Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Communicating Entitlements: Property And The Internet, William Hubbard Apr 2004

Communicating Entitlements: Property And The Internet, William Hubbard

All Faculty Scholarship

No abstract provided.


Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll Jan 2004

Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Many participants in the music industry consider unauthorized transmissions of music files over the Internet to be theft of their property. Many Internet users who exchange music files reject this characterization. Prompted by the dispute over unauthorized music distribution, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing music making in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some …


The Hegemony Of The Copyright Treatise, Ann Bartow Jan 2004

The Hegemony Of The Copyright Treatise, Ann Bartow

Law Faculty Scholarship

This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.

Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …


Where Does Creativity Come From? And Other Stories Of Copyright, Michael J. Madison Jan 2004

Where Does Creativity Come From? And Other Stories Of Copyright, Michael J. Madison

Articles

This Commentary on Lydia Pallas Loren, Untangling the Web of Music Copyrights, 53 Case W. Res. L. Rev. 673 (2003), observes that debates over a variety of copyright law issues can be - and in fact, often are - structured in narrative terms, rather than in terms of doctrine, policy, or empirical inquiry. I suggest a series of such narratives, each framed by a theme drawn from a feature film. The Commentary suggests that we should recognize more clearly the role of narrative in intellectual property discourse, and that intellectual property narratives should be examined critically.


A Pattern-Oriented Approach To Fair Use, Michael J. Madison Jan 2004

A Pattern-Oriented Approach To Fair Use, Michael J. Madison

Articles

More than 150 years into development of the doctrine of "fair use" in American copyright law, there is no end to legislative, judicial, and academic efforts to rationalize the doctrine. Its codification in the 1976 Copyright Act appears to have contributed to its fragmentation, rather than to its coherence. This Article suggests that fair use is neither badly conceived nor badly applied, but that it is too often badly understood. As did much of copyright law, fair use originated as a judicially-unacknowledged effort via the law to validate certain favored social practices and patterns. In the main, it has continued …


Defending Cyberproperty, Patricia L. Bellia Jan 2004

Defending Cyberproperty, Patricia L. Bellia

Journal Articles

This Article explores how the law should treat legal claims by owners of Internet-connected computer systems to enjoin unwanted uses of their systems. Over the last few years, this question has become increasingly urgent and controversial, as system owners have sought protection from unsolicited commercial e-mail and from robots that extract data from Web servers for competitive purposes. In the late 1990s and early 2000s, courts utilizing a wide range of legal doctrines upheld claims by network resource owners to prevent unwanted access to their computer networks. The vast weight of legal scholarship has voiced strong opposition to these cyberproperty …