Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Law (21)
- Law and Technology (21)
- Intellectual Property Law (13)
- Science and Technology (13)
- Internet (11)
-
- Consumer Protection Law (6)
- Contracts (6)
- Communications Law (5)
- Constitutional Law (5)
- Copyright (5)
- International Law (5)
- Law and Economics (5)
- Law and Society (5)
- Administrative Law (4)
- Antitrust (4)
- Commercial Law (4)
- Comparative and Foreign Law (4)
- Criminal Law and Procedure (4)
- E-commerce (4)
- Economics (4)
- General Law (4)
- Google (4)
- Government Contracts (4)
- Legislation (4)
- Public Law and Legal Theory (4)
- Book reviews (3)
- Civil Rights and Discrimination (3)
- Conflict of Laws (3)
- Elder Law (3)
- Food and Drug Law (3)
- Publication
-
- ExpressO (21)
- UIC John Marshall Journal of Information Technology & Privacy Law (16)
- Canadian Journal of Law and Technology (14)
- Cleveland State Law Review (10)
- Richmond Journal of Law & Technology (5)
-
- UIC Review of Intellectual Property Law (3)
- All Faculty Scholarship (2)
- Bruno L. Costantini García (2)
- Rosetta Stone v. Google (Joint Appendix) (2)
- Andres Guadamuz (1)
- Books (1)
- Cornell Law Faculty Publications (1)
- Donald J. Kochan (1)
- Faculty Scholarly Works (1)
- Scholarly Works (1)
- UIC Law Open Access Faculty Scholarship (1)
- Publication Type
Articles 1 - 30 of 82
Full-Text Articles in Computer Law
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran
Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran
ExpressO
Electronic agreements continue to fortify their presence in the digital commercial marketplace. Whether used to sell goods or services, or simply to define relationships, standardized electronic agreements have appeared in abundance in business-to-business or business-to-consumer transactions. Standardized electronic agreements, like their physical counterparts, offer the ability to address multiple concerns in a simple, efficient fashion. Although electronic contracts and electronic signatures have been accepted and promoted by federal and state governments, many fundamental aspects of contract law have been left for the courts to wrestle with when disputes arise.
Today, there are essentially two types of standardized electronic agreements—the click-through …
Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens
Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens
ExpressO
Electronic contractual arrangements have raised complex legal issues unprecedented in the law. Technology s impact on traditional contract law doctrines is readily apparent in the dilemmas generated by recent developments in computer software, hardware, and Internet transactions. In such transactions, sellers have increasingly begun utilizing “clickwrap” agreements, whereby standard terms and conditions are displayed on the computer screen when the user attempts to access the seller’s services. Not surprisingly, the enforceability of clickwrap terms, which are often not known to the user until after payment, has become a subject of much debate in the courts. Because many of the clickwrap …
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Bruno L. Costantini García
Ponencia sobre la Ley Federal del Procedimiento Contencioso Administrativo, impartida por Bruno L. Costantini García.
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Decoding Cyberproperty, Francis G. Lastowka
Decoding Cyberproperty, Francis G. Lastowka
ExpressO
This article examines recent developments in both the doctrine and theory of legal cyberproperty rights. The first part of this article looks primarily at two seminal cases that might be considered bookends to the story of cyberproperty: Thrifty-Tel, Inc. v. Bezenek and Intel v. Hamidi. The second part of this article challenges two assumptions that act as theoretical and rhetorical engines driving arguments for cyberproperty. The first is the assumption that legal prohibitions against interactions with privately owned computing machinery are analogous, from a standpoint of law and policy, to traditional rights of exclusion from the use of or entry …
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden
Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden
ExpressO
Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.
While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
ExpressO
The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …
Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck
Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck
ExpressO
The Energy Research Advisory Board, the group of external scientific advisors that provided impartial expert advice to the Secretary of Energy since 1978, was disbanded this May. The Administration, like its predecessors, regularly replaces experts on agency advisory panels with ideologues and political allies. We are at the nadir of a historical progression since World War II away from trust in and use of scientific expertise in policymaking. This shift however, has not been countered with greater public participation. Instead, administrative law and theory have developed a model of the managerial administrative authority. The "expertocratic" agency relies on internal expertise …
Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers
Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers
ExpressO
The copyright fair use doctrine is a key to increasing access to knowledge and decreasing the digital divide between information-rich and information-poor countries. Publishers have sued Google for copyright infringement for scanning the copyrighted books of the publishers into a digital database, so Google users can search the database for certain words to determine what books contain words of interest to the user. The Google litigation, however, is only a small piece of the larger access to knowledge puzzle. The larger issue is access to the books themselves, translated into the native languages of citizens of developing countries. Yet copyright …
Technoconsen(T)Sus, Andrea M. Matwyshyn
Technoconsen(T)Sus, Andrea M. Matwyshyn
ExpressO
Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
ExpressO
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
Canadian Journal of Law and Technology
This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Canadian Journal of Law and Technology
This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …
Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland
Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland
Canadian Journal of Law and Technology
This article examines podcasting and its specific characteristics to see, first, where it fits within Canada’s copyright law, and second, how the licensing regime for musical works in Canada applies to podcasting. The discussion next turns to whether or not the current licensing regime for podcasting is desirable in light of the purpose of copyright in Canada, and with a view to the various interests at stake: those of artists, in being paid, and those of society, in enabling podcasters to access material in order to produce their work. An examination of the current and proposed licensing regime and its …
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Canadian Journal of Law and Technology
This paper argues that Canadian courts can, and should, adopt electronic trespass as a viable cause of action for the protection of property rights on the Internet. Of course, this conclusion presupposes that property rights in fact exist on the Internet. While American courts have accepted the existence of property rights on the Internet without any real controversy, a significant body of criticism has developed around American jurisprudence. Part III examines the critiques levelled against the assumption of property rights inherent in electronic trespass, and argues that there are property rights that need to be protected on the Internet. Part …
Applying Tort Theory To Information Technology, Marvin L. Longabaugh
Applying Tort Theory To Information Technology, Marvin L. Longabaugh
ExpressO
In this article, I discuss the issue of whether torts attributable to Information Systems products, both hardware and software, should be subject to litigation as a contract action, a tort action, or both. I further suggest a protocol for attorneys and courts to consider when attempting to discern whether a particular cause of action is appropriate. Last, I briefly discuss whether the advent of certification programs for computer professionals should result in the courts reconsideration of the concept of computer malpractice.
Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Bruno L. Costantini García
Memorias del Primer Congreso Nacional de Organismos Públicos Autonomos
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
The Problem Of Freedom Override By Digital Rights Management Technologies: The Market Mechanisms And Possible Legal Options, Yuko Noguchi
The Problem Of Freedom Override By Digital Rights Management Technologies: The Market Mechanisms And Possible Legal Options, Yuko Noguchi
ExpressO
One of the major problems of copyright regulations in the digital and network era is that the Digital Rights Management (DRM) technologies are overriding the freedom incorporated within the copyright regulations in the analog world. The override problem partly comes from the strict implementation of the DRM systems by the market, and partly from the anti-circumvention regulations that almost blindly protect such implementation. This research reviews the scope of anti-circumvention regulations by introducing Japanese regulations, which are rather modest, and by comparing with the U.S. regulations. It also extensively analyzes the market mechanisms that cause rather strict implementation of DRM …
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
ExpressO
This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
ExpressO
This paper calls for mandated “network neutrality,” the principle that broadband service providers (BSPs) should generally treat all nondestructive data equally. Without such a mandate, BSPs will likely begin charging content providers for the right to send data at the fastest speeds available. The present frequency with which BSPs block some data entirely will also likely increase.
Neutral networks are preferable for two key reasons. First, they spawn innovation, as illustrated by the explosive online innovation to date. Second, neutral networks better distribute communication power, promoting First Amendment values. Extant and likely future acts of discrimination erode both goals. The …
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Canadian Journal of Law and Technology
The following discussion will examine the utility requirement for patentability in the context of EST patents. Part I will provide background information regarding the utility requirement under patent law and will explain why it has been difficult to apply to ESTs. Part II will briefly examine how other jurisdictions, in particular the United States, have addressed the difficul- ties associated with applying the current utility require- ment to biological materials, in particular ESTs. Part III will look at how Canadian courts have interpreted and applied the utility requirement for patentability, and will suggest that ESTs have sufficient value to the …
E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory
Canadian Journal of Law and Technology
This hefty volume is a useful compendium of the basic source materials for the law of electronic commerce in Canada. It offers the text of all the general-purpose legislation that removes legal barriers to the use of electronic communications, for all jurisdictions in the country. It then takes a dozen related areas of law, from domain names to taxation, from competition law to consumer protection, from security to standards, and offers a quick overview and the key documents applicable to each. In each case the commentary is in English then in French, and where the texts are available in both …
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
Canadian Journal of Law and Technology
The volume, composition and management of solid waste generated by households, governments, the commercial sector, and industry have all changed dramatically over the past century. Household waste contained mainly organic material a hundred years ago. Today, both residential and commercial waste is a complex mix of organics, plastics, paper products, metals and a variety of toxic material. Historically, individual households looked after their own waste, through efforts such as composting and burning. Over the past century, with significant increases in volume of waste generated, municipalities have taken over primary responsibility for solid waste management, initially mainly for aesthetic and sanitary …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Canadian Journal of Law and Technology
Rapid growth of technology in the last decades has given rise to electronic commerce (e-commerce) as a new mode of commerce. This new commerce environment has many characteristics that affect commercial relationships and parties. Of these characteristics, global and borderless commercial activity and the intangible nature of communication can be singled out.
From a legal perspective, e-commerce has developed new modes, of contract formation, performance of contracts for intangible goods, as well as payment. In this new borderless and transient sphere, certain interests of parties involved in commercial activities as buyers or sellers are in need of protection. In particular, …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
All Faculty Scholarship
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
How Much Spam Can Can-Spam Can? – Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama
ExpressO
No abstract provided.