Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (13)
- Universitas Indonesia (6)
- Selected Works (5)
- University of Pennsylvania Carey Law School (3)
- Vanderbilt University Law School (3)
-
- Butler University (1)
- Chicago-Kent College of Law (1)
- Florida A&M University College of Law (1)
- Fordham Law School (1)
- Loyola Marymount University and Loyola Law School (1)
- New York Law School (1)
- Nova Southeastern University (1)
- Penn State Dickinson Law (1)
- Roger Williams University (1)
- Texas A&M University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University at Buffalo School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Pittsburgh School of Law (1)
- Publication Year
- Publication
-
- Canadian Journal of Law and Technology (10)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (6)
- All Faculty Scholarship (3)
- Articles, Book Chapters, & Popular Press (3)
- Faculty Scholarship (2)
-
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Articles (1)
- Chicago-Kent Law Review (1)
- Daxton "Chip" Stewart (1)
- Dickinson Law Review (2017-Present) (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Graduate Scholarship and Professional Work (1)
- Jeffrey L Harrison (1)
- Journal Articles (1)
- Journal Publications (1)
- Life of the Law School (1993- ) (1)
- Loyola of Los Angeles Entertainment Law Review (1)
- Mark Bartholomew (1)
- NYLS Law Review (1)
- Publications (1)
- Rodolfo C. Rivas (1)
- Tom W. Bell (1)
- Touro Law Review (1)
- UF Law Faculty Publications (1)
- University of Arkansas at Little Rock Law Review (1)
- Vanderbilt Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 46
Full-Text Articles in Law
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Perlindungan Hukum Terhadap Virtual Model (Cad Files) Untuk 3d Printing Ditinjau Dari Perspektif Hak Cipta Dan Tentang Desain Industri, Gusti Karina Saraswati
Perlindungan Hukum Terhadap Virtual Model (Cad Files) Untuk 3d Printing Ditinjau Dari Perspektif Hak Cipta Dan Tentang Desain Industri, Gusti Karina Saraswati
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The existence of 3D Printing and CAD Files has great potential to conflict with the protection of intellectual property rights, especially copyright and industrial design. It is undeniable that in the future this technology will flourish in Indonesia. 3D Printing can change the market ecosystem where people are not selling products but selling virtual models (CAD Files). This ecosystem will have an impact on designers and companies, so they will try to protect their CAD Files from modification and copying by other parties. The legal problem of this research is to answer the question of the form of protection for …
Pengelolaan Royalti Dari Pencipta Lagu Yang Tidak Terdaftar Di Lembaga Manajemen Kolektif Oleh Lembaga Manajemen Kolektif Nasional, Mohamad Thaufiq Rachman
Pengelolaan Royalti Dari Pencipta Lagu Yang Tidak Terdaftar Di Lembaga Manajemen Kolektif Oleh Lembaga Manajemen Kolektif Nasional, Mohamad Thaufiq Rachman
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Royalty is a reward received by the author or owner of the related right concerning the utilization of their Economic Rights following Article 1 point 21 of Law No. 28, 2014 regarding Copyright ("UUHC 2014"). Royalty could also be interpreted as a form of appreciation for the Author's Works, such as song and/or music. Encouraging the spirit of industry players, including songwriters, is essential for continuous growth. As mentioned in the general explanation section of UUHC 2014, Copyright is the most important basis of the national creative economy. With the fulfillment of the protection and development of this creative economy, …
Perlindungan Hak Cipta Terhadap Penggandaan Permainan Video (Copyright Protection Against Video Game Copying), Ahmad Fajri Wibowo
Perlindungan Hak Cipta Terhadap Penggandaan Permainan Video (Copyright Protection Against Video Game Copying), Ahmad Fajri Wibowo
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Copyright protection provides legal protection to creative industries. One of the creative industries that need to be protected is the video game industry. The development of video games in Indonesia is very fast, therefore legal protection is needed to maintain the development of the video game industry. Basically a video game is an object of creation contained in Law Number 28 of 2014 concerning copyright. In the development of the video game industry, there are problems that occur such as the number of illegal copies of video games. Thus, copyright protection plays a very important role in maintaining the video …
Perlindungan Hukum Atas Ulos Sebagai Ekspresi Budaya Tradisional, Yoshua Ruselvelt P Sidabutar
Perlindungan Hukum Atas Ulos Sebagai Ekspresi Budaya Tradisional, Yoshua Ruselvelt P Sidabutar
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Traditional cultural expressions are a way of life for the Indonesian nation that teaches traditions, wisdom, values, communal knowledge packaged and passed on to posterity through tales, legends, arts and ceremonies which gradually form the social norms and way of life of the Indonesian nation. Indonesia is a country that consists of various tribes and cultures so that it has priceless Traditional Cultural Expressions and really needs to be protected. One form of traditional cultural expression in Indonesia is ulos cloth, which is a fabric product that is known internationally. This research uses juridical-normative legal research, where in collecting writing …
Perlindungan Hak Cipta Atas Konten Webinar Serta Akibat Hukum Merekam Dan Menggungah Konten Webinar Tanpa Persetujuan, Nabila Nabila
Perlindungan Hak Cipta Atas Konten Webinar Serta Akibat Hukum Merekam Dan Menggungah Konten Webinar Tanpa Persetujuan, Nabila Nabila
"Dharmasisya” Jurnal Program Magister Hukum FHUI
The Covid-19 pandemic period has changed the pattern of daily activities from normal to new normal. For example, seminars, which are usually, conducted face-to-face, change to online or what are known as webinars. The legal aspect that is closely related to webinars is the legal aspect of copyright. Organizing online seminars is considered easier because neither the participants nor the speakers need to leave the house to continue carrying out the seminar. Supported by technological developments, this webinar can also be recorded so that participants who are late for the webinar can still know the material presented through the recorded …
Perlindungan Hukum Terhadap Bentuk Fiksasi Dalam Karya Musik Berdasarkan Perkembangan Undang-Undang Hak Cipta, Boy Brian E.S
Perlindungan Hukum Terhadap Bentuk Fiksasi Dalam Karya Musik Berdasarkan Perkembangan Undang-Undang Hak Cipta, Boy Brian E.S
"Dharmasisya” Jurnal Program Magister Hukum FHUI
This journal aims to discuss the protection of copyright law against tapes converted into the form of a sound recording or a tool shaped CD (Compact Disc), in addition it is to discuss how enforcement against violations fixation in a piece of music that is poured into a recording tool so that it can be enjoyed through the CD. This journal will discuss about the forms of piracy which often occur in the field of copyright songs and music. In this journal will be discussed also about violations in the field of copyright songs or music that will be penalized …
Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough
Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough
Canadian Journal of Law and Technology
Widespread computerization and embedded system design has facilitated the pervasive and latent implementation of technological protection measures (‘‘TPMs”) to restrict device firmware access. Often referred to as ‘‘digital locks,” these restrictions impose a whole host of limitations on how owners use and manage the increasing number of products and devices in which they are incorporated. In many cases, TPM restrictions can prevent activities with social, environmental, and economical benefits, including repair, repurposing, and interoperability. In response, governments around the world are now revisiting and scrutinizing their TPM anti-circumvention laws within copyright and competition policy. Beyond these perspectives, this article looks …
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Automation In Moderation, Hannah Bloch-Wehba
Automation In Moderation, Hannah Bloch-Wehba
Faculty Scholarship
This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.
In fact, however, the …
Privative Copyright, Shyamkrishna Balganesh
Privative Copyright, Shyamkrishna Balganesh
All Faculty Scholarship
“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …
Privative Copyright, Shyamkrishna Balganesh
Privative Copyright, Shyamkrishna Balganesh
Vanderbilt Law Review
“Privative” copyright claims are infringement actions brought by authors for the unauthorized public dissemination of works that are private, unpublished, and revelatory of the author’s personal identity. Driven by considerations of authorial autonomy, dignity, and personality rather than monetary value, these claims are almost as old as Anglo-American copyright law itself. Yet modern thinking has attempted to undermine their place within copyright law and sought to move them into the domain of privacy law. This Article challenges the dominant view and argues that privative copyright claims form a legitimate part of the copyright landscape. It shows how privative copyright claims …
Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley
Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley
Fordham Intellectual Property, Media and Entertainment Law Journal
In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Privacy And Legal Automation: The Dmca As A Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence, machine learning, computing capacity, and big data analytics are creating exciting new possibilities for legal automation. At the same time, these changes pose serious risks for civil liberties and other societal interests. Yet, existing scholarship is narrow, leaving uncertainty on a range of issues, including a glaring lack of systematic empirical work as to how legal automation may impact people’s privacy and freedom. This article addresses this gap with an original empirical analysis of the Digital Millennium Copyright Act (DMCA), which today sits at the forefront of algorithmic law due to its automated enforcement of copyright …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Mark Bartholomew
There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …
"Free Speech, First Amendment, And New Media For Cons And Festivals" From Pop Culture Business Handbook For Cons And Festivals, Jon Garon
Faculty Scholarship
This article is part of a series of book excerpts from The Pop Culture Business Handbook for Cons and Festivals, which provides the business, strategy, and legal reference guide for fan conventions, film festivals, musical festivals, and cultural events.Although most events are organized by private parties, the location of these events in public venues and the crowd management issues involving free speech make First Amendment and free speech issues a critical component of event management. This excerpt provides a framework for understanding the legal and security issues involving free speech at public events.
Copyright To The Rescue: Should Copyright Protect Privacy?, Deidre Keller
Copyright To The Rescue: Should Copyright Protect Privacy?, Deidre Keller
Journal Publications
While some courts have held that “[i]t is universally recognized . . . that the protection of privacy is not the function of our copyright law,” the remedies afforded copyright owners make pursuing copyright claims an attractive option to privacy plaintiffs. Copyright remedies include the removal of digital copies from the internet and the destruction of physical copies. The extent to which copyright ought to protect privacy interests has been considered in various jurisdictions recently but has not been treated comprehensively by contemporary legal scholars in the United States. This piece seeks to undertake that treatment.
Part II of this …
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
"If That's The Way It Must Be, Okay": Campbell V. Acuff-Rose On Rewind
"If That's The Way It Must Be, Okay": Campbell V. Acuff-Rose On Rewind
Loyola of Los Angeles Entertainment Law Review
The 1994 Supreme Court case Campbell v. Acuff-Rose established broad protections for parody in U.S. copyright law. While the case is well known, the facts behind the case are not. None of the three courts that heard the case were told that the alleged parody by 2 Live Crew appeared only on a “sanitized” version of the group’s controversial album. Thus the work had a heightened commercial purpose: filling up a meager album so that album could serve as a market stopgap for its controversial cousin. Although commercial purpose is a key factor in the fair use calculus, no court …
Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne
Where Copyright Meets Privacy In The Big Data Era: Access To And Control Over User Data In Agriculture And The Role Of Copyright, Tesh W. Dagne
Vanderbilt Journal of Entertainment & Technology Law
The application of big data in different sectors of the economy and its transformative value has recently attracted considerable attention. However, this transformation, driven by the application of advanced technologies that utilize big data—such as the Internet of Things (IoT), artificial intelligence (AI), and software systems—raises concerns about access to and control over the user data that results from the uptake in using digital technologies. This Article examines the role different legal regimes have in framing access to and control over various forms of user data from the perspective of technology users in the agriculture sector. This Article then goes …
Authority And Authors And Codes, Michael J. Madison
Authority And Authors And Codes, Michael J. Madison
Articles
Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Tom W. Bell
Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht
Private Letters And The Law: Edith Wharton’S Questions About Ownership And The Right To Publish Private Letters, Deborah Hecht
Touro Law Review
No abstract provided.
Privacy, Copyright, And Letters, Jeffrey Harrison
Privacy, Copyright, And Letters, Jeffrey Harrison
Jeffrey L Harrison
The focus of this Essay is the privacy of letters – the written manifestations of thoughts, intents, and the recollections of facts directed to a person or a narrowly defined audience. The importance of this privacy is captured in the novel Atonement by Ian McEwan and in the film based on the novel. The fulcrum from which the action springs is a letter that is read by someone to whom it was not addressed. The result is literally life-changing, even disastrous for a number of characters. One person dies, two people seemingly meant for each other are torn apart and …
Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart
Do Androids Dream Of Electric Free Speech? Visions Of The Future Of Copyright, Privacy And The First Amendment In Science Fiction, Daxton R. Stewart
Daxton "Chip" Stewart
Science fiction authors have long projected the future of technology, including communication devices and the way in which future societies may use them. In this essay, these visions of future technology, and their implications on the future of media law and policy, are explored in three areas in particular – copyright, privacy, and the First Amendment. Themes examined include moving toward massively open copyright systems, problems of perpetual surveillance by the state, addressing rights of obscurity in public places threatened by wearable and implantable computing devices, and considering free speech rights of autonomous machines created by humans. In conclusion, the …
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Intellectual Property’S Lessons For Information Privacy, Mark Bartholomew
Journal Articles
There is an inherent tension between an individual’s desire to safeguard her personal information and the expressive rights of businesses seeking to communicate that information to others. This tension has multiplied as consumers generate and businesses collect more and more personal data online, forcing efforts to strike an appropriate balance between privacy and commercial speech. No consensus on this balance has been reached. Some privacy scholars bemoan what they see as a slanted playing field in favor of those wishing to profit from the private details of other people’s lives. Others contend that the right in free expression must always …
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.