A Fair Use Project For Australia: Copyright Law And Creative Freedom, 2010 Australian National University College of Law
A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer
Matthew Rimmer
This essay provides a critical assessment of the Fair Use Project based at the Stanford Center for Internet and Society. In evaluating the efficacy of the Fair Use Project, it is worthwhile considering the litigation that the group has been involved in, and evaluating its performance. Part 1 outlines the history of the Stanford Center for Internet and Society, and the aims and objectives of the Fair Use Project. Part 2 considers the litigation in Shloss v. Sweeney over a biography concerning Lucia Joyce, the daughter of the avant-garde literary great, James Joyce. Part 3 examines the dispute over the …
La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, 2010 Junior researcher/Fellow assistant of the University of Murcia
La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano
Germán M. Teruel Lozano
Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.
Who Owns The Virtual Items?, 2010 Duke Law
Who Owns The Virtual Items?, Leah Shen
Duke Law & Technology Review
Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …
The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, 2010 Duke Law
The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness
Duke Law & Technology Review
The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …
The Coming Fifth Amendment Challenge To Net Neutrality Regulation, 2010 Boston College Law School
The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons
Daniel Lyons
No abstract provided.
Online Privacy, Social Networking, And Crime Victimization : Hearing Before The H. Subcomm. On Crime, Terrorism, And Homeland Security Of The H. Comm. On The Judiciary, 111th Cong., July 28, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), 2010 Georgetown University Law Center
Online Privacy, Social Networking, And Crime Victimization : Hearing Before The H. Subcomm. On Crime, Terrorism, And Homeland Security Of The H. Comm. On The Judiciary, 111th Cong., July 28, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg
Testimony Before Congress
Mr. Chairman, Facebook is a tremendous service, with the scope of email, the telephone, and even the Internet itself. It is also the source of many of the privacy concerns of users today. The critical problem is not what users post; it is that the Facebook changes the privacy settings too frequently and Facebook makes it too difficult for users to selectively post information. Self‐regulation has not worked because the FTC has been reluctant to pursue investigations. So, EPIC recommends changes to ECPA in Title 18 that would give users greater control of their information and reduce risk when they …
Planning For The Future Of Cyber Attack Attribution : Hearing Before The H. Subcomm. On Technology And Innovation Of The H. Comm. On Science And Technology, 111th Cong., July 15, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), 2010 Georgetown University Law Center
Planning For The Future Of Cyber Attack Attribution : Hearing Before The H. Subcomm. On Technology And Innovation Of The H. Comm. On Science And Technology, 111th Cong., July 15, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg
Testimony Before Congress
Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr. Bellovin explains:
The fundamental premise of the proposed strategy is that our serious Internet security problems are due to lack of sufficient authentication. That is demonstrably false. The biggest problem was and is buggy code. All the authentication in the world won't stop a bad guy who goes around the authentication system, either by finding bugs exploitable before authentication is performed, finding bugs in the authentication system itself, or …
Privacy And Consumer Risks In Cloud Computing, 2010 Bond University
Privacy And Consumer Risks In Cloud Computing, Dan Svantesson, Roger Clarke
Dan Svantesson
While vaguely defined, and wide in scope, so-called ‘cloud computing’ has gained considerable attention in recent times. Put simply, it refers to an arrangement under which a user relies on another party to provide access to remote computers and software, whose whereabouts, including their jurisdictional location, are not known nor controllable by the user. In this article, we examine the privacy and consumer risks that are associated with cloud computing.
Delimitación Téorica Del Delito Penal Fiscal, 2010 ITESM Campus Puebla
Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García
Bruno L. Costantini García
Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.
Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.
Love Thy Neighbor: The Tampere Convention As Global Legislation, 2010 Indiana University Maurer School of Law
Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig
Indiana Journal of Global Legal Studies
The Internet, 24-hour news sources, and a host of other telecommunications advances have allowed global citizens to become instantaneously informed. With the privilege of real-time updates and acute awareness of the world's events comes the responsibility of being more than a passive observer. Specifically, this Note focuses on the technological improvements in communication during natural disasters-improvements that can be used to assist and aid the victims of catastrophes. In the aftermath of a natural disaster, the country affected is rarely able to provide for its citizens; tsunamis, hurricanes, tornadoes, and earthquakes can (and often do) cripple an entire nation. This …
Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, 2010 University of Washington School of Law
Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh
Washington Journal of Law, Technology & Arts
Information technology is evolving at an unprecedented rate; new forms of communication appear so often that it is difficult to keep track of them all. This presents a difficult problem for attorneys, who must carefully consider whether using new technology to communicate with clients is consistent with the duty of confidentiality. Google’s Gmail scans the content of e-mails to generate targeted advertising, a controversial practice that raises questions about whether its users have a reasonable expectation of privacy. The New York Bar responded to this issue in Opinion 820, which states that using an e-mail provider that scans the e-mail …
Report Of The Law Reform Committee On Online Gaming And Singapore, 2010 Singapore Management University
Report Of The Law Reform Committee On Online Gaming And Singapore, Joyce A. Tan, Aqbal Singh, Yee Fen Lim, Wai Yee Wan, Warren B. Chik,
Research Collection Yong Pung How School Of Law
The terms “gaming” and “gambling” are fairly wide and they refer to a wide range of activities. Traditionally, the term “gambling” has been used to cover lotteries, wagers and casino-style games. “Gaming” has also been used traditionally in some literature to cover not only activities involving gambling but also games of skill or games predominantly of skill. However, in recent times, certain jurisdictions such as the United States (“US”) and Australia have drawn a distinction between “online gaming” and “online gambling”. The former is used to refer to games played in an online environment which do not have the elements …
The Path Of Cyberlaw In China(中国网络法的道路), 2010 The University of Hong Kong
The Path Of Cyberlaw In China(中国网络法的道路), Henry L. Hu, Benjamin Chiao, Fan Wang, Xiaoshu Wang
Henry L Hu
No abstract provided.
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, 2010 University of Maryland School of Law
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Danielle Keats Citron
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Ict Infrastructure And Public Administration, 2010 Texas A&M University School of Law
Ict Infrastructure And Public Administration, Peter Yu
Peter K. Yu
No abstract provided.
Data Protection: The Challenges Facing Social Networking, 2010 Brigham Young University Law School
Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie
Brigham Young University International Law & Management Review
No abstract provided.
Legal And Ethical Implications Of Corporate Social Networks, 2010 Boise State University
Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park
Management Faculty Publications and Presentations
Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …
La Globalización De La Legislación Cambiaria, 2010 ITESM Campus Puebla
La Globalización De La Legislación Cambiaria, Bruno L. Costantini García
Bruno L. Costantini García
No abstract provided.
Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, 2010 Wildman, Harrold, Allen & Dixon
Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo
Federal Communications Law Journal
Comic-book heroes show us how to be valiant, how to fight for those less fortunate, and, in some circumstances, how to combat those who break the law. Such is the situation in the case of Marvel Enterprises, Inc. v. NCSofl Corp., a battle between user-generated content and the copyright violations that resulted.
While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed, could endanger the protection afforded to authors. Federal and state suits have …
The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, 2010 Indiana University Maurer School of Law
The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian
Federal Communications Law Journal
Academics and popular critics alike want to distill, reform, or altogether destroy U.S. copyright law as we know it. Much of this stems from animosity toward the old-guard record industry's alleged practices of overcharging consumers, underpaying royalties to artists, and suing teenagers and grandmas. But what those calling for reform all seem to neglect is a tiny but inevitable fact: for the first time in history, composers and recording artists can keep their copyrights.
Tangible media sales are being replaced by P2P file sharing, retail downloads, and streaming Webcasts. Digital technologies and wireless networks have opened prime channels for music …