Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

PDF

2001

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 76

Full-Text Articles in Law

Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet Nov 2001

Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet

Duke Law & Technology Review

In light of the recent terrorists attacks and the increasing threat of bioterrorism, many U.S. citizens have turned to the Internet in an attempt to gather the supplies needed to protect them and their loved ones. Central to the effort is the increased purchasing of prescription drugs over the Internet. This iBrief explores the benefits and risks to consumers from buying drugs online, and examines recent initiatives to police the online pharmacy industry.


Why Are We So Reluctant To "Execute" Microsoft?, Robert H. Lande Nov 2001

Why Are We So Reluctant To "Execute" Microsoft?, Robert H. Lande

All Faculty Scholarship

On June 28, 2001, the D.C. Court of Appeals held that Microsoft has violated the antitrust laws repeatedly, relentlessly, and over a multi-year period. The court ruled eight separate times that Microsoft engaged in conduct that illegally maintained its monopoly in PC operating systems. Despite these strongly worded conclusions concerning Microsoft’s liability, the court was extremely cautious when it considered whether to break up the company. It held that divestiture was a “radical” remedy that should be imposed with “great caution.”


Liberty For Security, Morgan Streetman Oct 2001

Liberty For Security, Morgan Streetman

Duke Law & Technology Review

On 11 September 2001, we collectively endured the worst tragedy to touch American soil since the Civil War. In the wake of this horrible event, a national hysteria erupted. People are anxious to restore the lost security; but at what cost? Many Americans seem not to care about the costs, and national polls show that now, more than ever, Americans are willing to trade their precious civil liberties in an attempt to restore security. As the ACLU has stated these are difficult days. Not only are they difficult, they will define the future of America. This iBrief explores the reactions …


The Perfect Caper?: Private Damages And The Microsoft Case, Robert H. Lande, James Langenfeld Oct 2001

The Perfect Caper?: Private Damages And The Microsoft Case, Robert H. Lande, James Langenfeld

All Faculty Scholarship

As readers of crime novels know, there are many definitions of the perfect caper. Under most, the perpetrator gets to keep its ill-gotten gains and goes unpunished. Even if the perpetrator is arrested and brought to trial, he or she still typically escapes punishment completely due to a variety of unusual circumstances. This is essentially what Professors John E. Lopatka and William H. Page are arguing about Microsoft's actions. They assert that even though Microsoft has violated the antitrust laws, it will not be made to pay for its anticompetitive conduct, at least not by private plaintiffs.


Tax Competition And E-Commerce, Reuven S. Avi-Yonah Sep 2001

Tax Competition And E-Commerce, Reuven S. Avi-Yonah

Articles

In the last four years, there has been increasing concern by developed countries about the potential erosion of the corporate income tax base by "harmful tax competition" (in the European Union since 1997, in the OECD since 1998). However, the data on tax competition available to date present a mixed and somewhat puzzling picture. On the one hand, there is considerable evidence that effective corporate income tax rates in many countries have been declining, and that the worldwide effective tax rates on multinational enterprises (MNEs) have been going down as well. On the other hand, macroeconomic data from developed countries …


Protecting Against International Infringements In The Digital Age Using United States Copyright Law: A Critical Analysis Of The Current State Of The Law, Brandon Dalling Sep 2001

Protecting Against International Infringements In The Digital Age Using United States Copyright Law: A Critical Analysis Of The Current State Of The Law, Brandon Dalling

BYU Law Review

No abstract provided.


Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet Aug 2001

Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet

Duke Law & Technology Review

Perhaps you have written an e-mail that looks something like this:


Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin Jun 2001

Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin

Duke Law & Technology Review

With online gambling becoming increasingly accessible and popular, state and federal politicians are asking themselves how to make the prohibition on online gambling effective. Nevertheless, questions still linger as to whether outright prohibition is truly the right answer.


Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel Apr 2001

Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel

Faculty Scholarship

The Puzzle: The Internet is a wonderful innovation, allowing people around the world to communicate, trade, and obtain services. Convenient and rich in choices and opportunities, the Internet is tremendously attractive to buyers. Naturally, businesses are flocking to the Internet. The warning has been sounded that those who do not stake a claim in this incredible new communication medium will be left behind to perish. Yet, with all the enthusiasm, many buyers hesitate to take a serious plunge. Businesses are told repeatedly that they must obtain their customers' trust, yet find it more difficult to gain this trust in cyberspace …


Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page Apr 2001

Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page

UF Law Faculty Publications

The goal of telecommunications policy has shifted from the control of natural monopoly to the promotion of competition. But the question remains how extensive and persistent the government's regulatory role should be in the operation of communications markets. One might think that regulators could find the answer to this question in antitrust law. But antitrust has itself been torn between interventionist and laissez-faire tendencies. Over the past two decades, the dominant Chicago School approach to antitrust has focused on economic efficiency, a standard that has led to the abandonment or contraction of some categories of liability. More recently, however, post-Chicago …


Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde Mar 2001

Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde

Duke Law & Technology Review

The Yahoo! auction case illustrates the problems inherent in the lack of a common Internet jurisdictional structure. This iBrief argues that the application of local law allowed France to win a victory against domestic hate groups, but dealt a blow to free speech everywhere.


3rd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law Mar 2001

3rd Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law

Continuing Legal Education Materials

Materials from the 3rd Annual Computer & Technology Law Institute held by UK/CLE in March 2001.


Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde Feb 2001

Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde

Duke Law & Technology Review

Billions of securities are traded every day in public and private markets around the world. This practice is hundreds of years old and as long as securities have been traded, someone has tried to defraud the system to make a quick buck. With the advent of the Internet, new securities fraud schemes have appeared.


Juries And Technology: Equipping Jurors For The Twenty-First Century (Symposium), Nancy S. Marder Feb 2001

Juries And Technology: Equipping Jurors For The Twenty-First Century (Symposium), Nancy S. Marder

All Faculty Scholarship

No abstract provided.


An Overview Of The Virginia Ucita, Carlyle C. Ring Jr. Jan 2001

An Overview Of The Virginia Ucita, Carlyle C. Ring Jr.

Richmond Journal of Law & Technology

Virginia has taken a strong and important leadership in establishing rules for the Information Highway through the Joint Committee on Technology and Science (JCOTS) and Delegate Joe T. May. Without the Uniform Computer Information Transactions Act (UCITA) no established rules exist in common law for the Information Highway, which means that each judge must create the rules in each case as it arises. Every judge will make his own rules for the particular case. This results in great inconsistency and uncertainty adversely affecting the realization of the full potential of the Information Age economy. Governor Gilmore states: In 2000, Virginia …


Remarks On Technology Growth In Virginia: How Ucita Will Help, Terry Riley Jan 2001

Remarks On Technology Growth In Virginia: How Ucita Will Help, Terry Riley

Richmond Journal of Law & Technology

I'm Terry Riley from the Hampton Roads Technology Council, and technology councils represent business. But predominantly we represent small business, and predominantly we represent users of software, not developers and sellers of software. In the case of my own technology council down [in the] southeastern part of the state, 85 percent of our members have 25 or fewer employees. Less than 5 percent of our members are developers, sellers, or licensors of software. So to a very substantial extent my views and my representations of the interests of my membership have to do with their concerns or their rights as …


State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner Jan 2001

State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner

Richmond Journal of Law & Technology

In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.


United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon Jan 2001

United States V. Keystone Sanitation Company: E-Mail And The Attorney-Client Privilege, Karen M. Coon

Richmond Journal of Law & Technology

The rapid growth and sophistication of technology have changed the way people communicate. E-mail and the Internet have begun to affect the way attorneys communicate with their clients. E-mail is fast and convenient, but it is not without risks. The risk of illegal interception and the risk of inadvertent disclosure are serious issues that attorneys need to be aware of and try to prevent so that the attorney-client privilege is protected as much as possible. Although communicating with a client by e-mail may be risky, the risks posed by e-mail are no different from those posed by communicating by postal …


Internet Jurisdiction Today, Adria Allen Jan 2001

Internet Jurisdiction Today, Adria Allen

Northwestern Journal of International Law & Business

This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Jan 2001

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Faculty Publications

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin Jan 2001

Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin

UIC Law Open Access Faculty Scholarship

No abstract provided.


Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin Jan 2001

Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin

UIC Law Open Access Faculty Scholarship

No abstract provided.


Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin Jan 2001

Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin

UIC Law Open Access Faculty Scholarship

No abstract provided.


Internet Web Site Jurisdiction, 20 J. Marshall J. Computer & Info. L. 21 (2001), Richard A. Bales, Suzanne Van Wert Jan 2001

Internet Web Site Jurisdiction, 20 J. Marshall J. Computer & Info. L. 21 (2001), Richard A. Bales, Suzanne Van Wert

UIC John Marshall Journal of Information Technology & Privacy Law

The Internet is here to stay. Consequently, disputes in this cyberspace are heard in courts nationwide, and one of the most fundamental litigation questions is the personal jurisdiction. In this article, the authors discuss the difficulties courts have in defining the degree of interaction between the Web site operator and online users. The authors first discuss the background of how courts tackle the personal jurisdiction issue. Then, as the society leaps into the cyberspace, authors analyze how this great development in technology and communications creates challenges to courts in grounding personal jurisdictional issues. By going through case analyses, authors show …


Self-Prescribing Medication: Regulating Prescription Drug Sales On The Internet, 20 J. Marshall J. Computer & Info. L. 57 (2001), Kristin Yoo Jan 2001

Self-Prescribing Medication: Regulating Prescription Drug Sales On The Internet, 20 J. Marshall J. Computer & Info. L. 57 (2001), Kristin Yoo

UIC John Marshall Journal of Information Technology & Privacy Law

"Online pharmacies, your friendly neighborhood drugstores." The Internet is not only a great telecommunication medium but also a low-cost and convenient commercial marketplace. It is no exception that online pharmacies flourished as a result, but the consequences of such development pose grave danger to the public and great challenges to regulations. The author discusses the benefits and risk of online pharmacies, the different types of online pharmacies, state governments' involvement in regulating online prescriptions and federal involvements. Despite both state and federal legislations and regulations, proliferation of online pharmacies, established inside and outside of the US, proves to be a …


The Electronic Communications Privacy Act: Does The Answer To The Internet Information Privacy Problem Lie In A Fifteen Year Old Federal Statute? A Detailed Analysis, 20 J. Marshall J. Computer & Info. L. 1 (2001), Henry M. Cooper Jan 2001

The Electronic Communications Privacy Act: Does The Answer To The Internet Information Privacy Problem Lie In A Fifteen Year Old Federal Statute? A Detailed Analysis, 20 J. Marshall J. Computer & Info. L. 1 (2001), Henry M. Cooper

UIC John Marshall Journal of Information Technology & Privacy Law

In 1986, Congress enacted the Electronic Communications Privacy Act ("ECPA") to update and clarify federal privacy protections and standards in light of changes in new technologies. Since, then, however, the Internet has grown immensely and this article discusses whether a new federal legislation is needed to meet the challenge. The author starts his analysis by defining what is "information privacy right." Then, he discusses how this right is been used and misused on the Internet. Following such definition, he discussed the ECPA Title II in detail. He analyses provisions of the ECPA, including section 2701, the definition of "access," sections …


2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 20 J. Marshall J. Computer & Info. L. 91 (2001), Ryan Alexander, Robert S. Gurwin, Dominick Lanzito, Nicole D. Milos, Bridget O'Neill Jan 2001

2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 20 J. Marshall J. Computer & Info. L. 91 (2001), Ryan Alexander, Robert S. Gurwin, Dominick Lanzito, Nicole D. Milos, Bridget O'Neill

UIC John Marshall Journal of Information Technology & Privacy Law

In this bench memo, the Supreme Court of the state of Marshall is asked to decide whether the actions of defendant, Marshall Manatees, evidence a theory of false light invasion of privacy as defined by the Restatement (Second) of Torts and whether defendant's actions of comparing the digital photographic images collected at the Marshall Center to their database and ultimately posting plaintiff's photo on its billboard constituted an actionable claim for misappropriation. Plaintiff, Allen Sanders, attended a professional basketball game where the Marshall Manatees were hosting an opposing team at the Marshall Center. He purchased the ticket online and received …


2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 20 J. Marshall J. Computer & Info. L. 109 (2001), Gregory Brady, Steven Brooks, Christian Sullivan Jan 2001

2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 20 J. Marshall J. Computer & Info. L. 109 (2001), Gregory Brady, Steven Brooks, Christian Sullivan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 20 J. Marshall J. Computer & Info. L. 151 (2001), Courtney Scantlin, Mekisha Walker, Warren Clint Wells Jan 2001

2001 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 20 J. Marshall J. Computer & Info. L. 151 (2001), Courtney Scantlin, Mekisha Walker, Warren Clint Wells

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Consequential Damages Exclusions Under Ucita, 19 J. Marshall J. Computer & Info. L. 295 (2001), Douglas E. Phillips Jan 2001

Consequential Damages Exclusions Under Ucita, 19 J. Marshall J. Computer & Info. L. 295 (2001), Douglas E. Phillips

UIC John Marshall Journal of Information Technology & Privacy Law

The Uniform Computer Information Transactions Act ("UCITA") elicits both love and hate, but decision time is here. Two states have enacted UCITA, several others are considering it, and UCITA choice-of-law clauses are already beginning to appear in software license agreements and other computer information contracts. This article focuses on how UCITA affects a pivotal issue: enforceability of contract clauses that exclude consequential damages. Losses from software development gone awry often far exceed the customer's investment and the developer's return. Under the Uniform Commercial Code, questions remain about the enforceability in certain circumstances of consequential damages exclusions. UCITA answers these questions …