Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 77

Full-Text Articles in Computer Law

Pitfalls And Promises Of Social Media And Mobile Lawyering, Jonathan I. Ezor May 2012

Pitfalls And Promises Of Social Media And Mobile Lawyering, Jonathan I. Ezor

Jonathan I. Ezor

No abstract provided.


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor Jan 2012

Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor

Jonathan I. Ezor

In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …


Social Media And Legal Ethics, Jonathan I. Ezor Nov 2011

Social Media And Legal Ethics, Jonathan I. Ezor

Jonathan I. Ezor

A presentation on the legal issues arising out of attorney use of social media services, including for electronic discovery


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo Jan 2011

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

All Faculty Scholarship

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …


Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke Feb 2009

Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Working Papers

Our fast-paced age of electronic agreements that ostensibly govern transactions as diverse as downloading software, ordering goods, and engaging in collaborative development projects raises questions regarding the suitability of contract law as the appropriate legal framework. While this question arises in many settings, we focus here on the free and open source software (FOSS) movement because of the maturity and success of its model and the ubiquity of its software. We explore in particular whether open source licenses are supported by consideration, and argue that they are, and that open source licenses are contracts. We further argue that a contractual …


¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti Dec 2008

¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti

Maximiliano Marzetti

BREVE ANÁLISIS ECONÓMICO DE LOS BLOGS JURÍDICOS (BLAWGS) Y DE LA BLOGÓSFERA.


Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner Jan 2008

Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner

All Faculty Scholarship

Is the Internet turning contract law on its head? Many commentators contend it is. Precisely this issue arises in current controversies over end user license agreements (EULAs) and Terms of Use agreements (TOUs, the agreements governing our use of web sites). Commentators complain that, in both cases, the formation process unduly restricts buyers’ freedom; and, that sellers and web site owners exploit the process to impose terms that deprive consumers of important intellectual property and privacy rights. The courts ignore the criticisms and routinely enforce EULAs and TOUs. There is truth on both sides of this court/commentator divide. EULAs and …


Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll Jul 2007

Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll

Working Paper Series

In eBay v. MercExchange, the Supreme Court correctly rejected a one-size-fits-all approach to patent injunctions. However, the Court's opinion does not fully recognize that the problem of uniformity in patent law is more general and that this problem cannot be solved through case-by-case analysis. This Essay provides a field guide for implementing eBay using functional analysis and insights from a uniformity-cost framework developed more fully in prior work. While there can be no general rule governing equitable relief in patent cases, the traditional four factor analysis for injunctive relief should lead the cases to cluster around certain patterns that often …


Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe Feb 2007

Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe

ExpressO

Digital Rights Managements (DRM) systems impact the digital content and software marketplace on several levels. The issues include copyright law, contract law, privacy, antitrust, and consumer protection. This paper examines how DRM systems affect the consumer and what changes can be made to bring about a more sensible and transparent market in the United States.


The Need For Software Innovation Policy, Christopher Riley Jan 2007

The Need For Software Innovation Policy, Christopher Riley

ExpressO

This paper examines the current legal treatment of software innovation. It argues that recent judicial standards for the regulation of software innovation do not adequately protect innovation. It presents an original standard for the regulation of software innovation, one intended to guide judicial decisions in contributory copyright liability, in interpretations of the Digital Millennium Copyright Act, and in every courtroom where a developer is on trial for the mere creation and distribution of software. The standard presented in this paper separates the questions of liability and remedy in order to produce an optimal dynamic balance of interests.


Youtube Or Youlose? Can Youtube Survive A Copyright Infringement Lawsuit, Jason C. Breen Jan 2007

Youtube Or Youlose? Can Youtube Survive A Copyright Infringement Lawsuit, Jason C. Breen

ExpressO

YouTube, and similar video web hosting services, have already been targets of copyright infringement lawsuits. YouTube’s liability is most likely dependant on whether the service meets the requirements of the DMCA safe harbor for service providers under 17 U.S.C.A. § 512(c). This paper briefly examines how YouTube would fare under the different theories of copyright infringement and discusses whether the DMCA safe harbor would be available to YouTube if they were found liable as an infringer. The limited case law available indicates that the DMCA safe harbor will likely facilitate YouTube’s continued existence, unlike services like Grokster, although YouTube would …


Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran Nov 2006

Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran

ExpressO

Electronic agreements continue to fortify their presence in the digital commercial marketplace. Whether used to sell goods or services, or simply to define relationships, standardized electronic agreements have appeared in abundance in business-to-business or business-to-consumer transactions. Standardized electronic agreements, like their physical counterparts, offer the ability to address multiple concerns in a simple, efficient fashion. Although electronic contracts and electronic signatures have been accepted and promoted by federal and state governments, many fundamental aspects of contract law have been left for the courts to wrestle with when disputes arise.

Today, there are essentially two types of standardized electronic agreements—the click-through …


Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens Nov 2006

Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens

ExpressO

Electronic contractual arrangements have raised complex legal issues unprecedented in the law. Technology s impact on traditional contract law doctrines is readily apparent in the dilemmas generated by recent developments in computer software, hardware, and Internet transactions. In such transactions, sellers have increasingly begun utilizing “clickwrap” agreements, whereby standard terms and conditions are displayed on the computer screen when the user attempts to access the seller’s services. Not surprisingly, the enforceability of clickwrap terms, which are often not known to the user until after payment, has become a subject of much debate in the courts. Because many of the clickwrap …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck Aug 2006

Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck

ExpressO

The Energy Research Advisory Board, the group of external scientific advisors that provided impartial expert advice to the Secretary of Energy since 1978, was disbanded this May. The Administration, like its predecessors, regularly replaces experts on agency advisory panels with ideologues and political allies. We are at the nadir of a historical progression since World War II away from trust in and use of scientific expertise in policymaking. This shift however, has not been countered with greater public participation. Instead, administrative law and theory have developed a model of the managerial administrative authority. The "expertocratic" agency relies on internal expertise …


Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers Aug 2006

Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers

ExpressO

The copyright fair use doctrine is a key to increasing access to knowledge and decreasing the digital divide between information-rich and information-poor countries. Publishers have sued Google for copyright infringement for scanning the copyrighted books of the publishers into a digital database, so Google users can search the database for certain words to determine what books contain words of interest to the user. The Google litigation, however, is only a small piece of the larger access to knowledge puzzle. The larger issue is access to the books themselves, translated into the native languages of citizens of developing countries. Yet copyright …


Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali Aug 2006

Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali

ExpressO

As the wave of outsourcing to India swells, there is growing concern about the inadequacies of the India legal system in protecting data being transferred to it from other nations for the purpose of processing. India has a smattering of laws that scantily address the issue of data privacy. Under pressure from the business processing industry in India, as well as from the European Union and other nations, it is but a matter of time before India adopts a slate of laws that address the issue of data protection. Once these laws are enacted, the main issue that remains is …


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


Open Source, Free Software And Contractual Issues, Jose Javier González De Alaiza Jul 2006

Open Source, Free Software And Contractual Issues, Jose Javier González De Alaiza

ExpressO

“Free software” is an increasingly used form to license computer programs, which on the one hand gives users the rights to use, modify and redistribute the program; and, on the other, forces any person redistributing an original or modified version of the program to license it with the same rights. Such a forced obligation is introduced through the so called “copyleft clause” and, basically, uses Copyright in a creative way to achieve freedom instead of control.

This paper discusses the “free software” foundations and contractual issues. The discussion is structured in two main parts and Conclusion. In Part II, the …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


The Problem Of Freedom Override By Digital Rights Management Technologies: The Market Mechanisms And Possible Legal Options, Yuko Noguchi May 2006

The Problem Of Freedom Override By Digital Rights Management Technologies: The Market Mechanisms And Possible Legal Options, Yuko Noguchi

ExpressO

One of the major problems of copyright regulations in the digital and network era is that the Digital Rights Management (DRM) technologies are overriding the freedom incorporated within the copyright regulations in the analog world. The override problem partly comes from the strict implementation of the DRM systems by the market, and partly from the anti-circumvention regulations that almost blindly protect such implementation. This research reviews the scope of anti-circumvention regulations by introducing Japanese regulations, which are rather modest, and by comparing with the U.S. regulations. It also extensively analyzes the market mechanisms that cause rather strict implementation of DRM …


How Much Spam Can Can-Spam Can? – Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama Mar 2006

How Much Spam Can Can-Spam Can? – Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama

ExpressO

No abstract provided.


Opting Out: Procedural Fair Use, Michael R. Mattioli Mar 2006

Opting Out: Procedural Fair Use, Michael R. Mattioli

ExpressO

This article explores the advantages of opt-out plans, and identifies a critical shortcoming in Copyright’s doctrine of Fair Use. The discussion is fueled by a current controversy: In December of 2004, Google, Inc. announced its plan to digitally scan thousands of copyrighted books as part of a massive new digital indexing service. Hedging against possible litigation, Google provided a free and easy opt-out procedure for authors who didn’t want their books scanned. Despite this measure, two major authors’ groups have sued Google, claiming the opt-out plan imposes an unfair burden. This article explores the fairness of established opt-outs in contract …


The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster Feb 2006

The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster

ExpressO

As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …


Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding Feb 2006

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding

ExpressO

Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …


Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy Nov 2005

Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy

ExpressO

17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.

Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Oct 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.