Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 48

Full-Text Articles in Computer Law

Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu Jul 2008

Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp Jul 2008

Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp

Indiana Law Journal

No abstract provided.


Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu Jun 2008

Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu Jun 2008

Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jun 2008

Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Tercer Congreso Nacional de Organismos Públicos Autónomos

"Autonomía, Reforma Legislativa y Gasto Público"


Vol. Ix, Tab 41 - Ex 23 - Email From John Ramsey (Rosetta Stone Corporate Counsel), John Ramsey Apr 2008

Vol. Ix, Tab 41 - Ex 23 - Email From John Ramsey (Rosetta Stone Corporate Counsel), John Ramsey

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 31 - Email From John Ramsey (Rosetta Corporate Counsel), John Ramsey Apr 2008

Vol. Ix, Tab 46 - Ex. 31 - Email From John Ramsey (Rosetta Corporate Counsel), John Ramsey

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vii, Tab 38 - Ex. 62 - Hagan Deposition (Former Google Managing Counsel - Trademarks, Jewelry Maker), Rose Hagan Mar 2008

Vol. Vii, Tab 38 - Ex. 62 - Hagan Deposition (Former Google Managing Counsel - Trademarks, Jewelry Maker), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vii, Tab 38 - Ex. 64 - Holden Deposition (Google Pm Director), Richard T. Holden Mar 2008

Vol. Vii, Tab 38 - Ex. 64 - Holden Deposition (Google Pm Director), Richard T. Holden

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 18 - Email From Gina Reinhold (Adwords Associate), Gina Reinhold Mar 2008

Vol. Ix, Tab 46 - Ex. 18 - Email From Gina Reinhold (Adwords Associate), Gina Reinhold

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 36 - Email From Michael Wu, Michael Wu Feb 2008

Vol. Vi, Tab 38 - Ex. 36 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 41 - Ex. 4 - Google Ad Partners All-Hands Q1 2008, Google Jan 2008

Vol. Ix, Tab 41 - Ex. 4 - Google Ad Partners All-Hands Q1 2008, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


What Is 'Private' Data?, Karen Mccullagh Jan 2008

What Is 'Private' Data?, Karen Mccullagh

Karen McCullagh

The development of a frontier-free Internal Market and of the so-called 'information society' have resulted in an increase in the flow of personal data between EU Member States. To remove potential obstacles to such transfers data protection legislation was introduced. One of the underpinning principles of Directive 95/46/EC is the protection of privacy. Yet, the legislation does not provide a conclusive understanding of the terms ‘privacy’ or ‘private’ data. Rather, privacy protection is to be achieved through the regulation of the conditions under which personal data may be processed. An assessment of whether, 10 years after the enactment of the …


The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti Jan 2008

The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the threats accompanying online shopping, such as identity theft and aggregated data files. Such issues arise when companies carelessly lose laptops filled with unencrypted data or callously sell data on the open market with collected personally identifying information (PII). The article explains that although privacy policies are supposed to force companies to strengthen their privacy practices they are not always effective because companies often post inconspicuous, vague and legalese-filled policies. These ambiguous postings cause online shoppers to blindly submit PII and ignore privacy practices completely. The article proposes a solution to this problem through the standardization …


United States V. Andrus: Password Protect Your Roommate, Not Your Computer, 26 J. Marshall J. Computer & Info. L. 183 (2008), Sarah M. Knight Jan 2008

United States V. Andrus: Password Protect Your Roommate, Not Your Computer, 26 J. Marshall J. Computer & Info. L. 183 (2008), Sarah M. Knight

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the decision in United States v. Andrus, where it was determined that the police could obtain consent from a father to search an adult son’s computer without first checking if the father who gave consent know the password and therefore had apparent authority to search. The police used Encase, software designed to make a forensic copy of a hard drive, without even turning on the computer. The 10th Circuit majority opinion decided the police committed no error when they conducted the search. The article’s author argues that the dissenting opinion took the correct position in its …


Symbiotic Regulation, 26 J. Marshall J. Computer & Info. L. 207 (2008), Andrew Murray Jan 2008

Symbiotic Regulation, 26 J. Marshall J. Computer & Info. L. 207 (2008), Andrew Murray

UIC John Marshall Journal of Information Technology & Privacy Law

In this paper the author points out that complexity is at the heart of much of the work of today’s academia. The paper explains how the role of an academic researcher may be defined as studying and modelling complexity in an effort to make it accessible to a wider audience. This article models the complexity of regulatory relationships in communications networks and in particular the Internet. First, the article models the complexity of the regulatory environment. Next, it explains how regulators may harness the power of the network to achieve effective regulatory settlements by harnessing symbiotic regulation. Finally, it explains …


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law:Summary Of Bench Memorandum, 26 J. Marshall J. Computer & Info. L. 259 (2008), Robin Ficke, James Lai, Steven Tseng, Panagiota Kelali Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law:Summary Of Bench Memorandum, 26 J. Marshall J. Computer & Info. L. 259 (2008), Robin Ficke, James Lai, Steven Tseng, Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Petitioner, Alex Romero (“Romero”), appeals to the Marshall Supreme Court from an order granting summary judgment in favor of Respondent, Windbucket Entertainment, LLC (“Windbucket”). Romero’s lawsuit alleged that Windbucket and a third party (not a party to the present appeal) were liable to him for invasion of privacy by intrusion upon seclusion. Romero then sought discovery sanctions against Windbucket for violations of Marshall Rule of Civil Procedure 37. The issues in the case concern whether a subscriber to an Internet-based, multiplayer computer game can state a valid invasion of privacy claim against the game’s publisher, when liability is based on …


Wikipedia Made Law? The Federal Judicial Citation Of Wikipedia, 26 J. Marshall J. Computer & Info. L. 229 (2008), Amber Lynn Wagner Jan 2008

Wikipedia Made Law? The Federal Judicial Citation Of Wikipedia, 26 J. Marshall J. Computer & Info. L. 229 (2008), Amber Lynn Wagner

UIC John Marshall Journal of Information Technology & Privacy Law

In this comment the author examines the new and growing body of federal opinions citing Wikipedia an authoritative source. The comment details how Wikipedia articles are generated, and the ease with which anyone can edit them, to illustrate their shortcomings as sources for making judicial determinations. The author provides examples of federal cases where judges rely on Wikipedia to define terms ranging from colloquial phrases to medical equipment. The author points out that in spite of several academic institutions and the U.S. Trade and Patent Office banning it as a source, federal judges continue to rely on Wikipedia in their …


Opening The Red Cross International Tracing Service Archive, 26 J. Marshall J. Computer & Info. L. 161 (2008), Kenneth Waltzer Jan 2008

Opening The Red Cross International Tracing Service Archive, 26 J. Marshall J. Computer & Info. L. 161 (2008), Kenneth Waltzer

UIC John Marshall Journal of Information Technology & Privacy Law

The Red Cross International Tracing Service Archive in Bad Arolsen contains nearly 17.5 million names and nearly 50 million World War II and post-war era documents. The Bonn Accords designated the International Tracing Service (“ITS”) as the sole caretaker of these documents. A recent revision to the Bonn Accords has resulted in a reopening of archives at Bad Arolsen. ITS has started to digitize materials, and the data has been distributed to designated research institutions. The revision also resulted in access to the archives for research purposes. This expanded availability of the information has raised a number of important questions …


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 26 J. Marshall J. Computer & Info. L. 283 (2008), David Caras, Jennifer Robbins, Zach Rudisill Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 26 J. Marshall J. Computer & Info. L. 283 (2008), David Caras, Jennifer Robbins, Zach Rudisill

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Beyond Whiffle-Ball Bats: Addressing Identity Crime In An Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008), Erin Kenneally, Jon Stanley Jan 2008

Beyond Whiffle-Ball Bats: Addressing Identity Crime In An Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008), Erin Kenneally, Jon Stanley

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses the challenges to the protection of private personal information in the age of rapid technological changes and advances with a particular focus on the explosion of Identity Theft Crime (IDC). The paper highlights the compartmentalized and imbalanced roles that the free market and law enforcement (LE) play in response to this emerging threat to privacy, the implications of this dynamic, and recommendations for improving the societal risk management of Identity Crime.


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 26 J. Marshall J. Computer & Info. L. 321 (2008), Adam Powell, Erin Blake, Kris Kokotayo Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 26 J. Marshall J. Computer & Info. L. 321 (2008), Adam Powell, Erin Blake, Kris Kokotayo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Internet Infrastructure And Online Alternative Dispute Resolution, 25 J. Marshall J. Computer & Info. L. 217 (2008), Haitham A. Haloush Jan 2008

Internet Infrastructure And Online Alternative Dispute Resolution, 25 J. Marshall J. Computer & Info. L. 217 (2008), Haitham A. Haloush

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


All Or Nothing: This Is The Question? The Application Of Article 3(2) Data Protection Directive 95/46/Ec To The Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008), Rebecca Wong, Joseph Savirimuthu Jan 2008

All Or Nothing: This Is The Question? The Application Of Article 3(2) Data Protection Directive 95/46/Ec To The Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008), Rebecca Wong, Joseph Savirimuthu

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger Jan 2008

Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dancing In The Rain: Who Is Your Partner In The Corporate Boardroom?, 25 J. Marshall J. Computer & Info. L. 267 (2008), Maureen Duffy-Lewis, Daniel B. Garrie Jan 2008

Dancing In The Rain: Who Is Your Partner In The Corporate Boardroom?, 25 J. Marshall J. Computer & Info. L. 267 (2008), Maureen Duffy-Lewis, Daniel B. Garrie

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 25 J. Marshall J. Computer & Info. L. 337 (2008), Joshua Deitz, Kakuti Lin, Lindsey Shinn Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 25 J. Marshall J. Computer & Info. L. 337 (2008), Joshua Deitz, Kakuti Lin, Lindsey Shinn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Deadly Combinations: A Framework For Analyzing The Gpl’S Viral Effect, 25 J. Marshall J. Computer & Info. L. 487 (2008), Ron Phillips Jan 2008

Deadly Combinations: A Framework For Analyzing The Gpl’S Viral Effect, 25 J. Marshall J. Computer & Info. L. 487 (2008), Ron Phillips

UIC John Marshall Journal of Information Technology & Privacy Law

Free and Open Source Software (FOSS) is free to use and can be downloaded from the Internet. This paper argues that adaptations that combine community source licensed software with an organization’s own intellectual property can trigger “viral” terms of the community source licenses in unexpected ways. The author proposes a model framework for analyzing software combinations to determine whether the viral terms are triggered, and illustrate that analysis against various technical combinations of community-sourced and proprietary software. Author Footnote: Vice President and General Counsel, Serlio Software Development Corporation; J.D. MarquetteUniversity Law School; B.S. University of Washington.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 25 J. Marshall J. Computer & Info. L. 371 (2008), Stacy Appleton, Adam Butkus, Nick Mutton Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 25 J. Marshall J. Computer & Info. L. 371 (2008), Stacy Appleton, Adam Butkus, Nick Mutton

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.