Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Law

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges Dec 2015

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …


Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett Oct 2015

Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett

John Ehrett

I evaluate the dimensions of courts’ current interpretive dilemma, and subsequently sketch a possible framework for extending traditional statutory interpretation principles into this new domain: throughout the following analysis, I describe the process of attaching cognizable linguistic referents to emoticons and emojis throughout as symbolical reification, and propose a normative way forward for those tasked with deriving meaning from emoji-laden communications.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Oct 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Alberto Bernabe

No abstract provided.


"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo Aug 2015

"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo

Críspulo Marmolejo

This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …


Measuring Compliance With Compulsory Licensing Remedies In The American Microsoft Case, William Page, Seldon Childers Aug 2015

Measuring Compliance With Compulsory Licensing Remedies In The American Microsoft Case, William Page, Seldon Childers

William H. Page

Section III.E of the final judgments in the American Microsoft case requires Microsoft to make available to software developers certain communications protocols that Windows client operating systems use to interoperate with Microsoft's server operating systems. This provision has been by far the most difficult and costly to implement, primarily because of questions about the quality of Microsoft's documentation of the protocols. The plaintiffs' technical experts, in testing the documentation, have found numerous issues, which they have asked Microsoft to resolve. Because of accumulation of unresolved issues, the parties agreed in 2006 to extend Section III.E for up to five more …


On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock Aug 2015

On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock

William B.T. Mock

The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii Jul 2015

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii

David E. Sorkin

Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jul 2015

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

David E. Sorkin

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jul 2015

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

David E. Sorkin

No abstract provided.


Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin Jul 2015

Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin

David E. Sorkin

This article examines the effect of spam legislation in the United States. It discusses state legislation and the common provisions of state spam legislation, such as disclosure and labeling requirements and opt-out provisions. It also analyzes the consequences of state anti-spam legislation. Federal legislation is analyzed, with a brief look at the CAN-SPAM Act of 2003. The article concludes that legislation has not had a big impact on spam, and the CAN-SPAM Act is not likely to change or curb spam.


1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin Jul 2015

1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin

David E. Sorkin

No abstract provided.


Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin Jul 2015

Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin

David E. Sorkin

No abstract provided.


Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin Jul 2015

Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin

David E. Sorkin

No abstract provided.


Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin Jul 2015

Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin

David E. Sorkin

No abstract provided.


Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, 45 Buff. L. Rev. 1001 (1997), David E. Sorkin Jul 2015

Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, 45 Buff. L. Rev. 1001 (1997), David E. Sorkin

David E. Sorkin

No abstract provided.


The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin Jul 2015

The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin

David E. Sorkin

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat Jul 2015

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat

David E. Sorkin

No abstract provided.


The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford Jul 2015

The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford

William K. Ford

"[A]s a general rule," writes Pulitzer Prize-winning journalist Edward Humes, "courts don't do science very well."' Susan Haack, a professor of law and philosophy, elaborates on why this may be true, offering several reasons for "deep tensions" between science and law. The reasons offered by Haack may be less of a concern where the dispute involves litigation against the government on significant questions of public policy. Recent decisions assessing the constitutionality of laws restricting minors' access to violent video games therefore offer an opportunity to examine how well the courts handled scientific evidence in a situation lacking some of the …


Copy Game For High Score: The First Video Game Lawsuit, 20 J. Intell. Prop. L. 1 (2012), William K. Ford Jul 2015

Copy Game For High Score: The First Video Game Lawsuit, 20 J. Intell. Prop. L. 1 (2012), William K. Ford

William K. Ford

Commentators and industry historians generally agree that the multi-billion dollar video game industry began forty years ago in November 1972 with Atari's release of Pong. Pong is among the simplest of video games: a version of ping pong or tennis requiring little more to play than a ball, two paddles, a scoring indicator, and a couple of memorable sounds. While it was not the first video game, Pong was the first video game hit. With unauthorized copying of a successful product occurring, it is not surprising that a lawsuit resulted in the fall of 1973, one that predates the more …


Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler Jul 2015

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler

William K. Ford

Are games more like coffee mugs, posters, and T-shirts, or are they more like books, magazines, and films? For purposes of the right of publicity, the answer matters. The critical question is whether games should be treated as merchandise or as expression. Three classic judicial decisions, decided in 1967, 1970, and 1973, held that the defendants needed permission to use the plaintiffs' names in their board games. These decisions judicially confirmed that games are merchandise, not something equivalent to more traditional media of expression. As merchandise, games are not like books; instead, they are akin to celebrity-embossed coffee mugs. To …


The Political Economy Of Data Protection, Peter K. Yu Jul 2015

The Political Economy Of Data Protection, Peter K. Yu

Peter K. Yu

Information is the lifeblood of a knowledge-based economy. The control of data and the ability to translate them into meaningful information is indispensable to businesspeople, policymakers, scientists, engineers, researchers, students, and consumers. Having useful, and at times exclusive, information improves productivity, advances education and training, and helps create a more informed citizenry. In the past two decades, those who collected or obtained access to a large amount of data began to explore ways to use the collected data as an income stream. Because the then-existing laws did not offer adequate protection for that particular purpose, they actively lobbied for stronger …


Against Employer Dumpster-Diving For Email, Michael Z. Green Jul 2015

Against Employer Dumpster-Diving For Email, Michael Z. Green

Michael Z. Green

Recent attorney client-privilege cases ojfer a modern understanding of reasonable expectations of employee privacy in the digital age. Today employees are sending an increasing number of electronic mail communications to their attorneys via employer-provided computers or other digital devices with an expectation of privacy and confidentiality. Historically, courts summarily dispensed with these matters by finding that an employer policy establishing employer ownership of any communications made through employer-provided devices eliminated any employee expectation of privacy in the communications and waived any viable privacy challenges to employer review of those communications. Nevertheless, within the last couple of years, several cases involving …


Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik Jul 2015

Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik

Mark E. Wojcik

A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …


Computer Software As Articles Of Commerce In International Trade: The Surprising Study Of Singapore's Software Subsidies, 4 Software L.J. 399 (1991), Lawrence M. Friedman, Mark E. Wojcik Jul 2015

Computer Software As Articles Of Commerce In International Trade: The Surprising Study Of Singapore's Software Subsidies, 4 Software L.J. 399 (1991), Lawrence M. Friedman, Mark E. Wojcik

Mark E. Wojcik

No abstract provided.


The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin Jun 2015

The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin

Ann M. Lousin

No abstract provided.


Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin Jun 2015

Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin

Ann M. Lousin

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Jun 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Steven D. Schwinn

No abstract provided.


Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur Jun 2015

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

Samuel R. Olken

No abstract provided.


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim May 2015

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

Daryl Lim

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …