Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

6,066 Full-Text Articles 5,007 Authors 5,313,269 Downloads 156 Institutions

All Articles in Internet Law

Faceted Search

6,066 full-text articles. Page 175 of 188.

Vol. Xix, Tab 56 - Rosetta Stone's Reply Brief In Support Of Its Motion For Partial Summary Judgment As To Liability, Rosetta Stone 2010 Santa Clara Law

Vol. Xix, Tab 56 - Rosetta Stone's Reply Brief In Support Of Its Motion For Partial Summary Judgment As To Liability, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Spaziano Declaration In Opposition To Google's Motion, Jennifer Spaziano 2010 Rosetta Stone

Vol. Ix, Tab 46 - Spaziano Declaration In Opposition To Google's Motion, Jennifer Spaziano

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 47 - Declaration Of Henry Lien (Counsel For Google), Henry Lien 2010 Google

Vol. Ix, Tab 47 - Declaration Of Henry Lien (Counsel For Google), Henry Lien

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xi, Tab 48 - Declaration Of Kris Brewer (Associate Discovery Counsel For Google), Kris Brewer 2010 Google

Vol. Xi, Tab 48 - Declaration Of Kris Brewer (Associate Discovery Counsel For Google), Kris Brewer

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Saving Journalism From Itself? Hot News, Copyright Fair Use And News Aggregation, Joseph Liu 2010 Boston College Law School

Saving Journalism From Itself? Hot News, Copyright Fair Use And News Aggregation, Joseph Liu

Joseph P. Liu

Served as a panelist at a conference at Harvard Law School on "Journalism's Digital Transition: Unique Legal Challenges and Opportunities," sponsored by the Berkman Center for Internet and Society.


Cyber Civil Rights: Looking Forward, Danielle Keats Citron 2010 University of Maryland School of Law

Cyber Civil Rights: Looking Forward, Danielle Keats Citron

Danielle Keats Citron

The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.


Mainstreaming Privacy Torts, Danielle Keats Citron 2010 University of Maryland School of Law

Mainstreaming Privacy Torts, Danielle Keats Citron

Danielle Keats Citron

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Technology Law - Great Google-Y Moogley: The Effect And Enforcement Of Click Fraud And Online Advertising, Amy Tracy 2010 University of Arkansas at Little Rock William H. Bowen School of Law

Technology Law - Great Google-Y Moogley: The Effect And Enforcement Of Click Fraud And Online Advertising, Amy Tracy

University of Arkansas at Little Rock Law Review

No abstract provided.


The Future Of Music: Reconfiguring Public Performance Rights, Gary Myers, George Howard 2010 University of Missouri School of Law

The Future Of Music: Reconfiguring Public Performance Rights, Gary Myers, George Howard

Faculty Publications

This article focuses on two concrete measures to improve the music industry prognosis. Public performance rights have long been an important piece of the economic pie that helps support the music business. This article suggests that the scope of public performance rights should be fundamentally reassessed and expanded. This expansion involves two specific and complementary reconfigurations.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman 2010 University of Minnesota - Twin Cities

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


The Broadband Adoption Index: Improving Measurements And Comparisons Of Broadband Deployment And Adoption, T. Randolph Beard, George S. Ford, Lawrence J. Spiwak, Michael Stern 2010 Auburn University

The Broadband Adoption Index: Improving Measurements And Comparisons Of Broadband Deployment And Adoption, T. Randolph Beard, George S. Ford, Lawrence J. Spiwak, Michael Stern

Federal Communications Law Journal

Countries around the world are increasingly concerned as to whether the adoption of broadband technology by their respective citizens is sufficient to support economic growth and social development. Unfortunately, such concerns are often expressed in terms of where a country ranks among its peers by means of raw adoption numbers. Such raw data are often misleading and incomplete. In this Article, we propose a different and more policy-relevant approach to adoption measurement. We develop a value-based Broadband Adoption Index (BAI) that compares the actual value to society that results from the adoption of broadband technology to a target level of …


Internet Governance And Democratic Legitimacy, Oliver Sylvain 2010 Fordham University School of Law

Internet Governance And Democratic Legitimacy, Oliver Sylvain

Federal Communications Law Journal

Even as the Internet goes pop, federal policymakers continue to surrender their statutory obligation to regulate communications in the first instance to extralegal nongovernmental organizations comprised of technical experts. The FCC's adjudication of a dispute concerning a major broadband service provider's network management practices is a case in point. There, in the absence of any enforceable legislative or regulatory rule, the FCC turned principally to the transmission principles of the Internet Engineering Taskforce, the preeminent nongovernmental Internet engineering standard-setting organization. This impulse to defer as a matter of course to such an organization without any legal mechanism requiring as much …


Behavioral Advertisement Regulation: How The Negative Perception Of Deep Packet Inspection Technology May Be Limiting The Online Experience, Andrea N. Person 2010 Indiana University Maurer School of Law

Behavioral Advertisement Regulation: How The Negative Perception Of Deep Packet Inspection Technology May Be Limiting The Online Experience, Andrea N. Person

Federal Communications Law Journal

Privacy concerns associated with information available on the Internet has become a central focus for policymakers in Washington, D.C., and around the world. Specifically, the use of deep packet inspection (DPI) technology to offer behavioral advertising on the Internet has become the focus of policy discussions. While there are legitimate concerns related to improper use of this technology, the benefits of the proper use of DPI should not be overlooked. This Note asks how increasing regulatory barriers to limit online behavioral advertising could affect the consumer's experience online. To answer this question, this Note first looks at what DPI is, …


Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth 2010 Indiana University Maurer School of Law

Future Imperfect: Googling For Principles In Online Behavioral Advertising, Brian Stallworth

Federal Communications Law Journal

In a remarkably short time, Google, Inc. has grown from two people working in a rented garage to a pervasive Internet force. Much of Google's unprecedented success stems from online advertising sales which employ behavioral advertising techniques-techniques that track consumer behavior--thereby increasing relevance and decreasing the cost of reaching a targeted audience. In the same span that saw Google's inception and explosive online dominance, the Federal Trade Commission has struggled to define not only the privacy issues involved in online behavioral advertising, but also the practice of behavioral advertising itself. Freed from the restraints of comprehensive federal laws and restrictive …


Internet Intermediaries And Copyright Law In Singapore, Warren B. CHIK, David YONG 2010 Singapore Management University

Internet Intermediaries And Copyright Law In Singapore, Warren B. Chik, David Yong

Research Collection Yong Pung How School Of Law

Thisarticle discusses Practice Direction No 2 of 2010 issued by the SubordinateCourts concerning the "ADR Form". It also reviews other jurisdictions’approaches towards encouraging the use of mediation.


Constitutionality Of Cyberbullying Laws: Keeping The Online Playground Safe For Both Teens And Free Speech, Alison V. King 2010 Vanderbilt University Law School

Constitutionality Of Cyberbullying Laws: Keeping The Online Playground Safe For Both Teens And Free Speech, Alison V. King

Vanderbilt Law Review

The Internet is a blessing and a curse. Along with the manifold benefits the Internet provides-electronic research, instantaneous news, social networking, online shopping, to name a few-comes a host of dangers: online harassment and cyberbullying, hacking, voyeurism, identity theft, phishing, and perhaps still more perils that have yet to appear. The Internet creates a virtual world that can result in very real consequences for people's lives. This creates a challenge for parents, schools, and policymakers attempting to keep pace with rapidly developing technologies and to provide adequate protections for children. The even greater challenge, however, is to balance these vital …


Network Neutrality Or Internet Innovation?, Christopher S. Yoo 2010 University of Pennsylvania Carey Law School

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

All Faculty Scholarship

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …


The Future Of Books Related To The Law?, Eugene Volokh 2010 UCLA School of Law

The Future Of Books Related To The Law?, Eugene Volokh

Michigan Law Review

People have been reading books for over 500 years, in more or less the same format. Book technology has changed in some measure during that time. Fonts have become more readable. Books have become more affordable. Still, the general form of the book has remained much the same. But the arrival of e-readers, such as the Kindle and the Sony eBook, offers the possibility of a major change. First, people may shift to reading existing books on those e-readers. Second, the shift may lead them to change the way they use books, for instance by letting people have many reference …


A Portrait Of The Internet As A Young Man, Ann Bartow 2010 University of South Carolina School of Law

A Portrait Of The Internet As A Young Man, Ann Bartow

Michigan Law Review

In brief, the core theory of Jonathan Zittrain's 2008 book The Future of the Internet-And How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be "We have to regulate the Internet to preserve its open, unregulated nature." Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes maximum stability, …


Vol. Viii, Tab 39 - Bill Lloyd Declaration (Google Ad Support Team Lead), Bill Lloyd 2010 Google

Vol. Viii, Tab 39 - Bill Lloyd Declaration (Google Ad Support Team Lead), Bill Lloyd

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Digital Commons powered by bepress