Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Internet Law

Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Whither (Not Wither) Copyleft, Eben Moglen Jan 2017

Whither (Not Wither) Copyleft, Eben Moglen

Faculty Scholarship

This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg Jan 2007

A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg

Faculty Scholarship

Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …


Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen Jan 2004

Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen

Faculty Scholarship

The subject matter we are going to talk about is variously named and thewords have some resonances of importance. I am going to use the phrase "Free Software" to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.

My purpose this …


Copyright And Control Over New Technologies Of Dissemination, Jane C. Ginsburg Jan 2001

Copyright And Control Over New Technologies Of Dissemination, Jane C. Ginsburg

Faculty Scholarship

The relationship of copyright to new technologies that exploit copyrighted works is often perceived to pit copyright against progress. Historically, when copyright owners seek to eliminate a new kind of dissemination, and when courts do not deem that dissemination harmful to copyright owners, courts decline to find infringement. However, when owners seek instead to participate in and be paid for the new modes of exploitation, the courts, and Congress, appear more favorable to copyright control over that new market. Today, the courts and Congress regard the unlicensed distribution of works over the Internet as impairing copyright owners' ability to avail …


Authors As "Licensors" Of "Informational Rights" Under U.C.C. Article 2b, Jane C. Ginsburg Jan 1998

Authors As "Licensors" Of "Informational Rights" Under U.C.C. Article 2b, Jane C. Ginsburg

Faculty Scholarship

U.C.C. Articles 2B of the Uniform Commercial Code was designed primarily to regulate online and mass market transactions, particularly the licensing of computer software. Its effects, however, will extend to authors of works other than computer software. This Article considers the effects Article 2B would have on dealings between those authors and the exploiters of the authors' works. By reducing procedural barriers to the formation of licenses, Article 2B would make it all too easy for an author to assent to contract terms that may heavily favor an exploiter of the author's work. On the other hand, default contract terms …