Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Law

Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh Jan 2015

The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh

Kavid Singh

Bitcoin is the most popular online decentralized currency in the world. Created by an enigmatic figure, Satoshi Nakamoto, in 2009, its propagation and use has caused heated controversy. On the legal side of its use, businesses both large and small have started to accept bitcoins as a form of payment. On the illegal side of its use, large quantities of bitcoins worth hundreds of millions of dollars have been stolen from businesses and large Bitcoin currency exchanges. The aim of this article is to introduce workable federal regulation that will help deter money laundering, a pervasive problem in the world …


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Reforming Copyright Interpretation, Zahr K. Said Aug 2014

Reforming Copyright Interpretation, Zahr K. Said

Zahr K Said

This Article argues that copyright law needs to acknowledge and reform its interpretive choice regime. Even though judges face potentially outcome-determinative choices among competing sources of interpretive authority when they adjudicate copyrightable works, their selection of interpretive methods has been almost entirely overlooked by scholars and judges alike. This selection among competing interpretive methods demands that judges choose where to locate their own authority: in the work itself; in the context around the work, including its reception, or in the author’s intentions; in expert opinions; or in judicial intuition. Copyright’s interpretive choice regime controls questions of major importance for the …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Copyright And Inequality, Lea Shaver Feb 2014

Copyright And Inequality, Lea Shaver

Lea Shaver

The prevailing theory of copyright law imagines a marketplace efficiently serving up new works to an undifferentiated world of consumers. Yet the reality is that all consumers are not equal. The majority of the world’s people experience copyright law not as a boon to consumer choice, but as a barrier to acquiring knowledge and taking part in cultural life. The resulting patterns of privilege and disadvantage, moreover, reinforce and perpetuate preexisting social divides. Class and culture combine to explain who wins, and who loses, from copyright protection. Along the dimension of class, the insight is that just because new works …


An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock Jan 2014

An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock

Ferris K Nesheiwat

This article seeks to provide a socio-legal framework for the examination of the attitude of a section of the Jordanian public towards intellectual property rights (IPRs), using copyright protected software as an example; it provides an overview of perceptions of IPRs within an Arabic and predominantly Muslim society, and examines how such perceptions impact attitudes towards abiding with, and enforcement of, IPRs. Through its analytical value and empirical research, this paper fills a void in the availability of reliable empirical data in Jordan as part of the analysis to gauge the impact of intellectual property (IP) laws. A review of …


Innovation & Intellectual Property: Collaborative Dynamics In Africa Jan 2014

Innovation & Intellectual Property: Collaborative Dynamics In Africa

Chidi Oguamanam

No abstract provided.


Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall Oct 2013

Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall

Benton C. Martin

This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio Mar 2013

Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

For most of human history the essential nature of creativity was understood to be cumulative and collective. This notion has been largely forgotten by modern policies regulating creativity and speech. As hard as it may be to believe, the most valuable components of our immortal culture were created under a fully open regime with regard to access to pre-existing expressions and reuse. From the Platonic mimēsis to the Roman imitatio, from Macrobius’ Saturnalia to the imitatio Vergili, from medieval auctoritas and Chaucer the compilator to Anon the singer and social textuality, from Chrétien’s art of rewriting to Shakespeare’s “borrowed feathers,” …


Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio Mar 2013

Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

In the last two decades, the industry has endlessly deployed the rhetoric of the “digital threat” in order to demand harsher measures against digital piracy, peer-to-peer file sharing and the like. In fact, the uneasiness in sharing the view that harsher measures are an adequate response to copyright infringement in the digital environment comes from the uncertain grounds on which the heavy-handed reaction against digital piracy has been based. Two related arguments might run against this heavy-handed approach. First, market conditions might incentivize piracy. Additionally, there are raising doubts over the argument that piracy is a threat to creativity, especially …


Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou Feb 2013

Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou

Hong Lou

In China, the amount of copyright infringement disputes cases related to ISPs is rapid increasing, and current legislation seems to be insufficient to regulate these problems. Moreover, there is a chaos in different courts around China using different approaches and standards on search engines' secondary liability.Therefore, how to improved Chinese copyright legislation and unite relevant judgments with reasonable approaches has become an urgent task. The purpose of this essay is to compare legislation and legal practice in China and the US, to point out the tendency of ISPs' secondary copyright liability in these two countries, and to make useful suggestions …


Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor Feb 2013

Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor

Jonathan I. Ezor

No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.


Criminal Copyright Enforcement Against Filesharing Services, Benton C. Martin, Jeremiah R. Newhall Jan 2013

Criminal Copyright Enforcement Against Filesharing Services, Benton C. Martin, Jeremiah R. Newhall

Benton C. Martin

The high-profile prosecution of the popular online storage website Megaupload for criminal copyright infringement is the latest in a series of recent criminal prosecutions of online filesharing services. But what pushes a legitimate online file-storing business over the edge to criminal enterprise? How might criminal copyright enforcement differ materially from civil enforcement?

This article answers these questions and suggests guidelines for prosecutorial discretion. After a condensed history of criminal copyright law, we explain why "secondary" theories of infringement apply in the criminal, as well as civil, context and why the DMCA "safe harbor" defense is a red herring in criminal …


Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower Jan 2013

Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower

Richard Cameron Gower

Despite some difficulties, state tort law can be argued to create a unique exception to patent law. Specifically, the prevented rescue doctrine suggests that charities and others can circumvent patents on certain critical medications when such actions are necessary to save individuals from death or serious harm. Although this Article finds that the prevented rescue tort doctrines is preempted by federal patent law, all hope is not lost. A federal substantive due process claim may be brought that uses the common law to demonstrate a fundamental right that has long been protected by our Nation’s legal traditions. Moreover, this Article …


Formalism And Pragmatism In The Analysis Of Damages For Indirect Patent Infringement, Dmitry Karshtedt Jan 2013

Formalism And Pragmatism In The Analysis Of Damages For Indirect Patent Infringement, Dmitry Karshtedt

Dmitry Karshtedt

No abstract provided.


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


"Resq"Ing Patent Infringement Damages After Resqnet: The Dangers Of Litigation Licenses As Evidence Of A Reasonable Royalty, Layne S. Keele Jan 2012

"Resq"Ing Patent Infringement Damages After Resqnet: The Dangers Of Litigation Licenses As Evidence Of A Reasonable Royalty, Layne S. Keele

Layne S. Keele

Almost everyone agrees that, when a patent owner seeks a reasonable royalty as patent infringement damages, prior patent licenses are useful in determining the reasonable royalty. But the use of licenses arising out of the settlement of litigation— “litigation licenses”—has met with mixed acceptance, with some courts admitting litigation licenses into evidence and other courts excluding the licenses under Rules 402, 403, or 408. Recently, some district courts have concluded that the Federal Circuit’s 2010 decision, ResQNet.com, Inc. v. Lansa, Inc. resolves this question in favor of the use of these litigation licenses. This article shows, first, that this conclusion …


Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor Jan 2012

Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor

Jonathan I. Ezor

In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …


Google Books Rejected: Taking The Orphans To The Digital Library Of Alexandria, Giancarlo Francesco Frosio Jan 2011

Google Books Rejected: Taking The Orphans To The Digital Library Of Alexandria, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

The idea of the Library of Alexandria has powerfully expanded over the centuries, embodying the dream of universal wisdom and knowledge centralized in one single place. Digitization projects, such as the Google books project, are reviving the hope that this dream may come true. Moreover, the ubiquity of the networked environment promises to open access to this aiber-library to everybody with an Internet connection. Today the entire collection of human knowledge may be only one click away. Whether the dream of the Library ofAlexandria will be achieved by the Google books project is highly debated. Recently, a court decision concluded …


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


Patent Pleading After Iqbal: Using Infringement Contentions As A Guide, Richard Alan Kamprath Jan 2010

Patent Pleading After Iqbal: Using Infringement Contentions As A Guide, Richard Alan Kamprath

Richard Kamprath

“Patent Pleading After Iqbal: Using Infringement Contentions As A Guide” This article proposes how the new standard for pleading patent infringement related claims should be interpreted in light of the Supreme Court’s decisions in Twombly and Iqbal. The facial plausibility of a pleading requires more than bare allegations and must be supported with enough facts in order for the court to infer wrongdoing by the accused infringer. This article is dedicated to applying this theory of pleading to the practical world of the courtroom. Federal Rule 8 is discussed as the starting point to understanding pleading in the federal courts. …


The Tragedy Of (Ignoring) The Information Semicommons: A Cultural Environmental Perspective, Robert Lee Cunningham Jan 2010

The Tragedy Of (Ignoring) The Information Semicommons: A Cultural Environmental Perspective, Robert Lee Cunningham

Robert Cunningham

The second enclosure movement critique is familiar theoretical territory for scholars concerned with the creeping maximalist impulse of Intellectual Property Rights (IPRs). Just as the first enclosure movement relating to real property created controversies concerning social contract and the advertised efficiencies of private real property, so too these concerns are echoed within the context of IPRs. This paper employs the emergent discourse of cultural environmentalism so as to diagnose and resolve IPR issues evident within the information environment. Cultural environmentalism borrows, begs and steals analytical frameworks from environmentalism, such as those relating to the commons, public choice theory, welfare economics …