A Portrait Of The Internet As A Young Man,
2010
University of New Hampshire School of Law
A Portrait Of The Internet As A Young Man, Ann Bartow
Law Faculty Scholarship
In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …
Sovereignty In The Age Of Twitter,
2010
Villanova University Charles Widger School of Law
Sovereignty In The Age Of Twitter, Donald L. Doernberg
Villanova Law Review
No abstract provided.
Legal And Ethical Issues Associated With Employee Use Of Social Networks,
2010
Boise State University
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Management Faculty Publications and Presentations
Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.
Google Adwords: Trademark Infringer Or Trade Liberalizer,
2010
University of Michigan Law School
Google Adwords: Trademark Infringer Or Trade Liberalizer, Ashley Tan
Michigan Telecommunications & Technology Law Review
Google is the world's most preferred search engine, with an audience share of eighty percent of Internet users worldwide. With so many people browsing its search results, Google is a natural advertising vehicle, and it has exploited this quality to become one of the most profitable Internet companies in U.S. history. However, success has not come without controversy, and one of the most significant concerns Google AdWords, which displays keyword-triggered ads and sponsored links alongside non-sponsored search results. AdWords has come under attack in the United States and in the European Union ("EU") for its role in trademark infringement on …
Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection,
2010
Yale Law School
Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble
Michigan Telecommunications & Technology Law Review
The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …
Defending Disclosure In Software Licensing,
2010
Boston University School of Law
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Faculty Scholarship
For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).
The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …
Downloading Personhood: A Hegelian Theory Of Copyright Law,
2010
Schulich School of Law, Dalhousie University
Downloading Personhood: A Hegelian Theory Of Copyright Law, Karla M. O'Regan
Canadian Journal of Law and Technology
This article will examine these responses, identifying the competing interests at work in both traditional copyright schemes and contemporary Internet-based criticisms, and put forth a theory of copyright law capable of ad- dressing the needs of these rival interests in an advanced technological era.
Part I delineates some of the more prominent theories copyright scholars have offered in response to the “IP-IT crisis.” Part II attempts to identify the source of these problems by first examining conventional justifications for copyright and the competing interests inherently at work in its conception. Part III identifies three specific factors I argue are particularly …
Groundwork For Assessing The Legal Risks Of Cyberjustice,
2010
Schulich School of Law, Dalhousie University
Groundwork For Assessing The Legal Risks Of Cyberjustice, François Senécal, Karim Benyekhlef
Canadian Journal of Law and Technology
It is clear that the use of information technology is quickly becoming a necessity for the justice system. In civil cases, delays and costs are causing individuals to abandon the courts, and cases that make it to trial are of ever-increasing complexity. Moreover, public security is weakened by the inefficient and cumbersome conditions by which criminal justice information circulates among the various stakeholders, such as the police, prosecutors, the courts, penitentiaries and parole boards, to name only a few. It becomes apparent that information technology has much to offer individuals involved in court cases and the justice system as a …
Strong Medicine: Patents, Market, And Policy Challenges For Managing Neglected Diseases And Affordable Prescription Drugs,
2010
Schulich School of Law, Dalhousie University
Strong Medicine: Patents, Market, And Policy Challenges For Managing Neglected Diseases And Affordable Prescription Drugs, Taiwo A. Oriola
Canadian Journal of Law and Technology
The article is divided into six parts. Part one deals with the introduction, part two discusses the evolution of modern medicine and the socio-economic dynamics that shape the current prescription drug economics, part three discusses the pharmaceutical costs conundrum, part four analyses neglected diseases and the scale of the problem, part five discusses the role of patents on the pharmaceuticals costs trajectory and reviews literature on possible alternatives to promoting incentives for pharmaceuticals R&D, and part six sums up the discourse and reiterates the solutions to the problems identified.
A New Approach To Data Security Breaches,
2010
Schulich School of Law, Dalhousie University
A New Approach To Data Security Breaches, Gideon Emcee Christian
Canadian Journal of Law and Technology
This article examines the problems associated with data security breaches from two different, but not mutually exclusive, perspectives. The first part of the article examines the need for notification in the event of a data security breach and proposes an amendment of the Personal Information Protection and Electronic Document Act (PIPEDA) to create a legal, or statutory, obligation in Canada to compel disclosure or notification of data security breaches. My recommendations are based on the examination of legislation from other legal jurisdictions, highlighting, where necessary, the shortcomings of the legislation, which ought to be taken into consideration in amending PIPEDA …
Book Review: E-Discovery In Canada,
2010
Dalhousie Law School
Book Review: E-Discovery In Canada, Robert J. Currie
Canadian Journal of Law and Technology
It is not hyperbolic to say that the proliferation of electronically stored information (ESI) is probably the most prominent change-harbinger and potential havoc-wreaker in civil litigation today — second only, perhaps, to the spiralling costs of litigation itself. Indeed, the practical and legal difficulties associated with the storage, gathering, preservation, disclosure and evidentiary use of ESI have the potential to act as a Trojan Horse, causing what would previously have been ordinary cases to implode under their weight. Increasing recognition of this is evident; electronic discovery (e-discovery) cases have begun to emerge in the reports, a successful co-operative effort by …
Web 2.0 Regulation: A Risk Management Process,
2010
Schulich School of Law, Dalhousie University
Web 2.0 Regulation: A Risk Management Process, Pierre Trudel
Canadian Journal of Law and Technology
In order to describe the law relating to Web 2.0, we have to look at the normativity that really operates there. Effective norms engender strong enough risks for stakeholders that they find it in their interest to comply. State legislation is not the only thing that governs Internet activities; the normativity that governs the resources associated with Web 2.0 flows from what the technology permits and prohibits, and also largely from stakeholder practices. Configurations and practices create risk or shift risk onto others. However, state regulators may consider that the risks arising out of Internet activities are worrisome enough that …
Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom,
2010
Schulich School of Law, Dalhousie University
Fair Dealing Or Fare Stealing?: Implications Of Canadian Copyright Law Reform On The Online Classroom, Louis Grilli, Daniel Huff, Andrea Shakespeare, Michael Bliemel
Canadian Journal of Law and Technology
This article first examines Canadian copyright law as it pertains to distance education with a detailed review of literature, legislation and jurisprudence, including a comparison with influential law from the United States. Included in this analysis are the opinions of specialists and experts on distance education and copyright in the university environment, who were interviewed during this research. Based on the research findings, we have identified three distinct legislative outcomes. For each, we provide recommendations on how a university and other stakeholders might best protect their interests when confronted with any of these three possibilities.
Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation,
2010
Schulich School of Law, Dalhousie University
Fessing Up To Facebook: Recent Trends In The Use Of Social Network Websites For Civil Litigation, Pamela D. Pengelley
Canadian Journal of Law and Technology
For professional “fact-gatherers” such as lawyers, insurance adjusters, claims handlers and private investigators, the vast wealth of information that people volunteer on Facebook can be a goldmine or a smoking gun, depending on your perspective. The personal information contained in a Facebook profile may be highly relevant to matters at issue in litigation; when dealing with claims, particularly in the personal injury context, the information contained on a Facebook page can make or break a case. It is, therefore, crucial that legal and insurance professionals stay informed of new developments in this emerging area of law. This article, written with …
Libraries, Digital Content, And Copyright,
2010
Vanderbilt University Law School
Libraries, Digital Content, And Copyright, Laura N. Gasaway
Vanderbilt Journal of Entertainment & Technology Law
Libraries use, acquire, create and host generate digital content. They digitize their existing collections of works such as letters, diaries and manuscripts and post them on library websites. Increasingly, libraries are utilizing digital technology to preserve library works which may or may not be made available to the public. Libraries also create, manage and host user generated content such as posts on discussion boards, blogs, wikis, RSS feeds, social bookmarking, tagging, and social networks. Libraries use user generated content for internal library purposes, such as displays and events and for teaching. Further, libraries often are asked to assist users who …
Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights,
2010
Vanderbilt University Law School
Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis
Vanderbilt Journal of Entertainment & Technology Law
Google Books will likely become the world's most extensive book and magazine search and browsing resource, library, and bookstore--combined. However, as users necessarily reveal personal identifying information through their book searches and reading habits, this service poses a significant threat to personal privacy.
Because the Google Books Amended Settlement Agreement neglects to meaningfully address user privacy, the only available privacy protections are the limited rights bestowed by the Google Books Privacy Policy and the Google Privacy Policy. Unfortunately, these Privacy Policies protect the interests of Google at the expense of users.
The enactment of federal privacy statutes, which include provisions …
No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases,
2010
Vanderbilt University Law School
No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman
Vanderbilt Journal of Entertainment & Technology Law
Internet search engines such as Google and Yahoo! earn a majority of their profit from selling advertisements to appear next to search results. Google's coveted advertising space, however, causes nightmares for trademark holders when their trademarks are auctioned by Google to competitors as keywords to trigger the competitors' advertisements when the trademark is used as a search term. Advertisers strategically bid on trademarks of competitors to ensure that their ads appear whenever the trademark is used as a search term, instead of the advertisements of the trademark holder. For example, Nike could bid on the trademark for "Adidas," with the …
Mainstreaming Privacy Torts,
2010
University of Maryland School of Law
Mainstreaming Privacy Torts, Danielle Keats Citron
Faculty Scholarship
In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …
Cyber Civil Rights: Looking Forward,
2010
University of Maryland School of Law
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Faculty Scholarship
The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century,
2010
University of Maryland School of Law
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Faculty Scholarship
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.
In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …