Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 87

Full-Text Articles in Computer Law

Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow Jun 2011

Direct-To-Consumer Advertising Of Pharmaceuticals On Television: A Charter Challenge, Elvina C. Chow

Canadian Journal of Law and Technology

The Supreme Court of Canada has consistently wrestled with the conflict between legislation designed to protect consumers’ health and the constitutional guarantee of the fundamental freedom of expression. This paper investigates the justification for the current regulatory framework for pharmaceutical advertising on television. Aware that the provisions in the FDA are able to withstand Charter of Rights and Freedoms (Charter) scrutiny, several possible policy initiations are nevertheless proposed.

The paper is divided into five separate sections. Having first introduced DTCA of pharmaceuticals on television in Section I, I will now turn to a more comprehensive examination of DTCA in Canada …


Lessons From Bilski, Haewon Chung Jun 2011

Lessons From Bilski, Haewon Chung

Canadian Journal of Law and Technology

In this paper, I will examine how the U.S. and Canadian courts have approached the patentability of intangible inventions and discuss whether any lessons can be learned from the U.S.’s patent dilemma. In section 2, I will review the American jurisprudence on patentability of intangible inventions. In section 3, I will discuss the potential impact Bilski may have on the American jurisprudence. Section 4 will assess the Canadian jurisprudence on patentability of intangible inventions. In section 5, I will discuss the Federal Court of Canada’s decision in Amazon/FCC. I argue that based on recent events in the American jurisprudence, Canadian …


Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas May 2011

Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

It is widely aknowledged that we are entering in an era of revolutionary changes in the field of Information and Communication Technologies . The spread of broadband internet connections has led internet to function not only as a communications network but also as a platform for new computing applications. The most recent application is the so called "cloud computing", which permits the running of software applications or the storage of data to be performed at remote servers which are connected to our computers through the Internet. Examples of these applications are the web-based email services, online computer back up, data …


El "Product Placement" En El Cine, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Apr 2011

El "Product Placement" En El Cine, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors discuss briefly the history of product placement in film citing several examples. Then, they analyze the current state of regulation and look forward at what lies ahead, as product placement has become ingrained in the entertainment industry.///////////////////////////////////////////////////////////////////////////////////////////////Los autores analizan de una forma breve la historia del emplazamiento de productos o product placement en el cine, utilizando varios ejemplos. Después se adentran en el estado actual de la regulación y miran hacia el futuro de la industria.


Tanggung Jawab Hukum Penyelenggara Sistem Elektronik (Law Responsibility Of The Electronic System Providers), Abdul Salam Apr 2011

Tanggung Jawab Hukum Penyelenggara Sistem Elektronik (Law Responsibility Of The Electronic System Providers), Abdul Salam

Indonesia Law Review

Reviewing Edmon Makarim’s book which is about Law Responsibility of the Electronic System Providers, remind us that easiness and availability of electronic system in electronic transaction in private or public happen because the role of electronic system providers. Behind the important and central role, there is big responsibility for electronic system providers. But because of wide of definition of provision of electronic system and so many people who involve in electronic system providers, there is a question in our mind, how is the shape of responsibility of the electronic system providers if the electronic system which is held is broken …


Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries Apr 2011

Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries

Faculty Law Review Articles

The American criminal justice system, (therefore), is facing a future domestic violence crisis. Unfortunately, authorities-both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing "normal" teenage behavior seems counter-productive. While an effective criminal justice system response to this problem has yet to be developed, the first step will be for parents and law enforcement to recognize the risk and take it seriously. The second step will be to "renorm" unhealthy teenage relationship norms. It is possible that …


Jurisprudence For A Digital Age: Free Software And The Need For A New Media Legal Authority, Nicholas Clark Mar 2011

Jurisprudence For A Digital Age: Free Software And The Need For A New Media Legal Authority, Nicholas Clark

University of the District of Columbia Law Review

No abstract provided.


Revising The Analysis Of Personal Jurisdiction To Accommodate Internet-Based Personal Contacts, Matthew L. Perdoni Mar 2011

Revising The Analysis Of Personal Jurisdiction To Accommodate Internet-Based Personal Contacts, Matthew L. Perdoni

University of the District of Columbia Law Review

From online banking, to cyber-shopping, to the growth of social-networking websites, the Internet is a medium for human interaction as much as it is a part of modern commerce and business, and now encompasses nearly every facet of American life. By all indications, use will become more widespread and complex over time. The Internet now facilitates the modern functional equivalent of human interaction, and provides worldwide access to users with the mere click of a button. For these reasons, examining the role of the Internet in the law is critical. Particularly, it is necessary to consider whether and to what …


Owning Omega-3: Monsanto And The Invention Of Meat, Matthew Rimmer Mar 2011

Owning Omega-3: Monsanto And The Invention Of Meat, Matthew Rimmer

Matthew Rimmer

In August of 2010, Anna Salleh of the Science Unit of the Australian Broadcasting Corporation broke a story about Monsanto seeking to patent the enhancement of meat, including omega-3 fatty acids:‘Enhanced port is sparking debate over the ethics of placing patents on food. Patent applications covering the enhancement of meat, including pork with omega-3 fatty acids, are stimulating debate over the ethics and legalities of claiming intellectual property over food. Monsanto has filed patents that cover the feeding of animals soybeans, which have been genetically modified by the company to contain stearidonic acid (SDA), a plant-derived omega-3 fatty acid... Omega-3s …


Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders Mar 2011

Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders

Federal Communications Law Journal

In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


Franquicia Maestra (Master Franchise), Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. Feb 2011

Franquicia Maestra (Master Franchise), Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors focus on how the Master Franchise agreement provides a solid legal strategy to expand a successful franchise beyond domestic borders.//////////////////////////////////////////////////Los autores analizan como el contrato de Master Franquicia proporciona una sólida estrategia legal para expandir una exitosa franquicia más allá de las fronteras nacionales.


El Derecho De Sucesiones Se Debe Atemperar A Los Cambios De La Sociedad Del Siglo Xxi, Edward Ivan Cueva Feb 2011

El Derecho De Sucesiones Se Debe Atemperar A Los Cambios De La Sociedad Del Siglo Xxi, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


Databases And Dynamism, Michal Shur-Ofry Feb 2011

Databases And Dynamism, Michal Shur-Ofry

University of Michigan Journal of Law Reform

Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …


Technology-Assisted Review In E-Discovery Can Be More Effective And More Efficient Than Exhaustive Manual Review, Maura R. Grossman, Gordon V. Cormack Jan 2011

Technology-Assisted Review In E-Discovery Can Be More Effective And More Efficient Than Exhaustive Manual Review, Maura R. Grossman, Gordon V. Cormack

Richmond Journal of Law & Technology

E-discovery processes that use automated tools to prioritize and select documents for review are typically regarded as potential cost-savers – but inferior alternatives – to exhaustive manual review, in which a cadre of reviewers assesses every document for responsiveness to a production request, and for privilege. This Article offers evidence that such technology-assisted processes, while indeed more efficient, can also yield results superior to those of exhaustive manual review, as measured by recall and precision, as well as F1, a summary measure combining both recall and precision. The evidence derives from an analysis of data collected from the TREC 2009 …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Stephen J. Rancourt Jan 2011

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Stephen J. Rancourt

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its Annual Survey issue of the 2010–2011 academic year. The Journal strives to find interesting and contemporary topics that bisect technology and the law, and publish authors who provide in-depth and practical analysis of these topics to the legal community and beyond. To that end, this year’s Annual Survey is devoted exclusively to the topic of electronic discovery. In the two years since the Journal last published on this important issue, the availability of electronic information has increased exponentially, courts have continued to struggle with the 2006 Amendments to …


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden Jan 2011

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


Digital Exhaustion, Aaron K. Perzanowski, Jason M. Schultz Jan 2011

Digital Exhaustion, Aaron K. Perzanowski, Jason M. Schultz

Aaron K. Perzanowski

As digital networks emerge as the dominant means of distributing copyrighted works, the first sale doctrine is increasingly marginalized. The limitations first sale places on the exclusive right of distribution are of little importance when the alienation and use of copies entails their reproduction. This fact of the modern copyright marketplace has led to calls for statutory clarification of digital first sale rights. Acknowledging the obstacles to legislative intervention, this Article argues that courts are equipped today to limit copyright exclusivity in order to enable copy owners to make traditionally lawful uses of their copies, including resale through secondary markets. …


Discovering Facebook: Social Network Subpoenas And The Stored Communications Act, Ryan A. Ward Jan 2011

Discovering Facebook: Social Network Subpoenas And The Stored Communications Act, Ryan A. Ward

Ryan A Ward

The Stored Communications Act is an unnecessarily complicated statute. Originally designed to protect the privacy of Internet users as the Internet existed in 1986, courts have been made to “extract[] operating principles from [the SCA’s] tangled legal framework” and apply these to new Internet technologies. Social networks present one of the latest challenges in this regard. Courts have taken inconsistent approaches in applying the SCA to social network information and many of these cases have obvious flaws. Even the Crispin decision, which represents a step in the right direction, provides incomplete guidance in determining whether social networks should be protected …


An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou Jan 2011

An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou

Konstantinos Stylianou

This paper considers the mechanics and role of innovation in telecommunications networks, and explains how regulation can be designed to maximize innovation. To better focus on the relationship between innovation and regulation an effort is made to distinguish innovation from competition, although the two concepts are closely related, and several reasons are presented on why the fast changing, networked and technical nature of telecommunications offers a very favorable environment for innovation to thrive, as well as why innovation benefits from a large number of actors. Moreover, the paper further explains that even small players are useful in the innovation process …


Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long Jan 2011

Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long

UIC Law Open Access Faculty Scholarship

Trademarks have long suffered from an "ugly stepsister" status in the realm of intellectual property. Quasi-market regulation tool, quasi-investment property; trademark's historical role as both consumer-information signifier and producer-investment asset has led to increasingly confusing dichotomous treatment under the Lanham Act. The potentially borderless markets of cyberspace, with their new marketing techniques and new competitive spaces, have only heightened this confusion. Stumbling attempts to extend protection for marks under the Lanham Act beyond traditional notions of trademark use and consumer confusion to encompass the investment protection side of trademarks, such as the development of federal dilution and anti-cybersquatting acts, only …


The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price Jan 2011

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti Jan 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen Jan 2011

Carry That Weight: Victim Privacy Within The Military Sexual Assault Reporting Methods, 28 J. Marshall Computer & Info. L. 551 (2011), Emily Hansen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak Jan 2011

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


Supervising Managed Services, James B. Speta Jan 2011

Supervising Managed Services, James B. Speta

Faculty Working Papers

Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …