessarily reveal personal identifying information through their book searches and reading habits, this service poses a significant threat to personal privacy.
Because the Google Books Amended Settlement Agreement neglects to meaningfully address user privacy, the only available privacy protections are the limited rights bestowed by the Google Books Privacy Policy and the Google Privacy Policy. Unfortunately, these Privacy Policies protect the interests of Google at the expense of users.
The enactment of federal privacy statutes, which include provisions …