Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

The Hydraulics Of Intermediary Liability Regulation, Ben Horton Mar 2022

The Hydraulics Of Intermediary Liability Regulation, Ben Horton

Cleveland State Law Review

The intermediary immunity created by Section 230 probably protects claims based on the non-legal harms of hate speech and misinformation as well as a European-style proportionality system of content moderation better than a more “legalized” intermediary liability regime would. Contrasting the existing non-copyright content moderation systems with empirical research on the effects of the Digital Millennium Copyright Act (DMCA) shows that a comprehensive regulation of content moderation would incentivize the moderation of defamation and negligence claims at the expense of these important non-legal claims and incentivize a homogenous, categorical approach to content moderation. Furthermore, empirical research on the effects of …


Intimate Images And Authors’ Rights: Non- Consensual Disclosure And The Copyright Disconnect, Meghan Sali Jan 2022

Intimate Images And Authors’ Rights: Non- Consensual Disclosure And The Copyright Disconnect, Meghan Sali

Canadian Journal of Law and Technology

This article responds to a brand of legal realpolitik that says using property law to respond to the non-consensual distribution of intimate images (NCDII) is appropriate and even necessary, because its remedial frameworks are well developed and provide the relief that is often most sought after by targets of an assault: the immediate removal of photos from online platforms. While some targets are not considered the ‘‘authors’’ of their intimate images, most of the images that are the subject of NCDII are selfies, taken by the target themselves. In these cases, that person rightfully owns the copyright in those images …


Introduction: Intelligent Entertainment: Shaping Policies On The Algorithmic Generation And Regulation Of Creative Works, Hannibal Travis Jan 2020

Introduction: Intelligent Entertainment: Shaping Policies On The Algorithmic Generation And Regulation Of Creative Works, Hannibal Travis

FIU Law Review

No abstract provided.


Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick Nov 2019

Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick

Washington and Lee Law Review

Imagine you have decided to run for office, to speak out publicly against an injustice, to enter the job market, or even to join a new online forum. Now, imagine after starting your chosen endeavor, you go online to discover that someone who disagrees with your position posted your personal information on the internet and called for others to harass you. To make matters worse, you realize that you cannot determine who posted your personal data. You have been doxed. Because you cannot identify the person who posted your information, where can you turn for recourse? The next logical party …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan May 2017

Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan

LLM Theses

With Internet usage on the rise, it is important for India to establish an effective regulatory regime to combat piracy and mass copyright infringement online. This thesis argues that, in the face of unique legal and cultural challenges specific to India, present laws in the country have failed to do so. Unless and until these challenges are met it will be difficult to have an effective mechanism that deals with online copyright infringement. Countries like the United States, Canada, Ireland, and France have all adopted different regulatory models. However, this thesis argues that each not only have significant limitations on …


Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman May 2015

Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman

Pace Law Review

The focus of this article will be on what I call DMCA 2.0. It will begin by discussing the Digital Millennium Copyright Act (DMCA) and why that statute, passed in 1998 to shore up the enforceability of copyright online by protecting content providers’ ability to engage in forms of technological self-help against online copyright infringers, has been problematic. Part II describes largely unsuccessful efforts in the form of statutes and trade agreements to shore up the DMCA. Part III turns to the latest salvo, the adoption of “voluntary agreements” whereby content owners and ISPs, in particular social media platforms, join …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney Jan 2014

Code Is Law, But Law Is Increasingly Determining The Ethics Of Code: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

“Code is Law”, the aphorism Larry Lessig popularized, spoke to the importance of computer code as a central regulating force in the Internet age. That remains true, but today, overreaching laws are also increasingly subjugating important social and ethics questions raised by code to the domain of law. Those laws — like the CFAA and DMCA — need to be curtailed or their zealous enforcement reigned; they deter not only legitimate research but also important related social and ethics questions. But researchers must act too: to re-assert control over the social, legal, and ethical direction of their fields. Otherwise, law …


Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra Jan 2014

Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra

Scholarly Works

More than fifteen years have passed since the two major U.S. statutes concerning the secondary liability of Internet service providers were adopted--the Communications Decency Act and the Digital Millennium Copyright Act. The statutes have been criticized; however, very little of the criticism has come from Internet service providers, who have enjoyed the benefits of generous safe harbors and immunity from suit guaranteed by these statutes. This Article raises the question of whether these statutes contribute to incumbent entrenchment--solidifying the position of the existing Internet service providers to the detriment of potential new entrants. The current laws and industry self-regulation may …


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


Vol. Vii, Tab 38 - Ex. 53 - Calhoun Deposition (Rosetta Enforcement Manager), Jason Calhoun Mar 2010

Vol. Vii, Tab 38 - Ex. 53 - Calhoun Deposition (Rosetta Enforcement Manager), Jason Calhoun

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Darknet: A Digital Copyright Revolution, Jessica A. Wood Jan 2010

The Darknet: A Digital Copyright Revolution, Jessica A. Wood

Richmond Journal of Law & Technology

We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …


Rethinking Anticircumvention's Interoperability Policy, Aaron K. Perzanowski Jan 2009

Rethinking Anticircumvention's Interoperability Policy, Aaron K. Perzanowski

Aaron K. Perzanowski

Interoperability is widely touted for its ability to spur incremental innovation, increase competition and consumer choice, and decrease barriers to accessibility. In light of these attributes, intellectual property law generally permits follow-on innovators to create products that interoperate with existing systems, even without permission. The anticircumvention provisions of the Digital Millennium Copyright Act (DMCA) represent a troubling departure from this policy, resulting in patent-like rights to exclude technologies that interoperate with protected platforms. Although the DMCA contains internal safeguards to preserve interoperability, judicial misinterpretation and a narrow textual focus on software-to-software interoperability render those safeguards largely ineffective. Subjecting restrictions on …


Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker Dec 2007

Sold Downstream: Free Speech, Fair Use, And Anti-Circumvention Law, R. Terry Parker

The University of New Hampshire Law Review

[Excerpt] “Here’s a hypo. Living in Asia, I purchased a shameful amount of music and movies, all legit purchases through reputable stores, HMV and Tower Records, but little of which will get reissued. I wanted to preserve my collection but software in the discs prevented me from ripping backup copies to my computer. Lacking the technological savvy to get around this software myself, I purchased and used a product to help me circumvent these controls. Discuss.

Courts agree that copying the music and movies here is infringement but that fair use may provide a defense. However, courts do not agree …


Evolving Standards & The Future Of The Dmca Anticircumvention Rulemaking, Aaron K. Perzanowski Dec 2006

Evolving Standards & The Future Of The Dmca Anticircumvention Rulemaking, Aaron K. Perzanowski

Aaron K. Perzanowski

Every three years, the Copyright Office conducts a rulemaking to determine temporary exemptions from the Digital Millennium Copyright Act's (DMCA) anticircumvention provision. These exemptions are designed to prevent likely adverse impacts on noninfringing uses created by the prohibition on removing or bypassing technological protection measures that restrict access to copyrighted works. At the conclusion of the third and most recent rulemaking, the Librarian of Congress, acting on the advice of the Register of Copyrights, announced six classes of works exempt from the DMCA's anticircumvention provision for the three-year period ending October 27, 2009. This Article describes those exemptions and argues …


The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster Feb 2006

The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster

ExpressO

As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …


Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy Nov 2005

Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy

ExpressO

17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.

Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …


Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz Nov 2004

Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz

ExpressO

No abstract provided.


The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig Feb 2004

The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig

ExpressO

After years of legal maneuvering and courtroom skirmishes, the lines in the war between copyright holders and online copyright infringers have been clearly drawn. This conflict, which is poised to erupt in courts across the country, began decades ago with the birth of the Internet, which gave rise to a previously unparalleled opportunity for the dissemination, sharing, and enjoyment of every conceivable form of human expression. In addition to the benefits it has provided, the Internet also has given rise to copyright infringement on a global scale through the unauthorized posting and sharing of digital files. After years of unsuccessfully …


The Freedom To Link?: The Digital Millennium Copyright Act Implicates The First Amendment In Universal City Studios, Inc. V. Reimerdes, David A. Petteys Jan 2001

The Freedom To Link?: The Digital Millennium Copyright Act Implicates The First Amendment In Universal City Studios, Inc. V. Reimerdes, David A. Petteys

Seattle University Law Review

This Note focuses on the application of the Digital Millenium Copyright Act (DMCA) to prohibit the posting and linking of "circumvention technology" on the Internet, while also addressing the larger issue of the unintended consequences that regulating cyberspace can have on free expression. Because hypertext links play such a fundamental role in the utility of the Internet, this Note argues that the application of the DMCA's anti-trafficking provisions to enjoin linking places a significant and unwarranted burden on the Internet as a forum for free expression. Section II is intended to provide a brief background of the technological and legal …


Database Protection In A Digital World, Mary Maureen Brown, Robert M. Bryan, John M. Conley Jan 1999

Database Protection In A Digital World, Mary Maureen Brown, Robert M. Bryan, John M. Conley

Richmond Journal of Law & Technology

Digital Property and the Digital Marketplace Expenditures in the information technology arena indicate that digital property - defined as digitized information and the tools to use it - is generating astonishing wealth. Globally, expenditures in the information and communication technology markets exceed $1.8 trillion annually and comprise six percent (6%) of aggregate global Gross Domestic Product ("GDP"). By 1997, such expenditures had escalated forty percent (40%) over 1992 levels. Current spending on information and communication technologies is growing twenty-seven percent (27%) faster than the overall worldwide GDP, averaging roughly 5.5 percent annually. Technological innovations have become the primary engine of …