Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 153

Full-Text Articles in Computer Law

Back Matter Dec 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman Dec 2006

Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman

Federal Communications Law Journal

This Article calls for mandated "network neutrality," which would require broadband service providers to treat all nondestructive data equitably. The Author argues that neutral networks are preferable because they better foster online innovation and provide a more equitable distribution of the power to communicate. Without mandated network neutrality, providers in highly concentrated regional broadband markets will likely begin charging content providers for the right to send data to end users at the fastest speeds available. The Author demonstrates that regional broadband competition and forthcoming transmission technologies are unlikely to prevent broadband discrimination, ad hoc regulation under current statutory authority is …


The Five Indicia Of Virtual Property, Charles Blazer Dec 2006

The Five Indicia Of Virtual Property, Charles Blazer

The University of New Hampshire Law Review

[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.

“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …


Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan Nov 2006

Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth Nov 2006

Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth

Faculty Scholarship

Significant change is anticipated in the Japanese Consumption Tax. The Japanese Tax Commission is recommending that the rate should double, multiple rates should be employed, and the "bookkeeping method" of accounting should be abandoned in favor of the European "invoice method."

The Tax Commission faces a tax policy dilemma. The aging population drives the need for a tax increase (making the Consumption Tax an obvious target for revenue enhancement) at exactly the same time the population is shrinking in overall size, thereby reducing the number of working-consumers who can pay the higher tax.

These are dramatic changes for the Japanese …


Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran Nov 2006

Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran

ExpressO

Electronic agreements continue to fortify their presence in the digital commercial marketplace. Whether used to sell goods or services, or simply to define relationships, standardized electronic agreements have appeared in abundance in business-to-business or business-to-consumer transactions. Standardized electronic agreements, like their physical counterparts, offer the ability to address multiple concerns in a simple, efficient fashion. Although electronic contracts and electronic signatures have been accepted and promoted by federal and state governments, many fundamental aspects of contract law have been left for the courts to wrestle with when disputes arise.

Today, there are essentially two types of standardized electronic agreements—the click-through …


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens Nov 2006

Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens

ExpressO

Electronic contractual arrangements have raised complex legal issues unprecedented in the law. Technology s impact on traditional contract law doctrines is readily apparent in the dilemmas generated by recent developments in computer software, hardware, and Internet transactions. In such transactions, sellers have increasingly begun utilizing “clickwrap” agreements, whereby standard terms and conditions are displayed on the computer screen when the user attempts to access the seller’s services. Not surprisingly, the enforceability of clickwrap terms, which are often not known to the user until after payment, has become a subject of much debate in the courts. Because many of the clickwrap …


Copyright And Breathing Space, Joseph Liu Oct 2006

Copyright And Breathing Space, Joseph Liu

Joseph P. Liu

According to the U.S. Supreme Court, copyright law’s fair use and idea/expression doctrines are “built-in free speech safeguards” that establish a “definitional balance” between copyright and the First Amendment. Yet these “built-in free speech safeguards” are among the most uncertain and ill-defined doctrines in all of copyright law. If we accept the Supreme Court’s statement that these doctrines play a critical role as First Amendment safety valves, it follows that the chilling effect of uncertainty in these doctrines has a constitutional dimension. Current copyright law doctrine, however, fails to take into account the potential chilling effect of copyright liability. This …


Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García Oct 2006

Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García

Bruno L. Costantini García

Ponencia sobre la Ley Federal del Procedimiento Contencioso Administrativo, impartida por Bruno L. Costantini García.


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


The Legal Framework Surrounding Digital Rights Management Technologies, Joseph Liu Oct 2006

The Legal Framework Surrounding Digital Rights Management Technologies, Joseph Liu

Joseph P. Liu

Providing legal framework for digital rights management.


Front Matter Sep 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Decoding Cyberproperty, Francis G. Lastowka Sep 2006

Decoding Cyberproperty, Francis G. Lastowka

ExpressO

This article examines recent developments in both the doctrine and theory of legal cyberproperty rights. The first part of this article looks primarily at two seminal cases that might be considered bookends to the story of cyberproperty: Thrifty-Tel, Inc. v. Bezenek and Intel v. Hamidi. The second part of this article challenges two assumptions that act as theoretical and rhetorical engines driving arguments for cyberproperty. The first is the assumption that legal prohibitions against interactions with privately owned computing machinery are analogous, from a standpoint of law and policy, to traditional rights of exclusion from the use of or entry …


Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang Sep 2006

Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden Sep 2006

Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden

ExpressO

Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.

While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …


Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs Sep 2006

Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs

ExpressO

The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck Aug 2006

Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck

ExpressO

The Energy Research Advisory Board, the group of external scientific advisors that provided impartial expert advice to the Secretary of Energy since 1978, was disbanded this May. The Administration, like its predecessors, regularly replaces experts on agency advisory panels with ideologues and political allies. We are at the nadir of a historical progression since World War II away from trust in and use of scientific expertise in policymaking. This shift however, has not been countered with greater public participation. Instead, administrative law and theory have developed a model of the managerial administrative authority. The "expertocratic" agency relies on internal expertise …


Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers Aug 2006

Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers

ExpressO

The copyright fair use doctrine is a key to increasing access to knowledge and decreasing the digital divide between information-rich and information-poor countries. Publishers have sued Google for copyright infringement for scanning the copyrighted books of the publishers into a digital database, so Google users can search the database for certain words to determine what books contain words of interest to the user. The Google litigation, however, is only a small piece of the larger access to knowledge puzzle. The larger issue is access to the books themselves, translated into the native languages of citizens of developing countries. Yet copyright …


Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali Aug 2006

Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali

ExpressO

As the wave of outsourcing to India swells, there is growing concern about the inadequacies of the India legal system in protecting data being transferred to it from other nations for the purpose of processing. India has a smattering of laws that scantily address the issue of data privacy. Under pressure from the business processing industry in India, as well as from the European Union and other nations, it is but a matter of time before India adopts a slate of laws that address the issue of data protection. Once these laws are enacted, the main issue that remains is …


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Aug 2006

In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

ExpressO

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth Aug 2006

Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth

Faculty Scholarship

Biometric identifiers embedded in national identity cards puts a formerly impossible goal of consumption taxation within the grasp of policymakers for the first time. Never before has it been possible to design a broad-based, single rate consumption tax that is truly progressive.

No consumption tax has ever had all three of the critical attributes of a progressive consumption tax: a broad base, a single rate, and measured relief for those in greatest need. Although economists have urged that a broad base and a single rate be pursued over progressivity, most consumption taxes instead seek progressivity at the expense of both …


The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer Aug 2006

The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer

Canadian Journal of Law and Technology

This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.


Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds Aug 2006

Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds

Canadian Journal of Law and Technology

This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …