Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (24)
- Schulich School of Law, Dalhousie University (18)
- Duke Law (4)
- University of Richmond (4)
- Santa Clara Law (3)
-
- Selected Works (3)
- University of Washington School of Law (3)
- Northwestern Pritzker School of Law (2)
- University of Michigan Law School (2)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Maurer School of Law: Indiana University (1)
- Penn State Law (1)
- SelectedWorks (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- University of Miami Law School (1)
- University of Missouri-Kansas City School of Law (1)
- University of San Diego (1)
- Washington and Lee University School of Law (1)
- Wayne State University (1)
- Keyword
-
- Copyright (4)
- CyberCrime (4)
- ICANN (4)
- Internet (4)
- Technology (4)
-
- Adwords (3)
- Defamation (3)
- Google (3)
- Intellectual property (3)
- PIPEDA (3)
- Privacy (3)
- Computers (2)
- Criminal liability (2)
- E-government (2)
- Electronic services (2)
- First Amendment (2)
- Information privacy (2)
- Patent (2)
- Singapore (2)
- Software (2)
- UCITA (2)
- ALA v. United States (1)
- Administrative procedure (1)
- Administração Pública (1)
- Adsense (1)
- Agreement on Trade Related Aspects of Intellectual Property (1)
- American Library Association v. United States (1)
- Arbitration (1)
- Article 2 (1)
- Article 69 (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Canadian Journal of Law and Technology (18)
- UIC Law Review (5)
- Articles (4)
- Duke Law & Technology Review (4)
-
- Richmond Journal of Law & Technology (3)
- Rosetta Stone v. Google (Joint Appendix) (3)
- Faculty Scholarship (2)
- Northwestern Journal of International Law & Business (2)
- Articles by Maurer Faculty (1)
- Continuing Legal Education Materials (1)
- Edward Ivan Cueva (1)
- Faculty Works (1)
- Ivo Teixeira Gico Jr. (1)
- Joseph P. Liu (1)
- Journal Articles (1)
- Laura Quilter (1)
- Law Faculty Research Publications (1)
- Michigan Telecommunications & Technology Law Review (1)
- San Diego Law Review (1)
- Stephen E Henderson (1)
- University of Richmond Law Review (1)
- Washington Law Review (1)
- Washington and Lee Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 75
Full-Text Articles in Law
Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen
Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen
Faculty Scholarship
Computer networks create tremendously increased capabilities but also represent equally increased vulnerabilities. These vulnerabilites are especially acute in relation to potential attacks on critical national infrasturucture. This Article proposes that international law must evolve to recognize that attacks against a nation's critical national infrastructure from any source constitute a use of force. Such attacks, therefore, give the victim state the right to proportional self-defense - including anticipatory self-defense - even if the computer network attack is not an armed attack under Article 51 of the United Nations Charter. Due to the instantaneous nature of computer network attacks, the right to …
Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean
Vol. Ix, Tab 46 - Ex. 7 - Email From Jeff Dean To Google, Jeff Dean
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
4th Annual Computer & Technology Law Institute, Office Of Continuing Legal Education At The University Of Kentucky College Of Law
Continuing Legal Education Materials
Materials from the 4th Annual Computer & Technology Law Institute held by UK/CLE in November 2002.
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
University of Richmond Law Review
No abstract provided.
Copyright And Time: A Proposal, Joseph Liu
Copyright And Time: A Proposal, Joseph Liu
Joseph P. Liu
This Article argues that courts should adjust the scope of copyright protection by considering time as a factor in fair use analysis. More specifically, the longer it has been since a copyrighted work was published, the greater the scope of fair use should be. Up to now, most of the debate over the role of time in copyright law has focused on the controversial issue of copyright duration and term extension. By focusing so narrowly on the end of the copyright term, however, this debate has neglected the more significant issue of how time should affect the scope of copyright …
Vigilantes V. Pirates: The Rumble Over Peer-To-Peer Technology Hits The House Floor, Christopher Fazekas
Vigilantes V. Pirates: The Rumble Over Peer-To-Peer Technology Hits The House Floor, Christopher Fazekas
Duke Law & Technology Review
Content providers are using the digital rights management technology contained in this product to protect the integrity of their content ("Secure Content") so that their intellectual property, including copyright, in such content is not misappropriated... if you elect to download a license from the Internet which enables your use of Secure Content, Microsoft may, in conjunction with such license, also download onto your computer such security updates that a secure content owner has requested that Microsoft distribute.
Protecting The Homeland By Exemption: Why The Critical Infrastructure Information Act Of 2002 Will Degrade The Freedom Of Information Act, Brett Stohs
Duke Law & Technology Review
To protect against "cyberterror," the House version of the Homeland Security Act exempts information related to the nation's critical infrastructure from the Freedom of Information Act disclosure requirements. The proposed exemption unnecessarily threatens public access to vital information about health and safety information; information the Freedom of Information Act was designed to guarantee.
Script Kiddies Beware: The Long Arm Of U.S. Jurisdiction To Prescribe, John Eisinger
Script Kiddies Beware: The Long Arm Of U.S. Jurisdiction To Prescribe, John Eisinger
Washington and Lee Law Review
No abstract provided.
Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele
Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele
Canadian Journal of Law and Technology
This paper provides an overview of trade-related aspects of electronic commerce, and examines three approaches for regulating international trade in cyber- space. A model which integrates these approaches is then proposed, emphasizing private standards of self-regula- tion within a broader public framework of minimal background standards. A summary of potential areas of conflict between competing regulatory approaches fol- lows, and the paper concludes that both the WTO and the OECD have important roles to play in the develop- ment of international consensus towards a harmonized framework for the regulation of global TRECs.
Open Source, Open Arms: An Open-Ended Question, Alana Maurushat
Open Source, Open Arms: An Open-Ended Question, Alana Maurushat
Canadian Journal of Law and Technology
This paper is structured to address several aspects and challenges to the open source movement. Beginning with an outline of the historical and cultural components of the open source movement, the paper will move on to explore the economic and philosophical underpinnings of intellectual property. It will be demonstrated that open source finds itself uniquely situated within these theories and doctrines. The questions that open source poses for intellectual property will then be examined. My arguments will stem from the general premise that open source is threatened by three mechanisms: the uncertainty of the validity of open source licenses, potentially …
Solving Legal Issues In Electronic Government: Jurisdiction, Regulation, Governance, John D. Gregory
Solving Legal Issues In Electronic Government: Jurisdiction, Regulation, Governance, John D. Gregory
Canadian Journal of Law and Technology
This paper looks at who can be governed, what can be governed, and how it can be governed in an electronic world. Whether law aims to be enabling (i.e., confirming the ground rules and the legal effectiveness of general conduct) or normative (i.e., imposing standards of conduct on more or less willing subjects), the new media presents difficulties for its rational evolution.
These are distinct questions from those raised by government online. Electronic service delivery issues tend to focus on how government can carry on its traditional programs using electronic means and how the law can support it in doing …
The New Singapore Domain Name Dispute Resolution Policy: The Context Of The Common Law And Icann's Udrp, Richard Wu
The New Singapore Domain Name Dispute Resolution Policy: The Context Of The Common Law And Icann's Udrp, Richard Wu
Canadian Journal of Law and Technology
In this article, I will analyse the salient features of the Policy and evaluate the extent to which they match international practice. I will focus, in particular, upon the Uniform Domain Name Dispute Resolution Policy (UDRP) and the rules made under the UDRP. The Internet Corporation for Assigned Names and Numbers (ICANN), the international body responsible for domain name management, adopted both in 1999. As the nature of domain name disputes and dispute resolution rules are very similar in different countries, domain name disputes are becoming a global phenomenon, leading to the development of a kind of ‘‘Internet common law’’. …
The Patriation Of .Ca, Gregory R. Hagen, Kim G. Von Arx
The Patriation Of .Ca, Gregory R. Hagen, Kim G. Von Arx
Canadian Journal of Law and Technology
Country code top level domains (‘‘ccTLD’’s), such as .ca, are distinct from generic top-level domains (‘‘gTLD’’s), such as .com, in that they are generally conceived to be associated with a specific country. In Canada, the authority to operate the technical functions of the .ca domain name registry has been delegated to the Canadian Internet Registration Authority (‘‘CIRA’’) by a United States non-profit corporation, the Internet Corporation for Assigned Names and Numbers (‘‘ICANN’’). The authority to make policy regarding the .ca has purportedly been delegated to CIRA by the Government of Canada. There is an issue, however, as to whether ICANN’s …
The Personal Information Protection And Electronic Documents Act: A Comprehensive Guide By William Charnetski, Patrick Flaherty And Jeremy Robinson (Toronto Canada Law Book Inc., 2001), Teresa Scassa
Canadian Journal of Law and Technology
The Personal Information Protection and Electronic Documents Act: A Comprehensive Guide (the Guide) is the second book to be published in English in Canada dealing expressly with the Personal Information Protec- tion and Electronic Documents Act (PIPEDA). The Guide is different from the earlier work, in that it is not a section by section discussion or annotation of the provisions of PIPEDA. Rather, it is organized into eight chapters, each addressing a distinct theme or topic. The Guide is also aimed at a more professional audience than the earlier work. In its introduction, and in its choice of content, it …
M-Commerce: The Notion Of Consumer Consent In Receiving Location-Based Advertising, Eloïse Gratton
M-Commerce: The Notion Of Consumer Consent In Receiving Location-Based Advertising, Eloïse Gratton
Canadian Journal of Law and Technology
The development of location-based advertising, for all its convenience and usefulness, introduces new and heightened privacy risks for consumers that must be addressed. The portability of wireless devices and the ubiquity of their applications, coupled with an ability to pinpoint the location of wireless users and reveal it to others, could produce a system where the everyday activities and movements of these users are tracked and recorded. Wireless users would receive unanticipated advertising messages on their wireless device, commonly referred to as ‘‘wireless spam’’, generally considered a form of privacy violation.
In order to obtain a valid consent from the …
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention And The Emergency Anti-Terrorism Legislation, Caspar Bowden
Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention And The Emergency Anti-Terrorism Legislation, Caspar Bowden
Duke Law & Technology Review
Caspar Bowden, Director of the Foundation for Information Policy Research (FIPR), explains the technical and legal context of unprecedented new surveillance capabilities, with particular reference to the UK's Regulation of Investigatory Powers (RIP) Act 2000. He discusses why these powers are unlikely to be effective in detecting or disrupting the communications of terrorist cells or organized crime, but present significant new threats to the security, privacy, and freedom of expression of the law-abiding.
Forum-Selection Clauses In Consumer Clickwrap And Browsewrap Agreements And The "Reasonably Communicated" Test, Kaustuv M. Das
Forum-Selection Clauses In Consumer Clickwrap And Browsewrap Agreements And The "Reasonably Communicated" Test, Kaustuv M. Das
Washington Law Review
Although forum-selection clauses in clickwrap and browsewrap agreements have been addressed in only a limited number of decisions, they are likely to become increasingly relevant with the growth of e-commerce. Courts that have enforced forum-selection clauses in click-wrap and browsewrap agreements have often done so without determining whether the consumer received notice of the clause. When courts have addressed notice, they have not used any uniform standard for determining adequacy of notice. Forum-selection clauses in dlickwrap and browsewrap agreements further the policies underlying the Supreme Court's decisions in MIS Bremen v. Zapata Off-Shore Co. and Carnival Cruise Lines, Inc. v. …
Book Review: Privacy Law In Canada By Colin H.H. Mcnairn And Alexander K. Scott, Anne Mussett
Book Review: Privacy Law In Canada By Colin H.H. Mcnairn And Alexander K. Scott, Anne Mussett
Canadian Journal of Law and Technology
Privacy Law in Canada is a 360-page work that broadly covers legislation at both the federal and provin- cial level, and criminal and civil liability for privacy intru- sions in the context of case law from across Canada. Particular focus is given to privacy issues associated with the workplace, personal health information, technolog- ical surveillance, and protecting consumers and debtors. The authors take a practical approach in examining chal- lenging questions, such as whether a consumer’s consent is required to obtain a credit report; disclosure of med- ical information; monitoring an employee’s computer use and voice mail; how the PIPEDA …
Don't Shoot The Messenger! A Discussion Of Isp Liability, Andrew Bernstein, Rima Ramchandani
Don't Shoot The Messenger! A Discussion Of Isp Liability, Andrew Bernstein, Rima Ramchandani
Canadian Journal of Law and Technology
In today’s world of rampant networked communica- tion, the Internet Service Provider (‘‘ISP’’) finds itself in a uniquely vulnerable position. As the conduit through which content is disseminated to a numerically and geo- graphically vast audience, the obvious legal risk to ISPs is that those who provide content will do so in a way that attracts legal liability. Like many communications prov- iders (such as publishers or broadcasters), the ISP may have to assume some responsibility for simply providing the means of transmitting content. In some cases, the ISP is more actively involved in the transmission or is know- ingly …
Le Droit De Faire Jouer La Radio En Public, Ou La Petite Histoire D'Une Drôle D'Exemption, René Pépin
Le Droit De Faire Jouer La Radio En Public, Ou La Petite Histoire D'Une Drôle D'Exemption, René Pépin
Canadian Journal of Law and Technology
L’article 69 de la loi canadienne sur le droit d’auteur prévoit qu’aucun montant n’est exigible d’une personne qui utilise en public un appareil radio, pourvu que ce soit fait dans un endroit, tel un commerce ou un restaurant, où le public est invité à se rendre sans qu’il lui soit chargé un prix d’entrée. Plusieurs pays ont une disposition semblable dans leur législation en matière de droit d’auteur. Cela évite que les détenteurs de droits d’auteur sur des pièces musicales, ou les compagnies de disques, prétendent que le propriétaire de l’appareil radio se trouve à «représenter publiquement» ou à «exécuter …
Litoral: A New Form Of Defamation Consciousness, Kim Von Arx
Litoral: A New Form Of Defamation Consciousness, Kim Von Arx
Canadian Journal of Law and Technology
With the Internet, quickly becoming ubiquitous, the question arises: how does the Internet, and more specifi- cally computer-mediated-communication (CMC), affect people’s lives?
This paper will explore CMC in the Western world as an instance of Walter J. Ong’s notion of secondary orality. It will seek to determine whether the proposed shift in communicative and social consciousness elimi- nates the need for the common law distinction between libel and slander in the online communication environ- ment. The paper is divided into three parts. In the first section, the elements of primary orality and the shift of consciousness from a primary oral …
Solving Legal Issues In Electronic Government: Authority And Authentication, John D. Gregory
Solving Legal Issues In Electronic Government: Authority And Authentication, John D. Gregory
Canadian Journal of Law and Technology
This article is an overview of some of the legal themes and issues faced by governments in the electronic age, with particular regard to their own operations: electronic service delivery and the administration of government itself.
Electronic government is the performance of any function of government using electronic records and electronic communications. It may involve, in the language of the Uniform Electronic Commerce Act, ‘‘us[ing] electronic means to create, collect, receive, store, transfer, distribute, publish or otherwise deal with documents or information.’’ The term thus covers the provision of governmental services to the public, including commu- nication from the public …
Collective Management Of Copyright And Neighbouring Rights In Canada: An International Perspective, Daniel J. Gervais
Collective Management Of Copyright And Neighbouring Rights In Canada: An International Perspective, Daniel J. Gervais
Canadian Journal of Law and Technology
In this paper, we will compare the current Canadian framework and activities of Collective Management Organizations with the situation in a number of other major countries and suggest possible improvements to the current regime. The comparison will focus first on the general legal background for collective management and, second, on issues specific to the digital age. The paper only addresses some of the specific issues raised by the 1996 WCT and WPPT.
Vol. Ix, Tab 41 - Ex. 5 - Google Advertising Policy Review, Google
Vol. Ix, Tab 41 - Ex. 5 - Google Advertising Policy Review, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Cracking The Code To Privacy: How Far Can The Fbi Go?, Angela Murphy
Cracking The Code To Privacy: How Far Can The Fbi Go?, Angela Murphy
Duke Law & Technology Review
As the Nation continues to deal with the fallout of the events of September 11th, it must continue to decide what limits on privacy will be sacrificed in order to allow the government to tighten its security efforts. Who would have guessed that in this crazy post-September 11th world, the latest champion of Constitutional freedoms would be a reputed mobster?
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
The Continuing Expansion Of Cyberspace Trespass To Chattels, Laura Quilter
The Continuing Expansion Of Cyberspace Trespass To Chattels, Laura Quilter
Laura Quilter
No abstract provided.
Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan
Constitutional Issues In Information Privacy, Fred H. Cate, Robert E. Litan
Articles by Maurer Faculty
The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector, despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11 terrorist attacks on the World Trade Center and the Pentagon. Efforts to identify and bring to justice the perpetrators and to protect against future terrorist attacks, while threatening to weaken constitutional protections against government intrusions into personal …
Vol. Ix, Tab 46 - Ex. 43 - Document Adwords Select™ - It's All About Results™, Google
Vol. Ix, Tab 46 - Ex. 43 - Document Adwords Select™ - It's All About Results™, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?