Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

2005

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 40

Full-Text Articles in Intellectual Property Law

Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy Nov 2005

Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy

ExpressO

17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.

Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


Once And Future Copyright, James Gibson Nov 2005

Once And Future Copyright, James Gibson

Law Faculty Publications

Copyright is like a well-meaning but ultimately bothersome friend, eager to help but nearly impossible to get rid of. It attaches indiscriminately to the simplest acts of expression, without regard for whether the author needs or wants its protection. This automatic propertization made sense in the print era, when mass distribution of information was an expensive process rarely undertaken by those with no plans to profit from their creativity. It makes little sense today. The following article shows that copyright's overly solicitous nature is the source of several seemingly unrelated and intractable problems - e.g., closed code, copyright as censorship, …


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Oct 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


Vol. Vi, Tab 38 - Ex. 30 - Email From Nino Ninov, Nino Ninov Aug 2005

Vol. Vi, Tab 38 - Ex. 30 - Email From Nino Ninov, Nino Ninov

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 31 - Survey Of Rosetta Stone Brand Health, Rosetta Stone Aug 2005

Vol. Vi, Tab 38 - Ex. 31 - Survey Of Rosetta Stone Brand Health, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Unmasking The John Does Of Cyberspace: Surveillance By Private Copyright Owners, Amy Min-Chee Fong Aug 2005

Unmasking The John Does Of Cyberspace: Surveillance By Private Copyright Owners, Amy Min-Chee Fong

Canadian Journal of Law and Technology

The goals of this paper are to: (1) explore the expectations of cyberspace privacy in a peer-to-peer context; (2) examine the consequences to Internet users arising from the surveillance tactics of private copyright owners; and (3) discuss possible ways in which a balance can be achieved between privacy and intellectual property rights. Part II of this paper sets out the meaning of information privacy, discusses the widespread use of peer-to-peer networks for trading copyrighted content, and examines the expectations of privacy in peer-to-peer networks. Part III discusses the surveillance tactics of private copyright owners, and explains how the surveillance of …


What The Dormouse Said: How The Sixties Counterculture Shaped The Personal Computer By John Markoff (New York: Penguin, 2005), Vaughan Black Aug 2005

What The Dormouse Said: How The Sixties Counterculture Shaped The Personal Computer By John Markoff (New York: Penguin, 2005), Vaughan Black

Canadian Journal of Law and Technology

What the Dormouse Said is the revisionary back- story of Silicon Valley; in particular, the roots of the current model of human interface with personal com- puters (video screen, keyboard, mouse) and the early stabs at creating the Internet. Markoff is a long-standing hi-tech reporter for the New York Times who, over the past 20 years, has co-written three computer-related books. In Dormouse, his fourth book (but first solo effort), he takes us back to the pre-ironic age — ‘‘the Flintstones era of computers’’ — when batch processing and beatniks still roamed the earth. His claim is that the various …


The Role Of Levies In Canada's Digital Music Marketplace, Jeremy F. Debeer Aug 2005

The Role Of Levies In Canada's Digital Music Marketplace, Jeremy F. Debeer

Canadian Journal of Law and Technology

This paper considers whether such initiatives are a desirable alternative to the current system of exclusive proprietary copyrights. My goal is not to evaluate the nuances of any particular levy scheme or proposal, but to consider the implications of the concept from a specifically Canadian perspective. Despite the generality of the analysis, many of the observations and conclusions about the viability of levy schemes relate to Canada’s actual experiences with its existing private copying levy.

The paper concludes that tariffs or levies on the products and services of third parties are not the best method to support the Canadian music …


Cryptography Export Controls - Canada's Dichotomous Cryptography Policy, Paul Bates Aug 2005

Cryptography Export Controls - Canada's Dichotomous Cryptography Policy, Paul Bates

Canadian Journal of Law and Technology

The effort to erect strong legal barriers to trans-national distribution of cryptography has significant gaps because strong cryptography can be obtained and used within Canada without legal restrictions. This paper advocates that Canada should exercise its discretion under the WA to diminish, not fortify, the restrictions of the export control regime.


Creative Commons And The New Intermediaries, Michael W. Carroll Aug 2005

Creative Commons And The New Intermediaries, Michael W. Carroll

Working Paper Series

This symposium contribution examines the disintermediating and reintermediating roles played by Creative Commons licenses on the Internet. Creative Commons licenses act as a disintermediating force because they enable end-to-end transactions in copyrighted works. The licenses have reintermediating force by enabling new services and new online communities to form around content licensed under a Creative Commons license. Intermediaries focused on the copyright dimension have begun to appear online as search engines, archives, libraries, publishers, community organizers, and educators. Moreover, the growth of machine-readable copyright licenses and the new intermediaries that they enable is part of a larger movement toward a Semantic …


From International Law To Law And Globalization, Paul Schiff Berman Jul 2005

From International Law To Law And Globalization, Paul Schiff Berman

ExpressO

International law’s traditional emphasis on state practice has long been questioned, as scholars have paid increasing attention to other important – though sometimes inchoate – processes of international norm development. Yet, the more recent focus on transnational law, governmental and non-governmental networks, and judicial influence and cooperation across borders, while a step in the right direction, still seems insufficient to describe the complexities of law in an era of globalization. Accordingly, it is becoming clear that “international law” is itself an overly constraining rubric and that we need an expanded framework, one that situates cross-border norm development at the intersection …


Towards A Cosmopolitan Vision Of Conflict Of Laws: Redefining Governmental Interests In A Global Era, Paul Schiff Berman Jul 2005

Towards A Cosmopolitan Vision Of Conflict Of Laws: Redefining Governmental Interests In A Global Era, Paul Schiff Berman

ExpressO

It has now been ten years since the idea of global online communication first entered the popular consciousness. And while the internet has undoubtedly opened up new worlds of interaction and cooperation across borders, this increased transnational activity has also at times inspired parochialism, at least among the legislatures and courts of nation-states around the globe. Thus, we have seen a slew of national laws and court decisions purporting to regulate a wide variety of online activities, from gambling to chat rooms to auction sites, and seeking to enforce territorially based rules regarding trademarks, contractual relations, privacy norms, “indecent” content, …


Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens Jul 2005

Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens

ExpressO

The article discusses broadly the music piracy problem in Russia, the current state of Russia’s copyright laws, and how its laws and problems compare to the U.S. and the rest of the world. In particular, the article focuses on music piracy through the Internet and how it has exploded in Russia. One of the websites I target is the infamous Allofmp3.com, which has attracted a large amount of U.S. attention in recent times by consumers as well as lawmakers. The article analyzes the legislative and enforcement deficiencies in Russia that led to the enormous problem with traditional music piracy and …


Vol. Ix, Tab 41 - Ex. 24 - Fax From Allstate Insurance Company, Allstate Insurance Company May 2005

Vol. Ix, Tab 41 - Ex. 24 - Fax From Allstate Insurance Company, Allstate Insurance Company

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton May 2005

The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton

ExpressO

The Digital Millennium Copyright Act (‘DMCA’) prevents unauthorized copying and distribution of digital copyright works by regulating devices that can be used to circumvent Digital Rights Management (‘DRM’) measures that are used to restrict access to those works. A significant problem is that those devices, like many new technologies, have the potential to be used for both socially harmful and socially beneficial purposes. There is no obvious way for Congress to regulate circumvention devices to prevent the social harms, while at the same time facilitating the social benefits they might provide. Recent judicial interpretations of the DMCA have unsurprisingly erred …


An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann Apr 2005

An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann

ExpressO

In this article, Professor Frischmann combines a number of current debates across many disciplinary lines, all of which examine from different perspectives whether certain resources should be managed through a regime of private property or through a regime of open access. Frischmann develops and applies a theory that demonstrates there are strong economic arguments for managing and sustaining openly accessible infrastructure. The approach he takes differs from conventional analyses in that he focuses extensively on demand-side considerations and fully explores how infrastructure resources generate value for consumers and society. As a result, the theory brings into focus the social value …


Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly Apr 2005

Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly

Michigan Telecommunications & Technology Law Review

This Paper places the current debates about software patents in the historical context of patenting in the information technology industries. The first computer-program products were sold in the mid 1960s when software patents were not generally allowed; as a result, trade secrecy became endemic to the software industry. Software products were also protected by copyright, but in practice this offered little protection against most forms of appropriation by reverse engineering or cloning. By the early 1980s a series of landmark cases led to the acceptance of software patents. It is argued that this development was consistent with the patenting of …


Rising Governmental Use Of Biometric Technology: An Analysis Of The United States Visitor And Immigrant Status Indicator Technology Program, Lisa Madelon Campbell Apr 2005

Rising Governmental Use Of Biometric Technology: An Analysis Of The United States Visitor And Immigrant Status Indicator Technology Program, Lisa Madelon Campbell

Canadian Journal of Law and Technology

This article explores increased governmental interest in the use of biometric measurements as a means of identifying individuals and tracing their movements. Private industries, of course, are equally interested in biometrics, and often similarly capable of collecting and storing biometric information. For example, merchants in the United Kingdom require customers who pay by cheque to provide a thumbprint as an additional security measure against potential fraud. The issues raised by the use of biometrics in the private sector are somewhat different than those that arise in the public context. This article explores the increased reli- ance upon individual biometric measurements …


I Click, You Click, We All Click - But Do We Have A Contract? A Case Comment On Aspenceri.Com V. Paysystems, Charles Morgan Apr 2005

I Click, You Click, We All Click - But Do We Have A Contract? A Case Comment On Aspenceri.Com V. Paysystems, Charles Morgan

Canadian Journal of Law and Technology

It is trite to say that e-commerce has exploded over the last several years. Canadian individuals and businesses are entering into thousands and thousands of contracts online all the time. Yet, oddly enough, there is surprisingly little legal certainty or consistency regarding an essential legal question: what approach to online contract formation will create a binding legal contract? Such legal uncertainty is unfortunate, since buyers need to know when to ‘‘beware’’, merchants need to be able to manage risk, and courts need to have clear guidelines in order to be able to render informed, coherent decisions.

The issue of online …


Intelligent Agents: Authors, Makers, And Owners Of Computer-Generated Works In Canadian Copyright Law, Rex M. Shoyama Apr 2005

Intelligent Agents: Authors, Makers, And Owners Of Computer-Generated Works In Canadian Copyright Law, Rex M. Shoyama

Canadian Journal of Law and Technology

The central objective of this article is to propose a clarification of copyright law as applied to works created by intelligent agents. In Part I, the concepts of artificial intelligence and intelligent agents are introduced. Part II identifies the challenges that are presented to the tests of originality and authorship in the application of copyright to works generated by intelligent agents. It is argued that works created by intelligent agents may meet the tests of originality and authorship. It is also argued that the con- cepts of ‘‘author’’, ‘‘owner’’, and ‘‘maker’’ are distinct from one another in Canadian copyright law. …


L'Affaire Huntsman C. Soderbergh Ou Le Droit D'Expurger Les Films, René Pépin Apr 2005

L'Affaire Huntsman C. Soderbergh Ou Le Droit D'Expurger Les Films, René Pépin

Canadian Journal of Law and Technology

Deux éléments nous motivent. D’abord, comme on le devine, la technologie évolue à un rythme rapide en ce domaine. On n’en est plus au temps où les films étaient produits unique- ment sur une véritable pellicule de plastique qu’un censeur pouvait insérer dans une machine qui lui permettait littéralement de couper des parties indésirables et de recoller les embouts. L’informatique a envahi ce domaine. Il y a maintenant des logiciels sophistiqués qui agissent comme interface entre un disque DVD et l’écran, permettant au consommateur de choisir lui-même les séquences qui seront enlevées dans un film. On comprend que ceci pose …


Biotechnology Unglued: Science, Society, And Social Cohesion By Michael D. Mehta, Ed. (Vancouver: Ubc Press, 2005), Chidi Oguamanam Apr 2005

Biotechnology Unglued: Science, Society, And Social Cohesion By Michael D. Mehta, Ed. (Vancouver: Ubc Press, 2005), Chidi Oguamanam

Canadian Journal of Law and Technology

In Biotechnology Unglued, Mehta and his thirteen-member interdisciplinary team, comprising mainly of social scientists using a number of ‘‘case studies’’, explore in nine essays ‘‘how advances in agricultural, medical, and forensic biotechnology may threaten the social cohesiveness of different kinds of communities and at different scales’’. In a way, the project is a successful attempt to underscore the theme of (and imperative for) social accountability of science and bio/technological innovations. This 208-page collection of nine essays in a corresponding number of chapters is a remarkable effort. It is a departure from the traditional concerns regarding biotechnology innovations which, hitherto, emphasized …


Virtual Playgrounds And Buddybots: A Data-Minefield For Tweens, Valerie Steeves, Ian R. Kerr Apr 2005

Virtual Playgrounds And Buddybots: A Data-Minefield For Tweens, Valerie Steeves, Ian R. Kerr

Canadian Journal of Law and Technology

This article examines the online places where tweens play, chat, and hang out. We argue that the vision behind these places is defined by commercial imperatives that seek to embed surveillance deeper and deeper into children’s playgrounds and social interactions. Online marketers do more than implant branded products into a child’s play; they collect the minute details of a child’s life so they can build a ‘‘relationship’’ of ‘‘trust’’ between the child and brand. Although marketing to children is not new, a networked environment magnifies the effect on a child’s identity because it opens up a child’s private online spaces …


Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn Mar 2005

Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn

ExpressO

This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …


The Law Of Unintended Consequences: The Digital Millennium Copyright Act And Interoperability, Jacqueline Lipton Mar 2005

The Law Of Unintended Consequences: The Digital Millennium Copyright Act And Interoperability, Jacqueline Lipton

Washington and Lee Law Review

The Digital Millennium Copyright Act (DMCA) has been criticized for many reasons, including its impact on the fair use defense to copyright infringement, and its potential to chill the free exchange of scientific, technical, and educational information. Law professors and special interest groups have opposed elements of the DMCA from its inception and continue to lobby for reform. One of the more recent concerns about the DMCA involves the incorporation of copyrightable software code into tangible goods for purposes related to the functionality of those goods. Some manufacturers of such products recently have attempted to use the DMCA to prevent …


Fundamentals Of Information Technology By Sunny Handa (Markham: Lexisnexis Canada Inc., 2004), Barbara Darby Jan 2005

Fundamentals Of Information Technology By Sunny Handa (Markham: Lexisnexis Canada Inc., 2004), Barbara Darby

Canadian Journal of Law and Technology

In the early 1990s, I purchased my first stereo with a CD player. I found myself trapped in a conversation with someone who tried to convince me that it was utter folly not to buy a turntable, because CD technology simply couldn’t replicate the ‘‘warmth’’ of vinyl. Had I only Handa’s book to hand, I could have provided a straight- forward and understandable explanation for why my records were well enough left in my parents’ basement; although ‘‘digitization . . . fails to record all characteristics of analog data, even at the highest finite sampling rate . . . Complete …


Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer Jan 2005

Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer

UIC John Marshall Journal of Information Technology & Privacy Law

Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …


"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long Jan 2005

"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to …