Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

2010

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 65

Full-Text Articles in Science and Technology Law

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo Nov 2010

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo

All Faculty Scholarship

Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …


Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García Nov 2010

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García

Bruno L. Costantini García

De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …


Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu Oct 2010

Llm Cyberlaw: Information Technology, Law And Society, Subhajit Basu

Subhajit Basu

LLM in Cyberlaw: information technology, law and society enables you to develop knowledge and skills in relation to the legal rules regulating cyberlaw activity in the UK and Europe, and at a global level.


Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque Oct 2010

Approval Of New Pharmacogenomic Tests: Is The Canadian Regulatory Process Adequate?, Yann Joly, Emma Ramos-Paque

Canadian Journal of Law and Technology

In the first part of our analysis, we will examine the impact which pharmacogenomics is expected to have on drug research and development, on the drug approval process and on post-marketing surveillance and clinical practice. This will allow us to show how pharmacogenomic testing could be beneficial to drug companies, regulatory bodies, and patients. The second part of our analysis will focus on the regulatory framework applicable to the approval of pharmacoge- nomic tests in Canada, although we are aware of the fact that most manufacturers decide to approve their tests outside of Canada. As mentioned, the applicable regu- lations …


The Admissibility Of Electronic Business Records, Ken Chasse Oct 2010

The Admissibility Of Electronic Business Records, Ken Chasse

Canadian Journal of Law and Technology

The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …


Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton Oct 2010

Personalization, Analytics, And Sponsored Services: The Challenges Of Applying Pipeda To Online Tracking And Profiling Activities, Eloïse Gratton

Canadian Journal of Law and Technology

No abstract provided.


Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist Oct 2010

Canada's Digital Economy Strategy: Toward An Openness Framework, Michael Geist

Canadian Journal of Law and Technology

This essay is an expanded version of my submission to the digital economy consultation. It opens with general issues such as digital policy leadership, cost issues, and emphasizes the need for a principle-based strategy that embraces the benefits associated with “open,” whether open access, open spectrum or open data. It then provides specific recommendations on a wide range of issues including tele- communications policy, privacy, and copyright.


Interpreting Copyright Law And Internet Facts, Cameron Hutchison Oct 2010

Interpreting Copyright Law And Internet Facts, Cameron Hutchison

Canadian Journal of Law and Technology

This paper probes interpretation issues elicited by the impact of digital technologies and the Internet on copyright law. The purpose of the paper is to instill a coherent framework for analyzing copyright law when it encounters Internet or digital facts. In part one, I propose a methodology of statutory interpretation that helps suitably adapt statutory language to technological developments. In essence it is this: courts should examine the language of the operative provision in its statutory context and in light of its purpose. A contextual interpretation of a broadly conceived rule can reveal a legislative intention that certain kinds of …


The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke Oct 2010

The Regulation Of Personal Health Record Systems In Canada, James Williams, Jens H. Weber-Jahnke

Canadian Journal of Law and Technology

This paper analyzes the regulatory regime for PHR systems in Canada. The first part of the paper consists of an introduction to some of the major issues associ- ated with these applications, with a focus on privacy, security, data quality, and interoperability. Following this preliminary discussion, the bulk of the analysis deals with the legal instruments that apply to PHR products developed by private sector organizations. Due to space constraints, the paper concentrates on legislative and regulatory instruments, deferring a discussion of the possible impacts of tort, product liability, and contract law on PHR systems. Despite this omission, it is …


Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq. Sep 2010

Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author discusses the subtle differences between Copyright and Author's Rights. Then he goes into analyzing the different ways a work can become part of the public domain and how it varies from jurisdiction to jurisdiction and from time to time.////////////////////////////////////////////////////El autor analiza las sutiles diferencias entre los derechos de autor y el copyright. Posteriormente se adentra en el análisis de las formas en las que una obra entra dentro del dominio público, y como estas varían dependiendo del territorio y de la época.


Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman Sep 2010

Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman

Julio Rojas-Mora

The evolution of the Internet has come to a point where almost at the same time, governments all around the world feel the need for legislation to regulate the use of the Internet. In preparing the legislation, consultations were called by various governments or by the corresponding regulation bodies. We describe in this paper the various consultations as well as the background related to the Net Neutrality question in each case. Rather than describing the answers to each consultation, which are available and which have already been analyzed, we focus on comparing the consultations and the statistical figures related to …


Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman Sep 2010

Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman

Legislation and Policy Brief

In the modern digitized and networked world, personal identifying information has quickly become a commodity that can be traded, sold, or given away like any other. The uses and potential abuses of personal identifying information, however, distinguish this commodity from any other. Personal identifying information can be copied infinitely, is often not protected nearly as well as physical commodities, and, most importantly, can have particular importance to the person identified by that information. The producer of a bushel of apples presumably cares very little about where his apples end up, as long as he is paid for them to begin …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García Jul 2010

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García Jun 2010

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves Jun 2010

Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves

Canadian Journal of Law and Technology

The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …


La Cyberintimidation: Analyse Juridique, Karen D. Levin Jun 2010

La Cyberintimidation: Analyse Juridique, Karen D. Levin

Canadian Journal of Law and Technology

Dans ce mémoire va être traitée une analyse juridique de la cyberintimidation. Dans une première partie, nous tenterons de définir le terme « cyberintimidation » et les enjeux qui s’y rattachent. En deuxième lieu, nous examinerons la motivation qui mène à la cyberintimidation, ainsi que la manière dans laquelle l’acte se produit. Troisièmement, nous évaluerons les provisions du droit criminel fédéral, des droits de la personne, et du droit des délits civils afin de déterminer l’efficacité de notre système juridique à détourner la cyberintimidation. Finalement, nous trancherons la question de réforme qui se propose au Canada, la comparant aux réformes …


Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost Jun 2010

Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost

Canadian Journal of Law and Technology

This paper analyses and criticizes Canada’s position on sound marks registration in order to recommend the ways in which Canadian policy-makers could further act in order to advance this area of law. The first part of this paper exposes the fundamental concepts of trade-marks as they are necessary to the comprehension of the problems surrounding the registration of sound marks. In the second part, legal considerations associated with the registration of sound marks are discussed. More specifically, the visual requirement, the issue of “use,” the concept of distinctiveness and the question of overlap with copyright are assessed. In the third …


Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie Jun 2010

Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie

Canadian Journal of Law and Technology

Personal data protection and privacy of personal health information in the electronic era is a broad topic that includes consent, security measures and access considerations. The focus of this article is on one component of the larger picture: data transfers of personal health information that occur in the context of informa- tion technology (“IT”) outsourcing. If the societal good envisioned by an inter-jurisdictional EHR is to be fully realized, then the necessity of outsourcing is a reality that must be addressed.


Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam Jun 2010

Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam

Canadian Journal of Law and Technology

Our so-called post-industrial society is one whose axial feature is the interac- tion between computer-driven digital and life science-driven bio-technologies. The primary legal mechanism that undergirds the allocation of rights in this new infor- mation-centred epoch is intellectual property. Perhaps only a few industrial sectors have benefitted more from the dynamics of that interaction than the pharmaceutical industry. Perhaps also, only a few industrial sectors have fully appreciated and opti- mally exploited the power of intellectual property than that sector. How did that happen? How has it continued to unfold, and what does the future hold for the continued co-evolution …


Elawyering And The Future Of Legal Work, Richard Granat, Blair Janis, Stephanie Kimbro, Marc Lauritsen Apr 2010

Elawyering And The Future Of Legal Work, Richard Granat, Blair Janis, Stephanie Kimbro, Marc Lauritsen

Continuing Legal Education (CLE) Lecture Series

eLawyering is doing legal work – not just marketing it – over the Web. Pioneering practitioners have found dramatic new ways to communicate and collaborate with clients and other lawyers, produce documents, settle disputes, interact with courts, and manage legal knowledge. There are exciting initiatives underway now that deserve attention by all lawyers – present and future. The legal profession is being disrupted from without and from within. To be successful in the coming era, lawyers will need to know how to practice over the Web, manage client relationships in cyberspace, and offer “unbundled” services. This program discusses the knowledge …


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez Apr 2010

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Derecho De La Seguridad Social En México, Bruno L. Costantini García Feb 2010

Derecho De La Seguridad Social En México, Bruno L. Costantini García

Bruno L. Costantini García

Breve presentación del Derecho de la Segurida Social en México.

¿Qué es?

¿Cómo funciona?

¿Su aplicación?


The Time And Place For "Technology-Shifting" Rights, Max Oppenheimer Jan 2010

The Time And Place For "Technology-Shifting" Rights, Max Oppenheimer

All Faculty Scholarship

Intellectual property policy requires balance between the goal of motivating innovation and the need to prevent that motivation from stifling further innovation. The constitutional grant of congressional power to motivate innovation by securing "for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries" is qualified by the requirement that congressional enactments under the Intellectual Property Clause "promote progress."

The speed of technological change, particularly in the converging fields of computer software, music, video, television, and communications, coupled with the power of technology industry lobbying, have left the statutory balance tilted in favor of rewarding …


Fixing Ram Copies, Aaron K. Perzanowski Jan 2010

Fixing Ram Copies, Aaron K. Perzanowski

Aaron K. Perzanowski

Scholars, litigants, and courts have debated the status of so-called “RAM copies” - instantiations of copyrighted works in the random access memory of computing devices - for decades. The Second Circuit’s decision in Cartoon Network v. CSC Holdings has recently reignited the controversy over these putative copies. There the court held that CSC did not create copies within the meaning of the Copyright Act when it buffered fleeting segments of television programs. In many respects, the Second Circuit’s holding is a straightforward application of the Act’s nested definitions of “copies” and “fixed.” But because the court declined to apply the …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …


Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel Jan 2010

Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel

Canadian Journal of Law and Technology

This article first examines Canadian copyright law as it pertains to distance education with a detailed review of literature, legislation and jurisprudence, including a comparison with influential law from the United States. Included in this analysis are the opinions of specialists and experts on distance education and copyright in the university environment, who were interviewed during this research. Based on the research findings, we have identified three distinct legislative outcomes. For each, we provide recommendations on how a university and other stakeholders might best protect their interests when confronted with any of these three possibilities.


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney Jan 2010

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study.

Web analytics technology …


Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles Jan 2010

Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles

UIC John Marshall Journal of Information Technology & Privacy Law

Cyberwarfare is a very real threat to the security of the nation. Yet there is confusion and disagreement as to which government body is most appropriate to assume the cyberwar mission. The Strategy to Secure Cyberspace treats the threat primarily as a criminal issue, and assigns responsibility to the Department of Homeland Security. The National Defense Strategy implies that cyberwarfare is a military issue. Both documents may be correct, depending on the case. The cyberspace terrain transcends boundaries, quickly blurring the line between civil or criminal action and an act of war, leaving the government with the issue of assigning …