Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

2007

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 47

Full-Text Articles in Internet Law

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone Nov 2007

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Genographic Project: Traditional Knowledge And Population Genetics, Matthew Rimmer Oct 2007

The Genographic Project: Traditional Knowledge And Population Genetics, Matthew Rimmer

Matthew Rimmer

This article considers the debate over patent law, informed consent, and benefit-sharing in the context of biomedical research in respect of Indigenous communities. In particular, it focuses upon three key controversies over large-scale biology projects, involving Indigenous populations. These case studies are representative of the tensions between research organisations, Indigenous communities, and funding agencies. Section two considers the aims and origins of the Human Genome Diversity Project, and criticisms levelled against the venture by Indigenous peak bodies and anti-biotechnology groups, such as the Rural Advancement Foundation International. It examines the ways in which the United Nations Educational, Scientific, and Cultural …


Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang Aug 2007

Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Electronic Records As Documentary Evidence, Ken Chasse Aug 2007

Electronic Records As Documentary Evidence, Ken Chasse

Canadian Journal of Law and Technology

The new electronic record provisions that are now part of almost all of the Evidence Acts in Canada are as important as any statutory law or common law concerning the use of records as evidence. They bring six important improvements to the evidentiary law of business records. It is argued, however, that their most serious defects are that they: (1) perpetuate the best evidence rule — a rule rendered redundant by electronic records and information management (RIM); (2) do not deal with hearsay issues; (3) do not cure the defects of the business record provisions in regard to electronic records; …


The Adverse Economic Effects Of Spectrum Set-Asides, Robert W. Crandall, Allan T. Ingrahm Aug 2007

The Adverse Economic Effects Of Spectrum Set-Asides, Robert W. Crandall, Allan T. Ingrahm

Canadian Journal of Law and Technology

In February 2007, Industry Canada released a consultation that outlined a proposed auction design for spectrum Ifor Advanced Wireless Services. As part of its consultation, Industry Canada contemplated a spectrum set-aside in the AWS auction to facilitate the entry of a new wireless service provider in Canada; however, it noted that a potential drawback of a spectrum set-aside is that it can induce uneconomic entry into the market. In this paper, we show that a set-aside for AWS spectrum in Canada is more likely to result in uneconomic entry than in a viable domestic entrant into the Canadian wireless industry. …


You Must Remember This: The Copyright Conundrum Of "Translation Memory" Databases, Francie Gow Aug 2007

You Must Remember This: The Copyright Conundrum Of "Translation Memory" Databases, Francie Gow

Canadian Journal of Law and Technology

Translation memory databases (compilations of texts linked with their translations) can be valuable resources in the process of translating subsequent texts. This article explores the circumstances under which such compilations might be considered sufficiently original to attract copyright protection that is independent of any copyright already subsisting in the underlying translations and source texts. Various characteristics of the tools and the translation industry in general make the analysis highly fact-specific; whether particular translation memory databases attract protection, and, if so, who can claim to be their ‘‘authors’’, must be evaluated on a case-by-case basis. Any protection that is granted may …


Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple Aug 2007

Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple

Canadian Journal of Law and Technology

This paper proposes a bright line test to guide the Canadian Radio-television and Telecommunications Commission (‘‘CRTC’’) in regulating ‘‘network neutrality’’. When Internet service providers seek to discriminate between uses and users in administering their networks, the CRTC should ask whether the proposed discrimination is a reasonable effort to make the price paid by each user commensurate to the demands which his or her use places on the network. Discrimination which meets this description should be tolerated if not actively encouraged, because it encourages the economically efficient allocation of scarce bandwidth. All other forms of ISP discrimination — including discrimination based …


La Cesión De Derechos En El Código Civil Peruano, Edward Ivan Cueva Jul 2007

La Cesión De Derechos En El Código Civil Peruano, Edward Ivan Cueva

Edward Ivan Cueva

La Cesión de Derechos en el Código Civil Peruano


Electronic Government And Digital Inclusion: Examples From India, Subhajit Basu Jun 2007

Electronic Government And Digital Inclusion: Examples From India, Subhajit Basu

Subhajit Basu

This presentation has two parts: In the first part I look into Development, effect of technology on development, obviously technology provides opportunity to have choices but Can Technology (here ICT) influence development? Digital inclusion is a concept about the disparities in terms of citizens’ participation in the Information Society. This participation may be conceptualised in the first instance as ICT access, levels of use and use patterns. On one hand we have technology which promises of New Dawn for the developing countries, on the other hand only access to technology will not provide development for poor millions of a developing …


Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google Jun 2007

Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Segundo Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García May 2007

Segundo Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Memorias del Segundo Congreso Nacional de Organismos Públicos Autónomos. "Autonomía, Profesionalización, Control y Transparencia"


Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva May 2007

Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


Authorizing Copyright Infringement And The Control Requirement: A Look At P2p File-Sharing And Distribution Of New Technology In The U.K., Australia, Canada, And Singapore, Jeffrey C.J. Lee Apr 2007

Authorizing Copyright Infringement And The Control Requirement: A Look At P2p File-Sharing And Distribution Of New Technology In The U.K., Australia, Canada, And Singapore, Jeffrey C.J. Lee

Canadian Journal of Law and Technology

The doctrine of authorizing copyright infringement has been used to deal with the marketing of new Ttechnology that might be employed by a user to infringe copyright, from the distribution of blank cassette tapes and double-cassette tape recorders to photocopiers. It is being tested yet again with the distribution of peer-to-peer file-sharing software that enables the online exchange of MP3 music and other copyrighted files. This article looks at the different positions adopted in several Commonwealth jurisdictions, and examines the policy considerations behind these positions. It looks at, in particular, the recent Australian case of Universal Music Australia Pty Ltd. …


Virtual Property, Real Law: The Regulation Of Property In Video Games, Susan H. Abramovitch, David L. Cummings Apr 2007

Virtual Property, Real Law: The Regulation Of Property In Video Games, Susan H. Abramovitch, David L. Cummings

Canadian Journal of Law and Technology

This article considers property created and used in the virtual realm of video games, which is often given real- T world value. From the unauthorized copying of designer clothes sold on Second Life for in-game cash, to real court damages awarded against game operators’ deletion of player-earned swords on Mir 3, a bridge has been taking shape from video gaming’s virtual economies to real-world economies. However, virtual property created in virtual worlds has yet to be formally recognized by North American courts or legislatures. This article attempts to touch on some of the legal considerations paramount in determining how such …


L'Affaire Xm Satellite Radio: La Légalité Des Appareils Qui Enregistrent La Radio Par Satellite, René Pépin Apr 2007

L'Affaire Xm Satellite Radio: La Légalité Des Appareils Qui Enregistrent La Radio Par Satellite, René Pépin

Canadian Journal of Law and Technology

Aux Etats-Unis, la radio par satellite existe depuis le nouveau millénaire. Mais les compagnies qui œuvrent dans ce domaine font face depuis 2006 a des poursuites devant les tribunaux par les grandes compagnies de disques. Elles paient pourtant les tarifs convenus avec les entreprises qui s’occupent de gestion collective des droits d’auteur sur les disques. Le probleme vient du fait que depuis leur entrée en ondes, des progrès technologiques leur permettent d’offrir à leurs abonnés des appareils qui sont bien plus polyvalents qu’un simple appareil radio récepteur. Les nouveaux modèles peuvent enregistrer plusieurs heures d'émissions, et ils peuvent transmettre à …


Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee Mar 2007

Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe Feb 2007

Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe

ExpressO

Digital Rights Managements (DRM) systems impact the digital content and software marketplace on several levels. The issues include copyright law, contract law, privacy, antitrust, and consumer protection. This paper examines how DRM systems affect the consumer and what changes can be made to bring about a more sensible and transparent market in the United States.


Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden Feb 2007

Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden

ExpressO

What Internet Service Providers (“ISPs”) can and cannot do to diversify services lies at the core of the debate over network neutrality. In prior generations ISPs had little incentive or technological capability to deviate from plain vanilla best efforts routing for content providers and from standard “all you can eat” subscription terms for consumer access to the World Wide Web. The next generation Internet has the technological capability and ISPs have the commercial motivation to offer “better than best efforts” routing and premium services for both content providers and consumers seeking higher quality of service and more reliable traffic delivery. …


The Need For Software Innovation Policy, Christopher Riley Jan 2007

The Need For Software Innovation Policy, Christopher Riley

ExpressO

This paper examines the current legal treatment of software innovation. It argues that recent judicial standards for the regulation of software innovation do not adequately protect innovation. It presents an original standard for the regulation of software innovation, one intended to guide judicial decisions in contributory copyright liability, in interpretations of the Digital Millennium Copyright Act, and in every courtroom where a developer is on trial for the mere creation and distribution of software. The standard presented in this paper separates the questions of liability and remedy in order to produce an optimal dynamic balance of interests.


Youtube Or Youlose? Can Youtube Survive A Copyright Infringement Lawsuit, Jason C. Breen Jan 2007

Youtube Or Youlose? Can Youtube Survive A Copyright Infringement Lawsuit, Jason C. Breen

ExpressO

YouTube, and similar video web hosting services, have already been targets of copyright infringement lawsuits. YouTube’s liability is most likely dependant on whether the service meets the requirements of the DMCA safe harbor for service providers under 17 U.S.C.A. § 512(c). This paper briefly examines how YouTube would fare under the different theories of copyright infringement and discusses whether the DMCA safe harbor would be available to YouTube if they were found liable as an infringer. The limited case law available indicates that the DMCA safe harbor will likely facilitate YouTube’s continued existence, unlike services like Grokster, although YouTube would …


Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias Jan 2007

Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias

ExpressO

The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.

Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.

Despite accelerating technological …


Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …


Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page Jan 2007

Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Eileen R. Geller Jan 2007

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Eileen R. Geller

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the 2007–2008 academic school year. Our authors tackle a number of emerging issues in ways we think you’ll find especially interesting.


Intellectual Property And Free Speech In The Online World: How Educational Institutions And Other Online Service Providers Are Coping With Cease And Desist Letters And Takedown Notices, Laura Quilter, Marjorie Heins Jan 2007

Intellectual Property And Free Speech In The Online World: How Educational Institutions And Other Online Service Providers Are Coping With Cease And Desist Letters And Takedown Notices, Laura Quilter, Marjorie Heins

Laura Quilter

Study of educational institutions and online service providers (Internet service providers) and their responses to cease and desist notices.


Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa Jan 2007

Privacy, Crime And Terror: Legal Rights And Security In A Time Of Peril By Stanley A. Cohen (Markham: Lexisnexis Butterworths, 2005), Teresa Scassa

Canadian Journal of Law and Technology

It is now trite to say that the events of September 11, 2001 have had a profound impact on our national security, in terms of its institutional and normative dimensions, and also in terms of a more general public anxiety. The hastily enacted Anti-terrorism Act of 2001 brought about significant changes to a wide range of statutes including, among others, the Criminal Code, the Official Secrets Act, the Canada Evidence Act, and the Proceeds of Crime (Money Laundering) Act. An early conference and resultant book on the Anti-terrorism Act raised serious concerns about the potential impact of the changes on …


Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long Jan 2007

Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long

UIC Law Open Access Faculty Scholarship

Cyberspace is often a battlefield with a wide array of armies posed to challenge one another across the increasing array of rhetoric and technology that has made it such a potent arena for global digital commerce. Perry Barlow's infamous demand that cyberspace be left to its own devices because of its unique unregulated nature may have been answered by Larry Lessig's reply that code may in fact be used to regulate cyberspace, but the reality is that social norming demands, the evanescence of technological controls, and the perceived utility of illicit conduct utilizing the internet make any regulation problematic at …


Will Youtube Sail Into The Dmca's Safe Harbor Or Sink For Internet Piracy?, 6 J. Marshall Rev. Intell. Prop. L. 550 (2007), Michael Driscoll Jan 2007

Will Youtube Sail Into The Dmca's Safe Harbor Or Sink For Internet Piracy?, 6 J. Marshall Rev. Intell. Prop. L. 550 (2007), Michael Driscoll

UIC Review of Intellectual Property Law

Is YouTube, the popular video sharing website, a new revolution in information sharing or a profitable clearing-house for unauthorized distribution of copyrighted material? YouTube’s critics claim that it falls within the latter category, in line with Napster and Grokster. This comment, however, determines that YouTube is fundamentally different from past infringers in that it complies with statutory provisions concerning the removal of copyrighted materials. Furthermore, YouTube’s central server architecture distinguishes it from peer-to-peer file sharing websites. This comment concludes that any comparison to Napster or Grokster issuperficial, and overlooks the potential benefits of YouTube to copyright


Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer Jan 2007

Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer

UIC John Marshall Journal of Information Technology & Privacy Law

Application Service Providing ("ASP"), where a vendor hosts a software application on her server and grants customers access to the application over a network -- without the software application itself being installed on the user’s computer -- is used by many, e.g. in the form of Web based e-mail services, and grows ever more important. This article argues that although ASP mainly raises questions (i) that come up in the context of traditional use of computer programs; or (ii) that have been addressed in the context of online use of works other than software, ASP has significantly different copyright implications …


Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers Jan 2007

Ict And Employer-Employee Power Dynamics: A Comparative Perspective Of United States' And Netherlands' Workplace Privacy In Light Of Information And Computer Technology Monitoring And Positioning Of Employees, 25 J. Marshall J. Computer & Info. L. 37 (2007), Colette Cuijpers

UIC John Marshall Journal of Information Technology & Privacy Law

Employees can cause harm to their employers through Information and Computer Technology (ICT) in employment relationships; for example, through surfing for adult material on the Internet or leaking company secrets via a mobile phone. Employers have responded to this development by introducing various surveillance systems. Besides well-known forms of Internet and e-mail surveillance, positioning systems are becoming a new trend. The influence these systems have on the employment relationship can be far-reaching, as they offer the employer an insight into the employee’s whereabouts, outside the company premises as well as outside company hours. As a consequence, the boundaries between the …