Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 41 of 41

Full-Text Articles in Computer Law

The Concept Of "Harm" In Computer-Generated Images Of Child Pornography, 22 J. Marshall J. Computer & Info. L. 717 (2004), Jisuk Woo Jan 2004

The Concept Of "Harm" In Computer-Generated Images Of Child Pornography, 22 J. Marshall J. Computer & Info. L. 717 (2004), Jisuk Woo

UIC John Marshall Journal of Information Technology & Privacy Law

There has been a lot of controversy about the harm caused by computer-generated child pornography. This article examines the new ways in which technological development has created new concerns about child pornography especially in the context of challenging the concept of “harm” in the existing child pornography law. The author presents and discusses the existing child pornography laws and jurisprudence as well as the relevant arguments raised against it most of which are based on the “harm” caused by child pornography. This concept of “harm” and the different ways it is conceived and understood is analyzed and empirical evidence supporting …


Virtual Crimes, Gregory Lastowka, Dan Hunter Jan 2004

Virtual Crimes, Gregory Lastowka, Dan Hunter

NYLS Law Review

No abstract provided.


Law As Film: Representing Justice In The Age Of Moving Images, Shulamit Almog, Ely Aharonson Jan 2004

Law As Film: Representing Justice In The Age Of Moving Images, Shulamit Almog, Ely Aharonson

Canadian Journal of Law and Technology

Two main theses are presented here. The first is that there is a conceptual resemblance between the ways in which messages are transmitted in the courtroom and the ways in which they are transmitted in the cinema. The second is that the evolution of legal procedure is being influenced by developments taking place in visual culture generally and film specifically. Taken together, these theses lead to the conclusion that the development of a theory of ‘‘law-as-film’’ can provide insights into the contemporary practice of law that might otherwise be overlooked.


Following The Right Lead: Gutnick And The Dance Of Internet Jurisdiction, Mary Paterson Jan 2004

Following The Right Lead: Gutnick And The Dance Of Internet Jurisdiction, Mary Paterson

Canadian Journal of Law and Technology

As improving methods of travel and communication facilitated the shift from an agrarian to an industrial society, the common law courts increasingly faced interjurisdictional disputes. Although British paternalism dominated early cases in which courts assumed jurisdiction over people, property, and actions in distant lands, these cases and the imperial attitudes informing them were slowly replaced by more modest jurisdictional assertions based on a sense of comity. The shift from an industrial society to an information-based society and the simultaneous growth of a global infrastructure based on satellite, telephone, cable, and cellular technologies have stretched jurisdictional doctrines in new ways, calling …


Les Consommateurs Et Les Clubs Vidéo Ont-Ils Le Droit De Modifier Les Films À Leur Guise?, René Pépin Jan 2004

Les Consommateurs Et Les Clubs Vidéo Ont-Ils Le Droit De Modifier Les Films À Leur Guise?, René Pépin

Canadian Journal of Law and Technology

Dans un premier temps, nous voulons étudier le litige en cours. Même si aucune décision sur le fond n’est susceptible d’être rendue à court terme, nous pouvons scruter les prétentions des parties et voir l’état du droit aux États-Unis sur ce sujet. Nous examinerons ensuite comment cette problématique serait traitée au Canada.

Et c’est ici que la question soulevée dans le litige revêt tout son intérêt, car elle met en jeu des notions fonda- mentales en matière de droit d’auteur. On devra ainsi se demander si le fait pour une personne ou une entreprise de retrancher des séquences représentant quelques …


Turning Worms: Some Thoughts On Liabilities For Spreading Computer Infections, Richard Owens Jan 2004

Turning Worms: Some Thoughts On Liabilities For Spreading Computer Infections, Richard Owens

Canadian Journal of Law and Technology

Two aspects of the virus/worm liability problem are of particular note. The first is how tightly the Internet binds together many possible defendants; those who build and run it, those who populate it with increasingly complex electronic commerce Web sites, those who provide terminal software, those who send electronic mails, those who design its security algorithms, those who insure it, and those who hack it, amongst others.

The second aspect is how speculative such a review is. Little case law pertains. Even the language of the law(what does it really mean when we assess liability on the basis of a …


Foreign Investment Restrictions As Industrial Policy: The Case Of Canadian Telecommunications, Robert Crandall, Hal Singer Jan 2004

Foreign Investment Restrictions As Industrial Policy: The Case Of Canadian Telecommunications, Robert Crandall, Hal Singer

Canadian Journal of Law and Technology

We assess the economic harms that would accrue if Canada were to adopt asymmetric rules of foreign ownership for incumbent carriers and entrants. We explain the current Canadian regulatory climate surrounding foreign investment in Canadian telecommunications. Competition in the telecommunications industry is generally robust, which suggests that rules aimed at favouring entrants are not necessary. Moreover, Canadian entrants are equally capable of attracting foreign capital as Canadian incumbents, which suggests that foreign investment rules aimed at favouring entrants are especially unwise.

Next, we review the U.S. attempt to stimulate competition in local telecommunications markets through an analogous form of asymmetrical …


Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek Jan 2004

Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek

UIC Law Review

No abstract provided.


Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield Jan 2004

Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield

Articles by Maurer Faculty

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik Jan 2004

Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik

Faculty Publications

The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to address hacking and the growing problem of computer crime. Recently, however, in an attempt to control competition and maintain market share, a number of companies have sought to prevent entities they deem unwelcome from obtaining data on their websites. Utilizing the civil action provisions of the CFAA, these companies have surprisingly succeeded in convincing federal courts that hacking includes accessing and using the factual information a company has chosen to post on a publicly available website. Despite the fact that many of the …


Information Privacy In Virtual Worlds: Identifying Unique Concerns Beyond The Online And Offline Worlds, Tal Z. Zarksy Jan 2004

Information Privacy In Virtual Worlds: Identifying Unique Concerns Beyond The Online And Offline Worlds, Tal Z. Zarksy

NYLS Law Review

No abstract provided.