Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

6,065 Full-Text Articles 5,004 Authors 5,313,269 Downloads 156 Institutions

All Articles in Internet Law

Faceted Search

6,065 full-text articles. Page 173 of 188.

A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer 2010 Australian National University College of Law

A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer

Matthew Rimmer

This essay provides a critical assessment of the Fair Use Project based at the Stanford Center for Internet and Society. In evaluating the efficacy of the Fair Use Project, it is worthwhile considering the litigation that the group has been involved in, and evaluating its performance. Part 1 outlines the history of the Stanford Center for Internet and Society, and the aims and objectives of the Fair Use Project. Part 2 considers the litigation in Shloss v. Sweeney over a biography concerning Lucia Joyce, the daughter of the avant-garde literary great, James Joyce. Part 3 examines the dispute over the …


La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano 2010 Junior researcher/Fellow assistant of the University of Murcia

La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano

Germán M. Teruel Lozano

Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.


Who Owns The Virtual Items?, Leah Shen 2010 Duke Law

Who Owns The Virtual Items?, Leah Shen

Duke Law & Technology Review

Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …


The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness 2010 Duke Law

The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness

Duke Law & Technology Review

The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …


The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons 2010 Boston College Law School

The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons

Daniel Lyons

No abstract provided.


Online Privacy, Social Networking, And Crime Victimization : Hearing Before The H. Subcomm. On Crime, Terrorism, And Homeland Security Of The H. Comm. On The Judiciary, 111th Cong., July 28, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg 2010 Georgetown University Law Center

Online Privacy, Social Networking, And Crime Victimization : Hearing Before The H. Subcomm. On Crime, Terrorism, And Homeland Security Of The H. Comm. On The Judiciary, 111th Cong., July 28, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg

Testimony Before Congress

Mr. Chairman, Facebook is a tremendous service, with the scope of email, the telephone, and even the Internet itself. It is also the source of many of the privacy concerns of users today. The critical problem is not what users post; it is that the Facebook changes the privacy settings too frequently and Facebook makes it too difficult for users to selectively post information. Self‐regulation has not worked because the FTC has been reluctant to pursue investigations. So, EPIC recommends changes to ECPA in Title 18 that would give users greater control of their information and reduce risk when they …


Planning For The Future Of Cyber Attack Attribution : Hearing Before The H. Subcomm. On Technology And Innovation Of The H. Comm. On Science And Technology, 111th Cong., July 15, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg 2010 Georgetown University Law Center

Planning For The Future Of Cyber Attack Attribution : Hearing Before The H. Subcomm. On Technology And Innovation Of The H. Comm. On Science And Technology, 111th Cong., July 15, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg

Testimony Before Congress

Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr. Bellovin explains:

The fundamental premise of the proposed strategy is that our serious Internet security problems are due to lack of sufficient authentication. That is demonstrably false. The biggest problem was and is buggy code. All the authentication in the world won't stop a bad guy who goes around the authentication system, either by finding bugs exploitable before authentication is performed, finding bugs in the authentication system itself, or …


Privacy And Consumer Risks In Cloud Computing, Dan Svantesson, Roger Clarke 2010 Bond University

Privacy And Consumer Risks In Cloud Computing, Dan Svantesson, Roger Clarke

Dan Svantesson

While vaguely defined, and wide in scope, so-called ‘cloud computing’ has gained considerable attention in recent times. Put simply, it refers to an arrangement under which a user relies on another party to provide access to remote computers and software, whose whereabouts, including their jurisdictional location, are not known nor controllable by the user. In this article, we examine the privacy and consumer risks that are associated with cloud computing.


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García 2010 ITESM Campus Puebla

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig 2010 Indiana University Maurer School of Law

Love Thy Neighbor: The Tampere Convention As Global Legislation, Allison Rahrig

Indiana Journal of Global Legal Studies

The Internet, 24-hour news sources, and a host of other telecommunications advances have allowed global citizens to become instantaneously informed. With the privilege of real-time updates and acute awareness of the world's events comes the responsibility of being more than a passive observer. Specifically, this Note focuses on the technological improvements in communication during natural disasters-improvements that can be used to assist and aid the victims of catastrophes. In the aftermath of a natural disaster, the country affected is rarely able to provide for its citizens; tsunamis, hurricanes, tornadoes, and earthquakes can (and often do) cripple an entire nation. This …


Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh 2010 University of Washington School of Law

Trusting The Machines: New York State Bar Ethics Opinion Allows Attorneys To Use Gmail, Kevin Raudebaugh

Washington Journal of Law, Technology & Arts

Information technology is evolving at an unprecedented rate; new forms of communication appear so often that it is difficult to keep track of them all. This presents a difficult problem for attorneys, who must carefully consider whether using new technology to communicate with clients is consistent with the duty of confidentiality. Google’s Gmail scans the content of e-mails to generate targeted advertising, a controversial practice that raises questions about whether its users have a reasonable expectation of privacy. The New York Bar responded to this issue in Opinion 820, which states that using an e-mail provider that scans the e-mail …


Report Of The Law Reform Committee On Online Gaming And Singapore, Joyce A. TAN, Aqbal SINGH, Yee Fen LIM, Wai Yee WAN, Warren B. CHIK, 2010 Singapore Management University

Report Of The Law Reform Committee On Online Gaming And Singapore, Joyce A. Tan, Aqbal Singh, Yee Fen Lim, Wai Yee Wan, Warren B. Chik,

Research Collection Yong Pung How School Of Law

The terms “gaming” and “gambling” are fairly wide and they refer to a wide range of activities. Traditionally, the term “gambling” has been used to cover lotteries, wagers and casino-style games. “Gaming” has also been used traditionally in some literature to cover not only activities involving gambling but also games of skill or games predominantly of skill. However, in recent times, certain jurisdictions such as the United States (“US”) and Australia have drawn a distinction between “online gaming” and “online gambling”. The former is used to refer to games played in an online environment which do not have the elements …


The Path Of Cyberlaw In China(中国网络法的道路), Henry L. Hu, Benjamin Chiao, Fan Wang, Xiaoshu Wang 2010 The University of Hong Kong

The Path Of Cyberlaw In China(中国网络法的道路), Henry L. Hu, Benjamin Chiao, Fan Wang, Xiaoshu Wang

Henry L Hu

No abstract provided.


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron 2010 University of Maryland School of Law

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Danielle Keats Citron

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Ict Infrastructure And Public Administration, Peter Yu 2010 Texas A&M University School of Law

Ict Infrastructure And Public Administration, Peter Yu

Peter K. Yu

No abstract provided.


Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie 2010 Brigham Young University Law School

Data Protection: The Challenges Facing Social Networking, Daniel B. Garrie, Maureen Duffy-Lewis, Rebecca Wong, Richard L. Gillespie

Brigham Young University International Law & Management Review

No abstract provided.


Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park 2010 Boise State University

Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García 2010 ITESM Campus Puebla

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo 2010 Wildman, Harrold, Allen & Dixon

Thwack!! Take That, User-Generated Content!: Marvel Enterprises V. Ncsoft, Carl Michael Szabo

Federal Communications Law Journal

Comic-book heroes show us how to be valiant, how to fight for those less fortunate, and, in some circumstances, how to combat those who break the law. Such is the situation in the case of Marvel Enterprises, Inc. v. NCSofl Corp., a battle between user-generated content and the copyright violations that resulted.

While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed, could endanger the protection afforded to authors. Federal and state suits have …


The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian 2010 Indiana University Maurer School of Law

The Sound Of Money: Securing Copyright, Royalties, And Creative "Progress" In The Digital Music Revolution, Armen Boyajian

Federal Communications Law Journal

Academics and popular critics alike want to distill, reform, or altogether destroy U.S. copyright law as we know it. Much of this stems from animosity toward the old-guard record industry's alleged practices of overcharging consumers, underpaying royalties to artists, and suing teenagers and grandmas. But what those calling for reform all seem to neglect is a tiny but inevitable fact: for the first time in history, composers and recording artists can keep their copyrights.

Tangible media sales are being replaced by P2P file sharing, retail downloads, and streaming Webcasts. Digital technologies and wireless networks have opened prime channels for music …


Digital Commons powered by bepress