Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 72

Full-Text Articles in Law

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler Jul 2015

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler

William K. Ford

Are games more like coffee mugs, posters, and T-shirts, or are they more like books, magazines, and films? For purposes of the right of publicity, the answer matters. The critical question is whether games should be treated as merchandise or as expression. Three classic judicial decisions, decided in 1967, 1970, and 1973, held that the defendants needed permission to use the plaintiffs' names in their board games. These decisions judicially confirmed that games are merchandise, not something equivalent to more traditional media of expression. As merchandise, games are not like books; instead, they are akin to celebrity-embossed coffee mugs. To …


The Answer To Trial Publicity Is A Better Question, Kevin F. Qualls Jul 2015

The Answer To Trial Publicity Is A Better Question, Kevin F. Qualls

Kevin F Qualls

Free-Press/Fair-Trial contests now happen in a new media age. Judicial remedies such as change-of-venue, sequestration, jury admonitions, and gag orders were fashioned in an era that included broadcast radio and television, an emerging cable television industry, and the traditional print media of newspapers and magazines. That content was, to some degree, geographically bound and temporary. Now those judicial remedies are applied in a new media age that extends the reach of traditional media in time and space while offering interactive capability. The efficacy of these remedies is in question. This paper provides an historical overview of how judicial remedies for …


P2p And The Future Of Private Copying, Peter K. Yu Jul 2015

P2p And The Future Of Private Copying, Peter K. Yu

Peter K. Yu

Since the beginning of the P2P file-sharing controversy, commentators have discussed the radical expansion of copyright law, the industry's controversial enforcement tactics, the need for new legislative and business models, the changing social norms, and the evolving interplay of politics and market conditions. Although these discussions have delved into the many aspects of the controversy, none of them presents a big picture of the issues or explains how they fit within the larger file-sharing debate. Using a holistic approach, this Article brings together existing scholarship while offering some thoughts on the future of private copying. The Article does not seek …


The Origins Of Cctld Policymaking, Peter K. Yu Jul 2015

The Origins Of Cctld Policymaking, Peter K. Yu

Peter K. Yu

Extract: A long time ago in a galaxy not so far away, there was a decentralized global network of computers. These computers shared information with each other regardless of how far apart they were and whether there was any direct line of communication between them. In the very beginning, this network was used exclusively by government and military agencies, educational and research institutions, government contractors, scientists, and technology specialists. Instead of the domain names we use today, such as “www. amazon.com,” users typed in numeric addresses, such as “123.45.67.89,” and, later, host names to send information to other computers. This …


Anticircumvention And Anti-Anticircumvention, Peter K. Yu Jul 2015

Anticircumvention And Anti-Anticircumvention, Peter K. Yu

Peter K. Yu

In today's debate on digital rights management systems, there is a considerable divide between the rights holders, their investors and representatives on the one hand and academics, consumer advocates, and civil libertarians on the other. These two groups often talk past each other, concocting their own doomsday scenarios while arguing for laws and policies that vindicate their positions. Unfortunately, neither side has sufficient empirical evidence to either support its position or disprove its rivals'. As the digital economy grows, the debate intensifies, and the divide between the two sides widens. Today, there has emerged an urgent need to find the …


Bridging The Digital Divide: Equality In The Information Age, Peter K. Yu Jul 2015

Bridging The Digital Divide: Equality In The Information Age, Peter K. Yu

Peter K. Yu

The digital revolution has transformed the lives of many, but also has left untouched the lives of many others. As a result, a large segment of the world population misses out on the tremendous political, social, economic, educational, and career opportunities created by the digital revolution. This gap between the information haves and have-nots is commonly referred to as the digital divide.

Although evidence suggested that the digital divide in the United States is closing, the same is not true for the less developed countries. In light of the alarming disparities between the information haves and have-nots, the Howard M. …


Piracy, Prejudice, And Perspectives: An Attempt To Use Shakespeare To Reconfigure The U.S.-China Intellectual Property Debate, Peter K. Yu Jul 2015

Piracy, Prejudice, And Perspectives: An Attempt To Use Shakespeare To Reconfigure The U.S.-China Intellectual Property Debate, Peter K. Yu

Peter K. Yu

Since the mid-1980s, the U.S.-China intellectual property conflict has entered into the public debate. It was frequently debated in Congress and was widely covered by the mass media. Despite the importance of this issue, the debate thus far has been one-sided, focusing primarily on the unfair competition aspect. While there are undeniably some greedy Chinese who are eager to free ride on the creative efforts of Western authors and inventors, greed alone cannot explain the century-old U.S.-China intellectual property conflict. To understand the roots of this conflict, one must focus on the significant political, social, economic and cultural differences between …


E-Obviousness, Glynn S. Lunney Jr. Jul 2015

E-Obviousness, Glynn S. Lunney Jr.

Glynn Lunney

As patents expand into e-commerce and methods of doing business more generally, both the uncertainty and the risk of unjustified market power that the present approach generates suggest a need to rethink our approach to nonobviousness. If courts fail to enforce the nonobviousness requirement and allow an individual to obtain a patent for simply implementing existing methods of doing business through a computer, even where only trivial technical difficulties are presented, entire e-markets might be handed over to patent holders with no concomitant public benefit. If courts attempt to enforce the nonobviousness requirement, but leave undefined the extent of the …


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Jul 2015

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Wayne R. Barnes

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Jul 2015

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Wayne R. Barnes

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …


Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik Jul 2015

Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik

Mark E. Wojcik

A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …


The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin Jun 2015

The Article 2b Symposium: A Foreword, 16 J. Marshall J. Computer & Info. L. 205 (1998), Ann Lousin

Ann M. Lousin

No abstract provided.


Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin Jun 2015

Foreword: Uniform Computer Information Transaction Act, 18 J. Marshall J. Computer & Info. L. 275 (2000), Ann Lousin

Ann M. Lousin

No abstract provided.


Investigating Jurors On Social Media, Caren Myers Morrison Jun 2015

Investigating Jurors On Social Media, Caren Myers Morrison

Caren Myers Morrison

This essay proceeds in three parts. First, it examines the current state of jury investigations, and how they differ from those conducted in the past. Then, it describes the evolving legal and ethical positions that are combining to encourage such investigations. Finally, it offers a note of caution–condoning such investigations while keeping them hidden from jurors may be perceived as unfair and exploitative, risking a possible backlash from outraged jurors. Instead, I propose a modest measure to provide notice and explanation to jurors that their online information is likely to be searched, and why.


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Jun 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Steven D. Schwinn

No abstract provided.


Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur Jun 2015

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

Samuel R. Olken

No abstract provided.


Judges, Friends, And Facebook: The Ethics Of Prohibition, 24 Geo. J. Legal Ethics 281 (2011), Samuel Vincent Jones May 2015

Judges, Friends, And Facebook: The Ethics Of Prohibition, 24 Geo. J. Legal Ethics 281 (2011), Samuel Vincent Jones

Samuel V. Jones

No abstract provided.


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim May 2015

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

Daryl Lim

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague Apr 2015

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing …


International Criminal Law Documents Supplement, Jimmy Gurule, Jordan Paust, Bruce Zagaris, Leila Sadat, Michael Scharf, M. Bassiouni Apr 2015

International Criminal Law Documents Supplement, Jimmy Gurule, Jordan Paust, Bruce Zagaris, Leila Sadat, Michael Scharf, M. Bassiouni

Jimmy Gurule

This Documents Supplement accompanies the casebook International Criminal Law, Fourth Edition(2013). It is the most thorough compilation of documents available for classroom use with respect to international criminal law and related aspects of more general international law and human rights law. It is the first documents supplement to contain the Arab Charter on Human Rights and the Amendment to the Rome Statute of the ICC with respect to the Crime of Aggression.


Internet Casinos: A Sure Bet For Money Laundering, Jon Mills Apr 2015

Internet Casinos: A Sure Bet For Money Laundering, Jon Mills

Jon L. Mills

Since the end of World War II, American society has seen the emergence of technology promising to make life easier, better and longer lasting. The more recent explosion of the Internet is fulfilling the dreams of the high-tech pundits as it provides global real-time communication links and makes the world's knowledge universally available. Privacy concerns surrounding the develop-ment of the Internet have mounted, and in response, service providers and web site operators have enabled web users to conduct transactions in nearly complete anonymity. While anonymity respects individual privacy, anonymity also facilitates criminal activities needing secrecy. One such activity is money …


Private International Law And The Internet, Ulf Maunsbach Apr 2015

Private International Law And The Internet, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Beyond Net Neutrality: International Examples Enabling Innovation And Consumer Choice In The Mobile Internet Ecosystem, Daniel Lyons Apr 2015

Beyond Net Neutrality: International Examples Enabling Innovation And Consumer Choice In The Mobile Internet Ecosystem, Daniel Lyons

Daniel Lyons

The FCC’s new Open Internet rules seek to limit interference by broadband service providers in markets for Internet-based content and applications. But to do so, the rules may significantly reduce the amount of innovation possible in the broadband service market. An aggressive interpretation of the rules suggests that broadband providers are generally required to offer customers access to all lawful Internet traffic, or none at all. This paper explores the way in which this all-or-nothing homogenization of the American broadband product differs from innovative non-net-neutral practices that are taking root in other countries, particularly in mobile markets. Around the world, …


Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta Mar 2015

Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta

David S. Olson

This Article argues that the evolution of software — and the looming age of the “Internet of Things” — will allow manufacturers to make use of consumer monitoring technologies and restrictive software licenses to more perfectly price discriminate. First, the increasing communication between software and its producers gives more opportunities to monitor consumer behavior and characteristics. Second, attaching restrictive copyright licenses to software, and to goods containing software, enables producers to restrict use and resale of their products. By combining monitoring and restrictive licensing, producers will have increasingly better ability and opportunities to price discriminate among their consumers.

This Article …


Information Technology And The Law - Privacy, Ulf Maunsbach Mar 2015

Information Technology And The Law - Privacy, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter Mar 2015

Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter

Megan M Carpenter

This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Can Students Be Disciplined For Off-Campus Cyberspeech?: The Reach Of The First Amendment In The Age Of Technology, Allan G. Osborne Jr., Charles J. Russo Feb 2015

Can Students Be Disciplined For Off-Campus Cyberspeech?: The Reach Of The First Amendment In The Age Of Technology, Allan G. Osborne Jr., Charles J. Russo

Charles J. Russo

No abstract provided.


Big Data, Cyber Security, And Exchange Of Information Challenges, William Byrnes Feb 2015

Big Data, Cyber Security, And Exchange Of Information Challenges, William Byrnes

William H. Byrnes

No abstract provided.