Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4141 - 4170 of 6066

Full-Text Articles in Internet Law

Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google Jun 2007

Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher Yoo Jun 2007

Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher Yoo

Federal Communications Law Journal

"Net neutrality" has been among the leading issues of telecommunications policy this decade. Is the neutrality of the Internet fundamental to its success, and worth regulating to protect, or simply a technical design subject to improvement? In this debate-form commentary, Tim Wu and Christopher Yoo make clear the connection between net neutrality and broader issues of national telecommunications policy.


Who Controls The Internet? A Review, Deborah J. Salons Jun 2007

Who Controls The Internet? A Review, Deborah J. Salons

Federal Communications Law Journal

Book Review: Who Controls the Internet? Illusions of a Borderless World, Jack Goldsmith and Tim Wu, Oxford University Press 2006.

Ms. Salons reviews Who Controls the Internet? Illusions of a Borderless World, Oxford University Press, 2006. Authored by Jack Goldsmith and Tim Wu, the book provides a history of the Internet and analyzes the nexus between globalization and government coercion. The book focuses on how these agents have shaped and developed the Internet as we are familiar with it today.


A Soldier's Blog: Balancing Service Members' Personal Rights Vs. National Security Interests, Tatum H. Lytle Jun 2007

A Soldier's Blog: Balancing Service Members' Personal Rights Vs. National Security Interests, Tatum H. Lytle

Federal Communications Law Journal

This Note examines the competing interests between ensuring military personnel's freedom of speech while protecting national security interests. The Author recognizes the necessity of protecting national security interests but emphasizes that military personnel's rights to free speech must be protected as long as such speech poses no threat to military security. In conclusion, clearer protections must be implemented to protect military personnel's right to free speech.


Segundo Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García May 2007

Segundo Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Memorias del Segundo Congreso Nacional de Organismos Públicos Autónomos. "Autonomía, Profesionalización, Control y Transparencia"


Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva May 2007

Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


When Is § 230 Immunity Lost?: The Transformation From Website Owner To Information Content Provider, Karen Alexander Horowitz Apr 2007

When Is § 230 Immunity Lost?: The Transformation From Website Owner To Information Content Provider, Karen Alexander Horowitz

Washington Journal of Law, Technology & Arts

Section 230 of the Communications Decency Act (CDA) offers broad protection for providers and users of interactive computer services against liability for defamation and other content-based claims when a third-party provides the information. Although providers and users of interactive computer services (ICSs) are permitted to exercise some editorial control while still avoiding legal liability, at some point, such editing may transform the provider or user of the ICS into an information content provider and deprive them of § 230 immunity. The key issue is where the threshold between permissible and impermissible editorial control lies. This Article delves into this issue …


Barrett V. Rosenthal: Oh, What A Tangled Web We Weave - No Liability For Web Defamation, Ternisha Miles Apr 2007

Barrett V. Rosenthal: Oh, What A Tangled Web We Weave - No Liability For Web Defamation, Ternisha Miles

North Carolina Central Law Review

No abstract provided.


Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


Authorizing Copyright Infringement And The Control Requirement: A Look At P2p File-Sharing And Distribution Of New Technology In The U.K., Australia, Canada, And Singapore, Jeffrey C.J. Lee Apr 2007

Authorizing Copyright Infringement And The Control Requirement: A Look At P2p File-Sharing And Distribution Of New Technology In The U.K., Australia, Canada, And Singapore, Jeffrey C.J. Lee

Canadian Journal of Law and Technology

The doctrine of authorizing copyright infringement has been used to deal with the marketing of new Ttechnology that might be employed by a user to infringe copyright, from the distribution of blank cassette tapes and double-cassette tape recorders to photocopiers. It is being tested yet again with the distribution of peer-to-peer file-sharing software that enables the online exchange of MP3 music and other copyrighted files. This article looks at the different positions adopted in several Commonwealth jurisdictions, and examines the policy considerations behind these positions. It looks at, in particular, the recent Australian case of Universal Music Australia Pty Ltd. …


Virtual Property, Real Law: The Regulation Of Property In Video Games, Susan H. Abramovitch, David L. Cummings Apr 2007

Virtual Property, Real Law: The Regulation Of Property In Video Games, Susan H. Abramovitch, David L. Cummings

Canadian Journal of Law and Technology

This article considers property created and used in the virtual realm of video games, which is often given real- T world value. From the unauthorized copying of designer clothes sold on Second Life for in-game cash, to real court damages awarded against game operators’ deletion of player-earned swords on Mir 3, a bridge has been taking shape from video gaming’s virtual economies to real-world economies. However, virtual property created in virtual worlds has yet to be formally recognized by North American courts or legislatures. This article attempts to touch on some of the legal considerations paramount in determining how such …


L'Affaire Xm Satellite Radio: La Légalité Des Appareils Qui Enregistrent La Radio Par Satellite, René Pépin Apr 2007

L'Affaire Xm Satellite Radio: La Légalité Des Appareils Qui Enregistrent La Radio Par Satellite, René Pépin

Canadian Journal of Law and Technology

Aux Etats-Unis, la radio par satellite existe depuis le nouveau millénaire. Mais les compagnies qui œuvrent dans ce domaine font face depuis 2006 a des poursuites devant les tribunaux par les grandes compagnies de disques. Elles paient pourtant les tarifs convenus avec les entreprises qui s’occupent de gestion collective des droits d’auteur sur les disques. Le probleme vient du fait que depuis leur entrée en ondes, des progrès technologiques leur permettent d’offrir à leurs abonnés des appareils qui sont bien plus polyvalents qu’un simple appareil radio récepteur. Les nouveaux modèles peuvent enregistrer plusieurs heures d'émissions, et ils peuvent transmettre à …


Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee Mar 2007

Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Cyber-Trespass And 'Unauthorized Access' As Legal Mechanisms Of Access Control: Lessons From The Us Experience, Mary W. S. Wong Mar 2007

Cyber-Trespass And 'Unauthorized Access' As Legal Mechanisms Of Access Control: Lessons From The Us Experience, Mary W. S. Wong

Research Collection Yong Pung How School Of Law

The common law doctrine of trespass to chattels has recently been revived and applied by courts in the United States (US) to cover intrusions (in the form of electronic signals) to computer systems connected to the Internet. These cases represent judicial recognition of the need to protect certain unwanted intrusions in cyberspace, though the principles developed therewith are remarkably expansive. As such, they overlap with the concept of ‘unauthorized access’ under computer misuse legislation in the US and elsewhere. This overlap has yet to be judicially acknowledged. Since the US, the United Kingdom and other common law countries not only …


Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe Feb 2007

Private Copyright: Digital Rights Management Systems And The Consumer, Victor Nicholas Knipe

ExpressO

Digital Rights Managements (DRM) systems impact the digital content and software marketplace on several levels. The issues include copyright law, contract law, privacy, antitrust, and consumer protection. This paper examines how DRM systems affect the consumer and what changes can be made to bring about a more sensible and transparent market in the United States.


The Price-Anderson Public Liability Action And Strict Liability, Donald E. Jose, Michael A. Garza Feb 2007

The Price-Anderson Public Liability Action And Strict Liability, Donald E. Jose, Michael A. Garza

ExpressO

Nuclear Power and nuclear weapons plants seem to be an ultrahazardous activity for which strict liability should apply. However, unusual provisions of the Price-Anderson Act serve to shield nuclear power and nuclear weapons plants and associated activities from strict liability unless the federaq agency regulating the activity determins that a special from of strict liability can be applied.


Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden Feb 2007

Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden

ExpressO

What Internet Service Providers (“ISPs”) can and cannot do to diversify services lies at the core of the debate over network neutrality. In prior generations ISPs had little incentive or technological capability to deviate from plain vanilla best efforts routing for content providers and from standard “all you can eat” subscription terms for consumer access to the World Wide Web. The next generation Internet has the technological capability and ISPs have the commercial motivation to offer “better than best efforts” routing and premium services for both content providers and consumers seeking higher quality of service and more reliable traffic delivery. …


Claim Construction, Appeal, And The Predictability Of Interpretive Regimes, Jeffrey A. Lefstin Feb 2007

Claim Construction, Appeal, And The Predictability Of Interpretive Regimes, Jeffrey A. Lefstin

ExpressO

Interpretation is central to patent law, because most adjudications require association of written claims with non-linguistic subject matter. By some accounts, the lack of predictability in the law of claim interpretation has reached crisis proportions, and has prompted calls for far-reaching changes in the way patent issues are adjudicated. However, the actual evidence that questions of interpretation are more problematic than other aspects of patent law is sparser than is commonly recognized. Moreover, while the controversy over claim interpretation centers around the predictability of interpretation between trial and appeal, what is important is to be able to predict outcomes before …


Law And Heidegger’S Question Concerning Technology: A Prolegomenon To Future Law Librarianship, Paul D. Callister Jan 2007

Law And Heidegger’S Question Concerning Technology: A Prolegomenon To Future Law Librarianship, Paul D. Callister

ExpressO

Following World War II, the German philosopher Martin Heidegger offered one of the most potent criticisms of technology and modern life. His nightmare is a world whose essence has been reduced to the functional equivalent of “a giant gasoline station, an energy source for modern technology and industry. This relation of man to the world [is] in principle a technical one . . . . [It is] altogether alien to former ages and histories.” For Heidegger, the problem is not technology itself, but the technical mode of thinking that has accompanied it. Such a viewpoint of the world is a …


When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry Jan 2007

When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry

ExpressO

As research has advanced, technologies have become more closely knit, and the relationships between them—both complementary and competitive—have become increasingly important. Unfortunately, the patent system’s use of monopoly power to reward innovators creates inefficient results by overly encouraging the development of substitute technologies and discouraging the development of complementary technologies. This paper explains how an optional patent purchase system could help ameliorate such problems and discusses the implications of such a system.


Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook Jan 2007

Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook

ExpressO

This Comment assesses the use of the Alien Tort Statute (“ATS”) as a jurisdictional basis for claims of international copyright infringement occurring outside of the United States. Under the ATS, aliens may sue in United States district courts for torts that amount to violations of treaties or the law of nations.

Given that copyright infringement is a tort, an alien may only be able to establish ATS jurisdiction in a suit of extraterritorial infringement if the infringement violated a treaty or the law of nations. This comment argues that extraterritorial copyright infringement does indeed amount to a violation of the …


The Need For Software Innovation Policy, Christopher Riley Jan 2007

The Need For Software Innovation Policy, Christopher Riley

ExpressO

This paper examines the current legal treatment of software innovation. It argues that recent judicial standards for the regulation of software innovation do not adequately protect innovation. It presents an original standard for the regulation of software innovation, one intended to guide judicial decisions in contributory copyright liability, in interpretations of the Digital Millennium Copyright Act, and in every courtroom where a developer is on trial for the mere creation and distribution of software. The standard presented in this paper separates the questions of liability and remedy in order to produce an optimal dynamic balance of interests.


Youtube Or Youlose? Can Youtube Survive A Copyright Infringement Lawsuit, Jason C. Breen Jan 2007

Youtube Or Youlose? Can Youtube Survive A Copyright Infringement Lawsuit, Jason C. Breen

ExpressO

YouTube, and similar video web hosting services, have already been targets of copyright infringement lawsuits. YouTube’s liability is most likely dependant on whether the service meets the requirements of the DMCA safe harbor for service providers under 17 U.S.C.A. § 512(c). This paper briefly examines how YouTube would fare under the different theories of copyright infringement and discusses whether the DMCA safe harbor would be available to YouTube if they were found liable as an infringer. The limited case law available indicates that the DMCA safe harbor will likely facilitate YouTube’s continued existence, unlike services like Grokster, although YouTube would …


Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias Jan 2007

Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias

ExpressO

The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.

Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.

Despite accelerating technological …


Myspace Isn't Your Space, Donald Carrington Davis Jan 2007

Myspace Isn't Your Space, Donald Carrington Davis

ExpressO

The advent and popularity of online social networking has changed the way Americans socialize. Employers have begun to tap into these online communities as a simple and inexpensive way to perform background checks on candidates. However, a number of problems arise and may arise when employers base adverse employment decisions on the results of these online searches. Three basic problems or issues accompany searches of online profiles for employment decisions: inaccurate, irrelevant, or false information leads to unfair employment decisions; lack of accountability and disclosure tempts employers to make illegal employment decisions; and employer searches of an employee’s online social …


Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …


Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page Jan 2007

Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Space Program And Business In India - Legal Perspectives, Shashi Sharma Jan 2007

Space Program And Business In India - Legal Perspectives, Shashi Sharma

ExpressO

No abstract provided.


Content On The Fly: The Growing Need For Regulation Of Video Content Delivered Via Cellular Telephony, Jacob M. Chapman Jan 2007

Content On The Fly: The Growing Need For Regulation Of Video Content Delivered Via Cellular Telephony, Jacob M. Chapman

ExpressO

Technological advancements in the last twenty years have substantially altered the ways in which people work, communicate, and are entertained. Many of these advancements have occurred in areas generally thought to fall under the regulatory purview of the Federal Communications Commission (FCC). These advancements have included the personal computer, the internet, digital cable, direct broadcast satellites (DBS), and cellular phones. Of all these increasingly available and inexpensive technologies, perhaps the most ubiquitous is the cellular phone. Thus far, the FCC has struggled to apply its public interest mandate to the ever shifting sands of technological development with varying degrees of …


Information Inflation: Can The Legal System Adapt?, George L. Paul, Jason R. Baron Jan 2007

Information Inflation: Can The Legal System Adapt?, George L. Paul, Jason R. Baron

Richmond Journal of Law & Technology

Information is fundamental to the legal system. Accordingly, lawyers must understand that information, as a cultural and technological edifice, has profoundly and irrevocably changed. There has been a civilization- wide morph, or pulse, or one might say that information has evolved. This article discusses the new inflationary dynamic, which has caused written information to multiply by as much as ten thousand-fold recently. The resulting landscape has stressed the legal system and indeed, it is becoming prohibitively expensive for lawyers even to search through information. This is particularly true in litigation.