Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 121 - 136 of 136

Full-Text Articles in Computer Law

The Search Interest In Contract, Joshua Fairfield Jan 2007

The Search Interest In Contract, Joshua Fairfield

Articles by Maurer Faculty

Parties often do not negotiate for contract terms. Instead, parties search for the products, terms, and contractual counterparties they desire. The traditional negotiation-centered view of contract leads courts to try to determine the meaning of the parties where no meaning was negotiated and to waste time determining the benefits of bargains that were never struck. Further, while courts have ample tools to validate specifically negotiated contract terms, they lack the tools to respond to searched-for terms. Although the law and literature have long recognized that there is a disconnect between the legal fictions of negotiation and the reality of contracting …


The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann Jan 2007

The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann

Faculty Scholarship

We analyze the characteristics of the patents held by firms in the software industry. Unlike prior researchers, we rely on the examination of individual patents to determine which patents involve software inventions. This method of identifying the relevant patents is more laborious than the methods that previous scholars have used, but it produces a data set from which we can learn more about the role of patents in the software industry. In general, we find that patents the computer technology firms obtain on software inventions have more prior art references, claims, and forward citations than the patents that the same …


Comparison Between U.S. And E.U. Antitrust Treatment Of Tying Claims Against Microsoft: When Should The Bundling Of Computer Software Be Permitted, James F. Ponsoldt, Christohper D. David Jan 2007

Comparison Between U.S. And E.U. Antitrust Treatment Of Tying Claims Against Microsoft: When Should The Bundling Of Computer Software Be Permitted, James F. Ponsoldt, Christohper D. David

Northwestern Journal of International Law & Business

This article will analyze the recent U.S. and E.U. judicial approaches to tying charges which stem from software bundling. Part II reviews U.S. tying jurisprudence both generally and as applied to software bundling. Part III outlines the D.C. Circuit's approach to Microsoft's Windows/Internet Explorer bundle. Part IV briefly covers tying jurisprudence in the European Union. Part V describes the European Commission's ("E.C.") analysis of Microsoft's Window/Windows Media Player bundle. By comparing the two approaches, Part VI shows that neither approach is ideal: although the U.S. approach offers too little guidance to software manufacturers seeking to avoid liability and unduly discounts …


A/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes A Hard Line Against Child Predators In United States V. Tykarsky, Elizabeth D. Tempio Jan 2007

A/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes A Hard Line Against Child Predators In United States V. Tykarsky, Elizabeth D. Tempio

Villanova Law Review

No abstract provided.


Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper Jan 2007

Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper

UIC Law Review

No abstract provided.


Database Protection In The United States Is Alive And Well: Comments On Davison, Marshall A. Leaffer Jan 2007

Database Protection In The United States Is Alive And Well: Comments On Davison, Marshall A. Leaffer

Articles by Maurer Faculty

No abstract provided.


Notification Of Data Security Breaches, Paul M. Schwartz, Edward J. Janger Jan 2007

Notification Of Data Security Breaches, Paul M. Schwartz, Edward J. Janger

Michigan Law Review

The law increasingly requires private companies to disclose information for the benefit of consumers. The latest examples of such regulation are state and federal laws that require companies to notify individuals of data security incidents involving their personal information. These laws, proposed in the wake of highly publicized data spills, seek to punish the breached entity and to protect consumers by requiring the entity to notify its customers about the security breach. There are competing approaches, however to how the law is to mandate release of information about data leaks. This Article finds that the current statutes' focus on reputational …


"Stranger Than Fiction": Taxing Virtual Worlds, Leandra Lederman Jan 2007

"Stranger Than Fiction": Taxing Virtual Worlds, Leandra Lederman

Articles by Maurer Faculty

Virtual worlds, including massive multi-player on-line role-playing games (game worlds), such as City of Heroes, Everquest, and World of Warcraft, have become popular sources of entertainment. Game worlds provide scripted contexts for events such as quests. Other virtual worlds, such as Second Life, are unstructured virtual environments that lack specific goals but allow participants to socialize and engage virtually in such activities as shopping or attending a concert. Many of these worlds have become commodified, with millions of dollars of real-world trade in virtual items taking place every year. Most game worlds prohibit these real market transactions, but some worlds …


Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann Jan 2007

Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann

Faculty Scholarship

Software patents have been controversial since the days when "software" referred to the crude programs that came free with an IBM mainframe. Different perspectives have been presented in judicial, legislative, and administrative fora over the years, and the press has paid as much attention to this issue as it has to any other intellectual property topic during this time. Meanwhile, a software industry developed and has grown to a remarkable size, whether measured by revenues or profitability, number of firms or employees, or research expenditures. The scope of software innovation has become even broader, as an increasing number of devices …


A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg Jan 2007

A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg

Faculty Scholarship

Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …


The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski Jan 2007

The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski

Articles

Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.

The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …


Copyright And Breathing Space, Joseph Liu Dec 2006

Copyright And Breathing Space, Joseph Liu

Joseph P. Liu

According to the U.S. Supreme Court, copyright law's fair use and idea/expression doctrines are "built-in free speech safeguards" that establish a "definitional balance" between copyright and the First Amendment. Yet these "built-in free speech safeguards" are among the most uncertain and ill-defined doctrines in all of copyright law. If we accept the Supreme Court's statement that these doctrines play a critical role as First Amendment safety valves, it follows that the chilling effect of uncertainty in these doctrines has a constitutional dimension. Current copyright law doctrine, however, fails to take into account the potential chilling effect of copyright liability. This …


Enabling Copyright Consumers, Joseph P. Liu Dec 2006

Enabling Copyright Consumers, Joseph P. Liu

Joseph P. Liu

When is it acceptable for a company to help consumers engage in fair use of copyrighted works? One might think that the answer would be: “always.” After all, a fair use is a privileged use, which copyright grants to consumers of copyrighted works. Shouldn’t a company be entitled to help consumers do this in the most efficient way possible? Shouldn’t such a company, in fact, be lauded for making this process more efficient?
In fact, courts quite frequently hold companies liable for helping consumers engage in activities that would be fair or non-infringing uses if undertaken by consumers themselves. In …


Chapter 8 - The Contents Of On-Line Contracts, Eliza Mik Dec 2006

Chapter 8 - The Contents Of On-Line Contracts, Eliza Mik

Eliza Mik

No abstract provided.


Authorship In The Age Of The Conducer, Erez Reuveni Dec 2006

Authorship In The Age Of The Conducer, Erez Reuveni

Erez Reuveni

The age of centralized information production is over. Today, countless creative enterprises involve decentralized collaboration by hundreds of end-users. Yet, the Copyright Act's last major revision occurred over thirty years ago, when a centralized, corporate model of production was the primary means of delivering information products on a mass-market scale. This Article contends that several features of the Copyright Act, remnants of this earlier corporate-driven era, are outmoded and fail to offer optimal incentives for the decentralized, non-profit-driven model of creative production utilized by many in the software and information-production fields. Specifically, the Copyright Act assumes creativity stems from the …


Evolving Standards & The Future Of The Dmca Anticircumvention Rulemaking, Aaron K. Perzanowski Dec 2006

Evolving Standards & The Future Of The Dmca Anticircumvention Rulemaking, Aaron K. Perzanowski

Aaron K. Perzanowski

Every three years, the Copyright Office conducts a rulemaking to determine temporary exemptions from the Digital Millennium Copyright Act's (DMCA) anticircumvention provision. These exemptions are designed to prevent likely adverse impacts on noninfringing uses created by the prohibition on removing or bypassing technological protection measures that restrict access to copyrighted works. At the conclusion of the third and most recent rulemaking, the Librarian of Congress, acting on the advice of the Register of Copyrights, announced six classes of works exempt from the DMCA's anticircumvention provision for the three-year period ending October 27, 2009. This Article describes those exemptions and argues …