Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 67

Full-Text Articles in Computer Law

When Small Technology Is A Big Deal: Legal Issues Arising From Business Use Of Rfid, D. Zachary Hostetter Dec 2005

When Small Technology Is A Big Deal: Legal Issues Arising From Business Use Of Rfid, D. Zachary Hostetter

Washington Journal of Law, Technology & Arts

Radio Frequency Identification (“RFID”) is a wireless tracking technology. Goods fitted with radio tags can communicate with computers via radio waves, revolutionizing methods to locate and catalogue goods at every stage of the supply line. Current research predicts that 40% of all inventory intensive businesses will have such wireless tracking systems by the end of 2005. This article examines current legal trends that impact business use of RFID including contractual considerations to properly allocate risks attendant with implementation of RFID, FCC regulation of RFID, and consumer privacy concerns.


What's So Great About Nothing? The Gnu General Public License And The Zero-Price-Fixing Problem, Heidi S. Bond Dec 2005

What's So Great About Nothing? The Gnu General Public License And The Zero-Price-Fixing Problem, Heidi S. Bond

Michigan Law Review

In 1991, Linus Torvalds released the first version of the Linux operating system. Like many other beneficiaries of the subsequent dot-com boom, Torvalds worked on a limited budget. Clad in a bathrobe, clattering away on a computer purchased on credit, subsisting on a diet of pretzels and dry pasta, hiding in a tiny room that was outfitted with thick black shades designed to block out Finland's summer sun, Torvalds programmed Linux. Like some other beneficiaries of the subsequent dot-com boom, Torvalds created a product that is now used by millions. He owns stock options worth seven figures. Computer industry giants, …


"Electronic Fingerprints": Doing Away With The Conception Of Computer-Generated Records As Hearsay, Adam Wolfson Oct 2005

"Electronic Fingerprints": Doing Away With The Conception Of Computer-Generated Records As Hearsay, Adam Wolfson

Michigan Law Review

One night, in the hours just before daybreak, the computer servers at Acme Corporation's headquarters quietly hum in the silence of the office's darkened hallways. Suddenly, they waken to life and begin haphazardly sifting through their files. Several states away, a hacker sits in his room, searching through the mainframe via an internet connection. His attack is quick-lasting only a short five minutes-but the evidence of invasion is apparent to Acme's IT employees when they come in to work the next morning. Nearly a year later, federal prosecutors bring suit in the federal district court against the person they believe …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Defining Spyware: Necessary Or Dangerous, Andrew T. Braff Aug 2005

Defining Spyware: Necessary Or Dangerous, Andrew T. Braff

Washington Journal of Law, Technology & Arts

State legislation attempting to define and proscribe spyware has been criticized for either being under-inclusive or over-inclusive. This article provides an overview of the technology that is commonly considered spyware and examines the potential effects of attempting to legislatively define and curtail spyware as a specific technology. It concludes that a more appropriate method to regulate spyware would focus on prohibiting conduct associated with placing monitoring software on a computer and enforcing existing law regarding such conduct.


Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal And Civil Liability, And The Security Risks Of Wireless Networks, Anita Ramasastry, Jane Winn Aug 2005

Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal And Civil Liability, And The Security Risks Of Wireless Networks, Anita Ramasastry, Jane Winn

Washington Journal of Law, Technology & Arts

Wireless networking is growing in popularity because it is often cheaper and more convenient than other computer networking systems. Wireless networks, however, are also very hard to secure. Locating insecure wireless networks and advertising their locations is an activity known as “wardriving.” Exploiting the vulnerability of a wireless network to hack into the computer system or to monitor the wireless transmissions can give rise to liability under federal felony and misdemeanor statutes, as well as federal civil liability and liability under state law private causes of action. When introducing wireless networking into business information systems, system administrators should use all …


Unmasking The John Does Of Cyberspace: Surveillance By Private Copyright Owners, Amy Min-Chee Fong Aug 2005

Unmasking The John Does Of Cyberspace: Surveillance By Private Copyright Owners, Amy Min-Chee Fong

Canadian Journal of Law and Technology

The goals of this paper are to: (1) explore the expectations of cyberspace privacy in a peer-to-peer context; (2) examine the consequences to Internet users arising from the surveillance tactics of private copyright owners; and (3) discuss possible ways in which a balance can be achieved between privacy and intellectual property rights. Part II of this paper sets out the meaning of information privacy, discusses the widespread use of peer-to-peer networks for trading copyrighted content, and examines the expectations of privacy in peer-to-peer networks. Part III discusses the surveillance tactics of private copyright owners, and explains how the surveillance of …


What The Dormouse Said: How The Sixties Counterculture Shaped The Personal Computer By John Markoff (New York: Penguin, 2005), Vaughan Black Aug 2005

What The Dormouse Said: How The Sixties Counterculture Shaped The Personal Computer By John Markoff (New York: Penguin, 2005), Vaughan Black

Canadian Journal of Law and Technology

What the Dormouse Said is the revisionary back- story of Silicon Valley; in particular, the roots of the current model of human interface with personal com- puters (video screen, keyboard, mouse) and the early stabs at creating the Internet. Markoff is a long-standing hi-tech reporter for the New York Times who, over the past 20 years, has co-written three computer-related books. In Dormouse, his fourth book (but first solo effort), he takes us back to the pre-ironic age — ‘‘the Flintstones era of computers’’ — when batch processing and beatniks still roamed the earth. His claim is that the various …


The Role Of Levies In Canada's Digital Music Marketplace, Jeremy F. Debeer Aug 2005

The Role Of Levies In Canada's Digital Music Marketplace, Jeremy F. Debeer

Canadian Journal of Law and Technology

This paper considers whether such initiatives are a desirable alternative to the current system of exclusive proprietary copyrights. My goal is not to evaluate the nuances of any particular levy scheme or proposal, but to consider the implications of the concept from a specifically Canadian perspective. Despite the generality of the analysis, many of the observations and conclusions about the viability of levy schemes relate to Canada’s actual experiences with its existing private copying levy.

The paper concludes that tariffs or levies on the products and services of third parties are not the best method to support the Canadian music …


Cryptography Export Controls - Canada's Dichotomous Cryptography Policy, Paul Bates Aug 2005

Cryptography Export Controls - Canada's Dichotomous Cryptography Policy, Paul Bates

Canadian Journal of Law and Technology

The effort to erect strong legal barriers to trans-national distribution of cryptography has significant gaps because strong cryptography can be obtained and used within Canada without legal restrictions. This paper advocates that Canada should exercise its discretion under the WA to diminish, not fortify, the restrictions of the export control regime.


New Jersey’S Adult Internet Luring Statute: An Appropriate Next Step?, John W. Lomas Jr. Jun 2005

New Jersey’S Adult Internet Luring Statute: An Appropriate Next Step?, John W. Lomas Jr.

Duke Law & Technology Review

New Jersey recently enacted legislation prohibiting the use of the Internet to lure or entice someone to a location with the purpose of committing a crime with or against that person or some other person. Most states have similar laws pertaining to pedophiles, but this is the first adult Internet luring statute. State measures to regulate the Internet, even in the context of criminal justice, will likely face constitutional challenge since the Internet has become such a critical vehicle for both protected speech and interstate commerce. Furthermore, while the use of the Internet in the commission of crimes against other …


Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota May 2005

Hide It Or Unbundle It: A Comparison Of The Antitrust Investigations Against Microsoft In The U.S. And The E.U., Sue Ann Mota

The University of New Hampshire Law Review

[Excerpt] "Microsoft Corporation, the world’s largest software company, has been facing antitrust scrutiny globally. In the U.S., after what’s been called the antitrust trial of the century, a consent decree was reached between Microsoft, the United States government, and several states, that closely resembled the litigated remedy that the remaining states received. Only Massachusetts appealed the litigated remedy, which was approved by the appeals court on June 30, 2004. In the United States, Microsoft was required to hide, but not remove, the Internet Explorer browser on the Windows Operating System. While antitrust litigation was ongoing in the United States against …


Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly Apr 2005

Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly

Michigan Telecommunications & Technology Law Review

This Paper places the current debates about software patents in the historical context of patenting in the information technology industries. The first computer-program products were sold in the mid 1960s when software patents were not generally allowed; as a result, trade secrecy became endemic to the software industry. Software products were also protected by copyright, but in practice this offered little protection against most forms of appropriation by reverse engineering or cloning. By the early 1980s a series of landmark cases led to the acceptance of software patents. It is argued that this development was consistent with the patenting of …


Rising Governmental Use Of Biometric Technology: An Analysis Of The United States Visitor And Immigrant Status Indicator Technology Program, Lisa Madelon Campbell Apr 2005

Rising Governmental Use Of Biometric Technology: An Analysis Of The United States Visitor And Immigrant Status Indicator Technology Program, Lisa Madelon Campbell

Canadian Journal of Law and Technology

This article explores increased governmental interest in the use of biometric measurements as a means of identifying individuals and tracing their movements. Private industries, of course, are equally interested in biometrics, and often similarly capable of collecting and storing biometric information. For example, merchants in the United Kingdom require customers who pay by cheque to provide a thumbprint as an additional security measure against potential fraud. The issues raised by the use of biometrics in the private sector are somewhat different than those that arise in the public context. This article explores the increased reli- ance upon individual biometric measurements …


Computer Crime And Control In Hong Kong, Kam C. Wong Apr 2005

Computer Crime And Control In Hong Kong, Kam C. Wong

Washington International Law Journal

This Article is a first attempt to study cyberspace governance and computer crime control in Hong Kong. It begins with a discussion of how computer crime was "discovered" as a cognizable object of control. Next, it explores the nature, prevalence and distribution of computer crime in Hong Kong before embarking on a comprehensive review and critical analysis of the Hong Kong government's cyberspace governance philosophy and computer crime control policy. The Article closes with a number of recommendations for improving Hong Kong cyberspace governance, which focus on developing a broad, overarching policy that both meets the public's goals and addresses …


I Click, You Click, We All Click - But Do We Have A Contract? A Case Comment On Aspenceri.Com V. Paysystems, Charles Morgan Apr 2005

I Click, You Click, We All Click - But Do We Have A Contract? A Case Comment On Aspenceri.Com V. Paysystems, Charles Morgan

Canadian Journal of Law and Technology

It is trite to say that e-commerce has exploded over the last several years. Canadian individuals and businesses are entering into thousands and thousands of contracts online all the time. Yet, oddly enough, there is surprisingly little legal certainty or consistency regarding an essential legal question: what approach to online contract formation will create a binding legal contract? Such legal uncertainty is unfortunate, since buyers need to know when to ‘‘beware’’, merchants need to be able to manage risk, and courts need to have clear guidelines in order to be able to render informed, coherent decisions.

The issue of online …


Intelligent Agents: Authors, Makers, And Owners Of Computer-Generated Works In Canadian Copyright Law, Rex M. Shoyama Apr 2005

Intelligent Agents: Authors, Makers, And Owners Of Computer-Generated Works In Canadian Copyright Law, Rex M. Shoyama

Canadian Journal of Law and Technology

The central objective of this article is to propose a clarification of copyright law as applied to works created by intelligent agents. In Part I, the concepts of artificial intelligence and intelligent agents are introduced. Part II identifies the challenges that are presented to the tests of originality and authorship in the application of copyright to works generated by intelligent agents. It is argued that works created by intelligent agents may meet the tests of originality and authorship. It is also argued that the con- cepts of ‘‘author’’, ‘‘owner’’, and ‘‘maker’’ are distinct from one another in Canadian copyright law. …


L'Affaire Huntsman C. Soderbergh Ou Le Droit D'Expurger Les Films, René Pépin Apr 2005

L'Affaire Huntsman C. Soderbergh Ou Le Droit D'Expurger Les Films, René Pépin

Canadian Journal of Law and Technology

Deux éléments nous motivent. D’abord, comme on le devine, la technologie évolue à un rythme rapide en ce domaine. On n’en est plus au temps où les films étaient produits unique- ment sur une véritable pellicule de plastique qu’un censeur pouvait insérer dans une machine qui lui permettait littéralement de couper des parties indésirables et de recoller les embouts. L’informatique a envahi ce domaine. Il y a maintenant des logiciels sophistiqués qui agissent comme interface entre un disque DVD et l’écran, permettant au consommateur de choisir lui-même les séquences qui seront enlevées dans un film. On comprend que ceci pose …


Biotechnology Unglued: Science, Society, And Social Cohesion By Michael D. Mehta, Ed. (Vancouver: Ubc Press, 2005), Chidi Oguamanam Apr 2005

Biotechnology Unglued: Science, Society, And Social Cohesion By Michael D. Mehta, Ed. (Vancouver: Ubc Press, 2005), Chidi Oguamanam

Canadian Journal of Law and Technology

In Biotechnology Unglued, Mehta and his thirteen-member interdisciplinary team, comprising mainly of social scientists using a number of ‘‘case studies’’, explore in nine essays ‘‘how advances in agricultural, medical, and forensic biotechnology may threaten the social cohesiveness of different kinds of communities and at different scales’’. In a way, the project is a successful attempt to underscore the theme of (and imperative for) social accountability of science and bio/technological innovations. This 208-page collection of nine essays in a corresponding number of chapters is a remarkable effort. It is a departure from the traditional concerns regarding biotechnology innovations which, hitherto, emphasized …


Virtual Playgrounds And Buddybots: A Data-Minefield For Tweens, Valerie Steeves, Ian R. Kerr Apr 2005

Virtual Playgrounds And Buddybots: A Data-Minefield For Tweens, Valerie Steeves, Ian R. Kerr

Canadian Journal of Law and Technology

This article examines the online places where tweens play, chat, and hang out. We argue that the vision behind these places is defined by commercial imperatives that seek to embed surveillance deeper and deeper into children’s playgrounds and social interactions. Online marketers do more than implant branded products into a child’s play; they collect the minute details of a child’s life so they can build a ‘‘relationship’’ of ‘‘trust’’ between the child and brand. Although marketing to children is not new, a networked environment magnifies the effect on a child’s identity because it opens up a child’s private online spaces …


The Dormant Commerce Clause And State Regulation Of The Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?, Chin Pann Mar 2005

The Dormant Commerce Clause And State Regulation Of The Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?, Chin Pann

Duke Law & Technology Review

Several states have enacted statutes to protect minors from harmful or obscene materials disseminated over the Internet, as well as from pedophiles seeking to use the Internet to lure them into sexual conduct. State and federal courts have diverged in their analysis of the Dormant Commerce Clause's impact on state regulation in these areas. While state courts have held that the Dormant Commerce Clause does not invalidate state luring statutes, federal courts have been consistent in finding state dissemination statutes unconstitutional. This iBrief summarizes recent state and federal jurisprudence in this area and concludes that state courts have not been …


Plugging The “Phishing” Hole: Legislation Versus Technology, Robert Louis B. Stevenson Mar 2005

Plugging The “Phishing” Hole: Legislation Versus Technology, Robert Louis B. Stevenson

Duke Law & Technology Review

This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of "phishing." Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging personal information such as credit card numbers. While this legislation may provide some assistance in the fight against phishing, it is limited by the global nature of the Internet and the ease with which phishers can hide and avoid judgments. This iBrief therefore concludes that although the Anti-Phishing Act can play a supporting role in the battle, technological solutions are the most effective …


The Law Of Unintended Consequences: The Digital Millennium Copyright Act And Interoperability, Jacqueline Lipton Mar 2005

The Law Of Unintended Consequences: The Digital Millennium Copyright Act And Interoperability, Jacqueline Lipton

Washington and Lee Law Review

The Digital Millennium Copyright Act (DMCA) has been criticized for many reasons, including its impact on the fair use defense to copyright infringement, and its potential to chill the free exchange of scientific, technical, and educational information. Law professors and special interest groups have opposed elements of the DMCA from its inception and continue to lobby for reform. One of the more recent concerns about the DMCA involves the incorporation of copyrightable software code into tangible goods for purposes related to the functionality of those goods. Some manufacturers of such products recently have attempted to use the DMCA to prevent …


Tangible Cash For An Intangible Loss? Insurance Coverage For Damage Or Loss Or Third-Party Data, Kendall Bodden Feb 2005

Tangible Cash For An Intangible Loss? Insurance Coverage For Damage Or Loss Or Third-Party Data, Kendall Bodden

Washington Journal of Law, Technology & Arts

Will general business insurance cover liability for electronic data loss? A recent change to Commercial General Liability language specifies that data is not “tangible property” for CGL coverage. However, many companies may still be covered by older policies that do not contain this express exclusion. Case law interpreting the older policy language tends to deny coverage for the lost data itself, but successful claims have been made based on the loss of use of hardware caused by a data loss.


Tax Implications Of Using Out-Of-State Computer Servers, Paula K. Royalty Feb 2005

Tax Implications Of Using Out-Of-State Computer Servers, Paula K. Royalty

Washington Journal of Law, Technology & Arts

The majority of companies represented on the Internet rent third-party computer servers to host their web site and conduct ecommerce. Since the location of the server could be anywhere, states are losing sales and use tax revenue due to the increase in ecommerce from out-of-state companies. Hence, states are looking for ways to replace their lost revenue. In Quill Corp. v. North Dakota, the United States Supreme Court held that minimum contacts were no longer sufficient to establish nexus for purposes of local taxation, but instead required physical presence in the state. Renting electronic space in-state does not constitute …


When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal And Ethical Consequences Of The Failure To Remove Metadata, Jembaa Cole Feb 2005

When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal And Ethical Consequences Of The Failure To Remove Metadata, Jembaa Cole

Washington Journal of Law, Technology & Arts

There have been several instances in which seemingly innocuous metadata has wreaked professional and political havoc. Every electronic document has an invisible set of identifying data, its metadata. This Article explores consequences of ignoring metadata and suggests effective ways to tame metadata.


Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements Jan 2005

Virtually Free From Punishment Until Proven Guilty: The Internet, Web-Cameras And The Compelling Necessity Standard, Michael Clements

Richmond Journal of Law & Technology

Few legal maxims have had greater resonance than the tenet that one is innocent until proven guilty. It is a principle that has been traced back to Roman times, and it entered the American legal lexicon through the United States Supreme Court decision Coffin v. United States. It has even been incorporated in the United Nations’1948 Declaration of Human Rights under article eleven, section one.4


Fundamentals Of Information Technology By Sunny Handa (Markham: Lexisnexis Canada Inc., 2004), Barbara Darby Jan 2005

Fundamentals Of Information Technology By Sunny Handa (Markham: Lexisnexis Canada Inc., 2004), Barbara Darby

Canadian Journal of Law and Technology

In the early 1990s, I purchased my first stereo with a CD player. I found myself trapped in a conversation with someone who tried to convince me that it was utter folly not to buy a turntable, because CD technology simply couldn’t replicate the ‘‘warmth’’ of vinyl. Had I only Handa’s book to hand, I could have provided a straight- forward and understandable explanation for why my records were well enough left in my parents’ basement; although ‘‘digitization . . . fails to record all characteristics of analog data, even at the highest finite sampling rate . . . Complete …


No Place To Hide, 24 J. Marshall J. Computer & Info. L. 35 (2005), Robert J. O'Harrow Jr. Jan 2005

No Place To Hide, 24 J. Marshall J. Computer & Info. L. 35 (2005), Robert J. O'Harrow Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

Robert O’Harrow, Jr., a reporter on the financial and investigative team of the Washington Post, recipient of the 2003 Carnegie Melon and Cyber Security Reporting Award, and Pulitzer Prize finalist, lectures on topics from his recent book, No Place to Hide. He discusses how data mining began as a way for marketing companies to gain information about consumers and, as technology evolved, developed into a way for the government to monitor its citizens. O’Harrow contends that since the government is using private companies to collect this data, it skirts regulation and accountability for privacy infringements. After discussing the problems concerning …


The Failure Of The Rule Of Law In Cyberspace?: Reorienting The Normative Debate On Borders And Territorial Sovereignty, 24 J. Marshall J. Computer & Info. L. 1 (2005), H. Brian Holland Jan 2005

The Failure Of The Rule Of Law In Cyberspace?: Reorienting The Normative Debate On Borders And Territorial Sovereignty, 24 J. Marshall J. Computer & Info. L. 1 (2005), H. Brian Holland

UIC John Marshall Journal of Information Technology & Privacy Law

The purpose of this article is to suggest a different perspective on the issue of extraterritorial regulation in cyberspace. The article begins by outlining the Johnson-Post-Goldsmith debate which addressed the significance and legitimacy of physical, geographically-defined borders and territorial sovereignty in the regulation of cyberspace. The debate focused primarily on two areas of disagreement: First, whether and to what extent the architecture of the Internet is borderless or boundary-destroying, so as to be resistant to regulatory regimes grounded in territorial authority; and second, whether and to what extent a nation may legitimately exercise its regulatory power extraterritorially, particularly in the …