Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Communications Law
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Conversational Standing: A New Approach To An Old Privacy Problem, Christopher M. Drake
Conversational Standing: A New Approach To An Old Privacy Problem, Christopher M. Drake
ExpressO
American society has long considered certain conversations private amongst the participants in those conversations. In other words, when two or more people are conversing in a variety of settings and through a variety of media, there are times when all parties to the conversation can reasonably expect freedom from improper government intrusion, whether through direct participation or secret monitoring. This shared expectation of privacy has been slow to gain judicial recognition. Courts have indicated that the Fourth Amendment to the United States Constitution only protects certain elements of the conversation, such as where and how it takes place, but that …
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Who Are The Good Guys? The Legacy Of Watergate And The Tangled Webs We Weave, Jeffrey A. Breinholt
Who Are The Good Guys? The Legacy Of Watergate And The Tangled Webs We Weave, Jeffrey A. Breinholt
ExpressO
This article examines the astounding revelation that Deep Throat, the anonymous source that brought down the Nixon Presidency, was Mark Felt, the man who ran the FBI during the Watergate Scandal. Was Mark Felt a hero or a villain? Thanks to the recent publication of Bob Woodward’s The Secret Man in combination with historical case law, we now have more historical evidence about what motivated Felt and how he reacted to his own legal misfortunes. This article examines this record and shows that categorizing Felt along the hero/villain continuum is not an easy task, but argues that this type of …
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
Booze, Drugs, And Rock & Roll: Crime During The College Years, Paul S. Gutman
Booze, Drugs, And Rock & Roll: Crime During The College Years, Paul S. Gutman
ExpressO
In this Article, the author examines the predilection of college and university students towards certain types of illegal behaviors. Specifically, the Article considers the widespread instances of drug use, under-age alcohol use, and "file-sharing" using Napster and its progeny. The Article's main focus is on why such illegal behaviors are rampant among college students who might otherwise be