Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Copyright

Privacy Law

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 46

Full-Text Articles in Law

Confused About Copyright?, Sara Anne Hook Apr 2023

Confused About Copyright?, Sara Anne Hook

Graduate Scholarship and Professional Work

No abstract provided.


Perlindungan Hukum Terhadap Virtual Model (Cad Files) Untuk 3d Printing Ditinjau Dari Perspektif Hak Cipta Dan Tentang Desain Industri, Gusti Karina Saraswati Jan 2023

Perlindungan Hukum Terhadap Virtual Model (Cad Files) Untuk 3d Printing Ditinjau Dari Perspektif Hak Cipta Dan Tentang Desain Industri, Gusti Karina Saraswati

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The existence of 3D Printing and CAD Files has great potential to conflict with the protection of intellectual property rights, especially copyright and industrial design. It is undeniable that in the future this technology will flourish in Indonesia. 3D Printing can change the market ecosystem where people are not selling products but selling virtual models (CAD Files). This ecosystem will have an impact on designers and companies, so they will try to protect their CAD Files from modification and copying by other parties. The legal problem of this research is to answer the question of the form of protection for …


Pengelolaan Royalti Dari Pencipta Lagu Yang Tidak Terdaftar Di Lembaga Manajemen Kolektif Oleh Lembaga Manajemen Kolektif Nasional, Mohamad Thaufiq Rachman Dec 2022

Pengelolaan Royalti Dari Pencipta Lagu Yang Tidak Terdaftar Di Lembaga Manajemen Kolektif Oleh Lembaga Manajemen Kolektif Nasional, Mohamad Thaufiq Rachman

"Dharmasisya” Jurnal Program Magister Hukum FHUI

Royalty is a reward received by the author or owner of the related right concerning the utilization of their Economic Rights following Article 1 point 21 of Law No. 28, 2014 regarding Copyright ("UUHC 2014"). Royalty could also be interpreted as a form of appreciation for the Author's Works, such as song and/or music. Encouraging the spirit of industry players, including songwriters, is essential for continuous growth. As mentioned in the general explanation section of UUHC 2014, Copyright is the most important basis of the national creative economy. With the fulfillment of the protection and development of this creative economy, …


Perlindungan Hak Cipta Terhadap Penggandaan Permainan Video (Copyright Protection Against Video Game Copying), Ahmad Fajri Wibowo Dec 2022

Perlindungan Hak Cipta Terhadap Penggandaan Permainan Video (Copyright Protection Against Video Game Copying), Ahmad Fajri Wibowo

"Dharmasisya” Jurnal Program Magister Hukum FHUI

Copyright protection provides legal protection to creative industries. One of the creative industries that need to be protected is the video game industry. The development of video games in Indonesia is very fast, therefore legal protection is needed to maintain the development of the video game industry. Basically a video game is an object of creation contained in Law Number 28 of 2014 concerning copyright. In the development of the video game industry, there are problems that occur such as the number of illegal copies of video games. Thus, copyright protection plays a very important role in maintaining the video …


Perlindungan Hukum Atas Ulos Sebagai Ekspresi Budaya Tradisional, Yoshua Ruselvelt P Sidabutar Dec 2022

Perlindungan Hukum Atas Ulos Sebagai Ekspresi Budaya Tradisional, Yoshua Ruselvelt P Sidabutar

"Dharmasisya” Jurnal Program Magister Hukum FHUI

Traditional cultural expressions are a way of life for the Indonesian nation that teaches traditions, wisdom, values, communal knowledge packaged and passed on to posterity through tales, legends, arts and ceremonies which gradually form the social norms and way of life of the Indonesian nation. Indonesia is a country that consists of various tribes and cultures so that it has priceless Traditional Cultural Expressions and really needs to be protected. One form of traditional cultural expression in Indonesia is ulos cloth, which is a fabric product that is known internationally. This research uses juridical-normative legal research, where in collecting writing …


Perlindungan Hak Cipta Atas Konten Webinar Serta Akibat Hukum Merekam Dan Menggungah Konten Webinar Tanpa Persetujuan, Nabila Nabila Dec 2022

Perlindungan Hak Cipta Atas Konten Webinar Serta Akibat Hukum Merekam Dan Menggungah Konten Webinar Tanpa Persetujuan, Nabila Nabila

"Dharmasisya” Jurnal Program Magister Hukum FHUI

The Covid-19 pandemic period has changed the pattern of daily activities from normal to new normal. For example, seminars, which are usually, conducted face-to-face, change to online or what are known as webinars. The legal aspect that is closely related to webinars is the legal aspect of copyright. Organizing online seminars is considered easier because neither the participants nor the speakers need to leave the house to continue carrying out the seminar. Supported by technological developments, this webinar can also be recorded so that participants who are late for the webinar can still know the material presented through the recorded …


Perlindungan Hukum Terhadap Bentuk Fiksasi Dalam Karya Musik Berdasarkan Perkembangan Undang-Undang Hak Cipta, Boy Brian E.S Dec 2022

Perlindungan Hukum Terhadap Bentuk Fiksasi Dalam Karya Musik Berdasarkan Perkembangan Undang-Undang Hak Cipta, Boy Brian E.S

"Dharmasisya” Jurnal Program Magister Hukum FHUI

This journal aims to discuss the protection of copyright law against tapes converted into the form of a sound recording or a tool shaped CD (Compact Disc), in addition it is to discuss how enforcement against violations fixation in a piece of music that is poured into a recording tool so that it can be enjoyed through the CD. This journal will discuss about the forms of piracy which often occur in the field of copyright songs and music. In this journal will be discussed also about violations in the field of copyright songs or music that will be penalized …


Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough Jan 2022

Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough

Canadian Journal of Law and Technology

Widespread computerization and embedded system design has facilitated the pervasive and latent implementation of technological protection measures (‘‘TPMs”) to restrict device firmware access. Often referred to as ‘‘digital locks,” these restrictions impose a whole host of limitations on how owners use and manage the increasing number of products and devices in which they are incorporated. In many cases, TPM restrictions can prevent activities with social, environmental, and economical benefits, including repair, repurposing, and interoperability. In response, governments around the world are now revisiting and scrutinizing their TPM anti-circumvention laws within copyright and competition policy. Beyond these perspectives, this article looks …


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Automation In Moderation, Hannah Bloch-Wehba Mar 2020

Automation In Moderation, Hannah Bloch-Wehba

Faculty Scholarship

This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.

In fact, however, the …


Privative Copyright, Shyamkrishna Balganesh Jan 2020

Privative Copyright, Shyamkrishna Balganesh

All Faculty Scholarship

“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …


Privative Copyright, Shyamkrishna Balganesh Jan 2020

Privative Copyright, Shyamkrishna Balganesh

Vanderbilt Law Review

“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …


Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley Jan 2019

Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley

Fordham Intellectual Property, Media and Entertainment Law Journal

In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …


Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney Jan 2019

Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …


Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal Nov 2018

Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal

Life of the Law School (1993- )

No abstract provided.


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Nov 2017

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Mark Bartholomew

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon Jan 2017

"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon

Faculty Scholarship

This article is part of a series of book excerpts from The Pop Culture Business Handbook for Cons and Festivals, which provides the business, strategy, and legal reference guide for fan conventions, film festivals, musical festivals, and cultural events.Although most events are organized by private parties, the location of these events in public venues and the crowd management issues involving free speech make First Amendment and free speech issues a critical component of event management. This excerpt provides a framework for understanding the legal and security issues involving free speech at public events.


Copyright To The Rescue: Should Copyright Protect Privacy?, Deidre Keller Jan 2017

Copyright To The Rescue: Should Copyright Protect Privacy?, Deidre Keller

Journal Publications

While some courts have held that “[i]t is universally recognized . . . that the protection of privacy is not the function of our copyright law,” the remedies afforded copyright owners make pursuing copyright claims an attractive option to privacy plaintiffs. Copyright remedies include the removal of digital copies from the internet and the destruction of physical copies. The extent to which copyright ought to protect privacy interests has been considered in various jurisdictions recently but has not been treated comprehensively by contemporary legal scholars in the United States. This piece seeks to undertake that treatment.

Part II of this …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


"If That's The Way It Must Be, Okay": Campbell V. Acuff-Rose On Rewind Apr 2016

"If That's The Way It Must Be, Okay": Campbell V. Acuff-Rose On Rewind

Loyola of Los Angeles Entertainment Law Review

The 1994 Supreme Court case Campbell v. Acuff-Rose established broad protections for parody in U.S. copyright law. While the case is well known, the facts behind the case are not. None of the three courts that heard the case were told that the alleged parody by 2 Live Crew appeared only on a “sanitized” version of the group’s controversial album. Thus the work had a heightened commercial purpose: filling up a meager album so that album could serve as a market stopgap for its controversial cousin. Although commercial purpose is a key factor in the fair use calculus, no court …


Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne Jan 2016

Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne

Vanderbilt Journal of Entertainment & Technology Law

The application of big data in different sectors of the economy and its transformative value has recently attracted considerable attention. However, this transformation, driven by the application of advanced technologies that utilize big data—such as the Internet of Things (IoT), artificial intelligence (AI), and software systems—raises concerns about access to and control over the user data that results from the uptake in using digital technologies. This Article examines the role different legal regimes have in framing access to and control over various forms of user data from the perspective of technology users in the agriculture sector. This Article then goes …


Authority And Authors And Codes, Michael J. Madison Jan 2016

Authority And Authors And Codes, Michael J. Madison

Articles

Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …


Copyrights, Privacy, And The Blockchain, Tom W. Bell Dec 2015

Copyrights, Privacy, And The Blockchain, Tom W. Bell

Tom W. Bell

The law of the United States forces authors to choose between copyrights and privacy rights. Federal lawmakers have noticed and tried to remedy that problem. The Copyright Act makes express provisions for anonymous and pseudonymous works. The Copyright Office has tried to remedy that tension, too; copyright registration forms do not outwardly require authors to reveal their real world identities. Nonetheless, authors still face a choice between protecting their privacy and enjoying one of copyright’s most powerful incentives: the prospect of transferring to another the exclusive right to use a copyrighted work. That power proves useful, to say the least, …


Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht Dec 2014

Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht

Touro Law Review

No abstract provided.


Privacy, Copyright, And Letters, Jeffrey Harrison Nov 2014

Privacy, Copyright, And Letters, Jeffrey Harrison

Jeffrey L Harrison

The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …


Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart Apr 2014

Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart

Daxton "Chip" Stewart

Science fiction authors have long projected the future of technology, including communication devices and the way in which future societies may use them. In this essay, these visions of future technology, and their implications on the future of media law and policy, are explored in three areas in particular – copyright, privacy, and the First Amendment. Themes examined include moving toward massively open copyright systems, problems of perpetual surveillance by the state, addressing rights of obscurity in public places threatened by wearable and implantable computing devices, and considering free speech rights of autonomous machines created by humans. In conclusion, the …


Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew Jan 2014

Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew

Journal Articles

There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Jun 2013

Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.