Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

5,879 Full-Text Articles 4,805 Authors 4,776,245 Downloads 153 Institutions

All Articles in Internet Law

Faceted Search

5,879 full-text articles. Page 174 of 177.

The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul 2010 Schulich School of Law, Dalhousie University

The Patentability Of Electromagnetic And Acoustic Signals In Canada, Natalie Raffoul

Canadian Journal of Law and Technology

The issue of the patentability of electromagnetic and acoustic signals has not been litigated in Canada. If, however, the issue does come forward for litigation, Canadian courts may decide differently than their American colleagues did. The Supreme Court of Canada’s ‘Harvard Mouse’ decision shows that the Canadian law on patentable subject matter differs from American law. Under the Canadian definition of manufacture, electromagnetic and acoustic signals could constitute patentable subject matter.


Google Adwords And Canadian Trademark Law, Reed W. Taubner 2010 Schulich School of Law, Dalhousie University

Google Adwords And Canadian Trademark Law, Reed W. Taubner

Canadian Journal of Law and Technology

This article aims to answer two questions: should business competitors be allowed to use each other’s goodwill in this way and, if so, can trademark law police the program without stifling competition? Part I examines the technical aspects of the AdWords program. Part II explores the underlying rationales of trademark law to start developing a normative position. Part III reviews the American jurisprudence and commentary to hone that normative position and to identify a compatible legal framework. Part IV compares that framework against Canadian law.

This article endorses the work of Misha Gregory Macaw who, unlike some trademark expansionists, argues …


Cell Phone - A "Weapon" Of Mass Discretion, Mark L. Mayakis 2010 Campbell University School of Law

Cell Phone - A "Weapon" Of Mass Discretion, Mark L. Mayakis

Campbell Law Review

Initially, this Comment will discuss the development of the search incident to arrest exception from the warrant requirement and how this exception has been generally defined and judicially interpreted. The next section will include a discussion of how the search incident to arrest exception has been applied to searches of the content stored within pagers. This Comment will then explain how modern cell phones have created difficulties for courts applying the search incident to arrest exception, causing these courts to diverge down two different lines of reasoning, ultimately reaching opposite conclusions. Finally, this Comment will reiterate the necessity that the …


Computer Hacking As A Deceptive Device: Why The Courts Must Give Computers Legal Consciousness To Hold Hackers Liable For Insider Trading, Farid Sharaby 2010 University of the Pacific, McGeorge School of Law

Computer Hacking As A Deceptive Device: Why The Courts Must Give Computers Legal Consciousness To Hold Hackers Liable For Insider Trading, Farid Sharaby

McGeorge Law Review

No abstract provided.


Margae, Inc. V. Clear Link Technologies, Jonathan Goodman 2010 New York Law School Class of 2010

Margae, Inc. V. Clear Link Technologies, Jonathan Goodman

NYLS Law Review

No abstract provided.


Sovereignty In The Age Of Twitter, Donald L. Doernberg 2010 Elisabeth Haub School of Law at Pace University

Sovereignty In The Age Of Twitter, Donald L. Doernberg

Elisabeth Haub School of Law Faculty Publications

To a degree unimaginable even as recently as twenty-five years ago, people all over the world can communicate with each other easily, cheaply, and frequently, with the concomitant result that people learn more about what is happening elsewhere in the world and even in their own countries. Governments can no longer control information flow nearly to the extent that was once possible, and that has enabled people outside of government to know much more about what government is doing and to know it considerably sooner than might otherwise have been the case. That availability of information is changing the nature …


An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings 2010 Seton Hall Law

An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings

Student Works

No abstract provided.


A Portrait Of The Internet As A Young Man, Ann Bartow 2010 University of New Hampshire School of Law

A Portrait Of The Internet As A Young Man, Ann Bartow

Law Faculty Scholarship

In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …


Sovereignty In The Age Of Twitter, Donald L. Doernberg 2010 Villanova University Charles Widger School of Law

Sovereignty In The Age Of Twitter, Donald L. Doernberg

Villanova Law Review

No abstract provided.


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park 2010 Boise State University

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan 2010 University of Michigan Law School

Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan

Michigan Telecommunications & Technology Law Review

Google is the world's most preferred search engine, with an audience share of eighty percent of Internet users worldwide. With so many people browsing its search results, Google is a natural advertising vehicle, and it has exploited this quality to become one of the most profitable Internet companies in U.S. history. However, success has not come without controversy, and one of the most significant concerns Google AdWords, which displays keyword-triggered ads and sponsored links alongside non-sponsored search results. AdWords has come under attack in the United States and in the European Union ("EU") for its role in trademark infringement on …


Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble 2010 Yale Law School

Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble

Michigan Telecommunications & Technology Law Review

The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …


Defending Disclosure In Software Licensing, Maureen A. O'Rourke 2010 Boston University School of Law

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


The Statute Of Anne: Today And Tomorrow, Peter Jaszi, Craig Joyce, Marshall A. Leaffer, Tyler Trent Ochoa 2010 American University Washington College of Law

The Statute Of Anne: Today And Tomorrow, Peter Jaszi, Craig Joyce, Marshall A. Leaffer, Tyler Trent Ochoa

Articles in Law Reviews & Other Academic Journals

This essay provides the epilogue to the University of Houston’s Institute for Intellectual Property & Information Law’s 2010 National Conference, “The ©©© Conference: Celebrating Copyright’s tri-Centennial,” in Santa Fe, New Mexico. The conference focused on the Statute of Anne, the first copyright statute ever, anywhere, enacted by the British Parliament in 1710.

Copyright law in the United States, the lineal descendant of the Statute of Anne, has managed to negotiate a course between over-protecting and under-protecting copyrighted matter, and to strike at least a rough balance between the social interest in securing capital investment, on the one hand, and encouraging …


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton 2010 University of PIttsburgh School of Law

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton 2010 University of PIttsburgh School of Law

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Downloading Personhood: A Hegelian Theory Of Copyright Law, Karla M. O'Regan 2010 Schulich School of Law, Dalhousie University

Downloading Personhood: A Hegelian Theory Of Copyright Law, Karla M. O'Regan

Canadian Journal of Law and Technology

This article will examine these responses, identifying the competing interests at work in both traditional copyright schemes and contemporary Internet-based criticisms, and put forth a theory of copyright law capable of ad- dressing the needs of these rival interests in an advanced technological era.

Part I delineates some of the more prominent theories copyright scholars have offered in response to the “IP-IT crisis.” Part II attempts to identify the source of these problems by first examining conventional justifications for copyright and the competing interests inherently at work in its conception. Part III identifies three specific factors I argue are particularly …


Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef 2010 Schulich School of Law, Dalhousie University

Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef

Canadian Journal of Law and Technology

It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …


Strong Medicine: Patents, Market, And Policy Challenges For Managing Neglected Diseases And Affordable Prescription Drugs, Taiwo A. Oriola 2010 Schulich School of Law, Dalhousie University

Strong Medicine: Patents, Market, And Policy Challenges For Managing Neglected Diseases And Affordable Prescription Drugs, Taiwo A. Oriola

Canadian Journal of Law and Technology

The article is divided into six parts. Part one deals with the introduction, part two discusses the evolution of modern medicine and the socio-economic dynamics that shape the current prescription drug economics, part three discusses the pharmaceutical costs conundrum, part four analyses neglected diseases and the scale of the problem, part five discusses the role of patents on the pharmaceuticals costs trajectory and reviews literature on possible alternatives to promoting incentives for pharmaceuticals R&D, and part six sums up the discourse and reiterates the solutions to the problems identified.


A New Approach To Data Security Breaches, Gideon Emcee Christian 2010 Schulich School of Law, Dalhousie University

A New Approach To Data Security Breaches, Gideon Emcee Christian

Canadian Journal of Law and Technology

This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …


Digital Commons powered by bepress