Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Copyright law (2)
- SSRN (2)
- Advertising (1)
- Article 2B (1)
- Audio Home Recording Act (AHRA) (1)
-
- Author exploiter contract (1)
- Berkeley Technology Law Journal (1)
- Big Data (1)
- Chicago-Kent Law Review (1)
- Columbia Law Review (1)
- Computation (1)
- Congressional oversight (1)
- Constitutional powers (1)
- Consumption (1)
- Copyleft (1)
- Copyright Act (1)
- Copyright control (1)
- Copyright infringement (1)
- Copyright license (1)
- Copyright owner (1)
- Cyber-attacks (1)
- Cyber-operations (1)
- Cyberlaw (1)
- Cyberwar (1)
- Data mining (1)
- Databases (1)
- Defend Forward (1)
- Digital Millennium Copyright Act (DMCA) (1)
- Digital communication (1)
- Enforcement (1)
Articles 1 - 8 of 8
Full-Text Articles in Internet Law
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.
Whither (Not Wither) Copyleft, Eben Moglen
Whither (Not Wither) Copyleft, Eben Moglen
Faculty Scholarship
This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Faculty Scholarship
The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Faculty Scholarship
In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."
To what extent is …
A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg
A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg
Faculty Scholarship
Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …
Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen
Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen
Faculty Scholarship
The subject matter we are going to talk about is variously named and thewords have some resonances of importance. I am going to use the phrase "Free Software" to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.
My purpose this …
Copyright And Control Over New Technologies Of Dissemination, Jane C. Ginsburg
Copyright And Control Over New Technologies Of Dissemination, Jane C. Ginsburg
Faculty Scholarship
The relationship of copyright to new technologies that exploit copyrighted works is often perceived to pit copyright against progress. Historically, when copyright owners seek to eliminate a new kind of dissemination, and when courts do not deem that dissemination harmful to copyright owners, courts decline to find infringement. However, when owners seek instead to participate in and be paid for the new modes of exploitation, the courts, and Congress, appear more favorable to copyright control over that new market. Today, the courts and Congress regard the unlicensed distribution of works over the Internet as impairing copyright owners' ability to avail …
Authors As "Licensors" Of "Informational Rights" Under U.C.C. Article 2b, Jane C. Ginsburg
Authors As "Licensors" Of "Informational Rights" Under U.C.C. Article 2b, Jane C. Ginsburg
Faculty Scholarship
U.C.C. Articles 2B of the Uniform Commercial Code was designed primarily to regulate online and mass market transactions, particularly the licensing of computer software. Its effects, however, will extend to authors of works other than computer software. This Article considers the effects Article 2B would have on dealings between those authors and the exploiters of the authors' works. By reducing procedural barriers to the formation of licenses, Article 2B would make it all too easy for an author to assent to contract terms that may heavily favor an exploiter of the author's work. On the other hand, default contract terms …