Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 76

Full-Text Articles in Law

Curbing Copyblight, John Tehranian Jan 2012

Curbing Copyblight, John Tehranian

Vanderbilt Journal of Entertainment & Technology Law

This Article identifies and analyzes the growing problem of "copyblight" the use of overreaching claims by putative copyright holders to ownership of public domain works, and, more broadly, to exclusive rights which they do not hold in copyrighted works. Despite the fact that copyblight circumscribes political and social discourse, stifles creativity, and constricts the dissemination of information, present law provides few, if any, disincentives against the practice. Building on the groundbreaking work of Paul Heald and Jason Mazzone, this Article advances three proposals to temper the problems of overreach in order to restore a needed balance in our copyright system: …


The Risks Of Taking Facebook At Face Value: Why The Psychology Of Social Networking Should Influence The Evidentiary Relevance Of Facebook Photographs, Kathryn R. Brown Jan 2012

The Risks Of Taking Facebook At Face Value: Why The Psychology Of Social Networking Should Influence The Evidentiary Relevance Of Facebook Photographs, Kathryn R. Brown

Vanderbilt Journal of Entertainment & Technology Law

Social networking sites in general, and Facebook in particular, have changed the way individuals communicate and express themselves. Facebook users share a multitude of personal information through the website, especially photographs. Additionally, Facebook enables individuals to tailor their online profiles to project a desired persona. However, as social scientists have demonstrated, the image users portray can mislead outside observers. Given the wealth of information available on Facebook, it is no surprise that attorneys often peruse the website for evidence to dispute opponents' claims.

This Note examines the admission and relevance of Facebook photographs offered to prove a litigant's state of …


Edible Plagiarism: Reconsidering Recipe Copyright In The Digital Age, Meredith G. Lawrence Jan 2011

Edible Plagiarism: Reconsidering Recipe Copyright In The Digital Age, Meredith G. Lawrence

Vanderbilt Journal of Entertainment & Technology Law

Sharing recipes through food blogs is an increasingly popular activity. Bloggers publish their own recipes, claiming copyright protection, but they also publish others' recipes. Food publishers who distribute recipes online may be harmed when bloggers include the entire text of the food publisher's recipe on a blog without the publisher's knowledge or permission. The blogger's inclusion of an entire recipe often reduces site traffic to the food publisher's website, thereby damaging advertising revenues. Copyright law, as courts interpret it today, does not provide these publishers with recourse against bloggers who publish their recipes without permission.

This Note analyzes the various …


Is Online Copyright Enforcement Scalable?, Annemarie Bridy Jan 2011

Is Online Copyright Enforcement Scalable?, Annemarie Bridy

Vanderbilt Journal of Entertainment & Technology Law

This Article examines P2P file sharing and the copyright enforcement problem it has created through the lens of scalability. Part I traces the evolution of peer-to-peer (P2P) networks from Napster to BitTorrent, with a focus on the relative scalability of successive architectures. Part II takes up the difficult question of the scale of P2P infringement and its harms, examining the strategic number-crunching that underlies industry data on piracy, the government's credulous acceptance of that data, and the risk of letting industry hyperbole drive copyright policy and law enforcement priorities. Part III evaluates the efficacy of the Digital Millennium Copyright Act …


Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg Jan 2011

Silence Of The Spam: Improving The Can-Spam Act By Including An Expanded Private Cause Of Action, David J. Rutenberg

Vanderbilt Journal of Entertainment & Technology Law

In the last decade, email spam has become more than just an annoyance for email users. Unsolicited messages now comprise more than 95 percent of all email sent worldwide. This costs US businesses billions of dollars in lost productivity each year. The US Congress passed the CAN-SPAM Act of 2003 to regulate the spam industry. Unfortunately, data show that spam only increased since the Act's passage. Part of the reason for this failure is that the Act only authorizes the Federal Trade Commission, state attorneys general, and Internet Service Providers to bring action under its provisions. Each of these authorized …


Information Wars And The Challenges Of Content Protection In Digital Contexts, Raymond T. Nimmer Jan 2011

Information Wars And The Challenges Of Content Protection In Digital Contexts, Raymond T. Nimmer

Vanderbilt Journal of Entertainment & Technology Law

We are in the midst of a fundamental conflict in law and policy between those who favor maintaining and expanding copyright and related rights in the digital context ("rights enhancers"), and those who favor letting rights atrophy ("rights restrictors'). This Article argues that strong intellectual property rights are essential. At minimum, they are important to support creativity in contexts where the creation, collection, or distribution of the content requires substantial investment of time and resources. The case for allowing creators' rights to weaken is both untested and structurally suspect. Copyright law must construct a balance that fully supports creative activity …


Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton Jan 2011

Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton

Vanderbilt Journal of Entertainment & Technology Law

Direct copyright infringement attracts strict liability. However, as a theoretical matter, it is not necessarily clear why. Legislatures and courts have typically imposed strict liability where: (a) a defendant has notice of a plaintiff's rights, particularly where those rights involve a property interest; (b) a mens rea requirement on the part of the defendant would create an untenable burden on the plaintiff; (c) it is easier for the defendant to avoid harming the plaintiff than it is for the plaintiff to avoid the harm; or, (d) it is more administratively or economically efficient for the defendant to bear the risk …


Libraries, Digital Content, And Copyright, Laura N. Gasaway Jan 2010

Libraries, Digital Content, And Copyright, Laura N. Gasaway

Vanderbilt Journal of Entertainment & Technology Law

Libraries use, acquire, create and host generate digital content. They digitize their existing collections of works such as letters, diaries and manuscripts and post them on library websites. Increasingly, libraries are utilizing digital technology to preserve library works which may or may not be made available to the public. Libraries also create, manage and host user generated content such as posts on discussion boards, blogs, wikis, RSS feeds, social bookmarking, tagging, and social networks. Libraries use user generated content for internal library purposes, such as displays and events and for teaching. Further, libraries often are asked to assist users who …


No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman Jan 2010

No Confusion Here: Proposing A New Paradigm For The Litigation Of Keyword Advertising Trademark Infringement Cases, Rachel R. Friedman

Vanderbilt Journal of Entertainment & Technology Law

Internet search engines such as Google and Yahoo! earn a majority of their profit from selling advertisements to appear next to search results. Google's coveted advertising space, however, causes nightmares for trademark holders when their trademarks are auctioned by Google to competitors as keywords to trigger the competitors' advertisements when the trademark is used as a search term. Advertisers strategically bid on trademarks of competitors to ensure that their ads appear whenever the trademark is used as a search term, instead of the advertisements of the trademark holder. For example, Nike could bid on the trademark for "Adidas," with the …


Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis Jan 2010

Google Books: Page By Page, Click By Click, Users Are Reading Away Privacy Rights, Kathleen E. Kubis

Vanderbilt Journal of Entertainment & Technology Law

Google Books will likely become the world's most extensive book and magazine search and browsing resource, library, and bookstore--combined. However, as users necessarily reveal personal identifying information through their book searches and reading habits, this service poses a significant threat to personal privacy.

Because the Google Books Amended Settlement Agreement neglects to meaningfully address user privacy, the only available privacy protections are the limited rights bestowed by the Google Books Privacy Policy and the Google Privacy Policy. Unfortunately, these Privacy Policies protect the interests of Google at the expense of users.

The enactment of federal privacy statutes, which include provisions …


Combating Incitement To Terrorism On The Internet: Comparative Approaches In The United States And United Kingdom And The Need For An International Solution, Elizabeth M. Renieris Jan 2009

Combating Incitement To Terrorism On The Internet: Comparative Approaches In The United States And United Kingdom And The Need For An International Solution, Elizabeth M. Renieris

Vanderbilt Journal of Entertainment & Technology Law

In recent years, terrorist use of the Internet has been gaining in popularity, with more than several thousand radical or extremist websites in existence today. Because the Internet transcends physical and geographic boundaries, combating terrorist incitement on the Internet requires cross-border global cooperation. Although the international community has taken steps to combat the problem with United Nations Security Council Resolutions 1373 and 1624, the state parties to these resolutions have been unable to close the significant holes in the current international legal framework, and there is little evidence that terrorist use of the Internet for purposes of incitement is being …


We're Friends, Right? Client List Misappropriation And Online Social Networking In The Workplace, Brian V. Wyk Jan 2009

We're Friends, Right? Client List Misappropriation And Online Social Networking In The Workplace, Brian V. Wyk

Vanderbilt Journal of Entertainment & Technology Law

Social networks, such as Facebook, MySpace, and LinkedIn have grown tremendously over the past decade, and today they claim over 200 million users between the three services. A great number of smaller social networks have also appeared, and new services are constantly being created. With the vast growth of social networking has come the use of social networking in business. As businesses have sought to exploit the wealth of information that social network users share over these networks, businesses have encountered the problem of protecting the compilations of information they have produced. The problem became clear in 2008 when a …


Internet Retailers And Intertype Competition: How The Supreme Court's Incomplete Analysis In Leegin V. Psks Leaves Lower Courts Improperly Equipped To Consider Modern Resale Price Maintenance Agreements, Daniel B. Nixa Jan 2009

Internet Retailers And Intertype Competition: How The Supreme Court's Incomplete Analysis In Leegin V. Psks Leaves Lower Courts Improperly Equipped To Consider Modern Resale Price Maintenance Agreements, Daniel B. Nixa

Vanderbilt Journal of Entertainment & Technology Law

In Leegin Creative Leather Products, Inc. v. PSKS, Inc., the U.S. Supreme Court held that resale price maintenance (RPM) agreements are to be judged under the rule of reason. An RPM agreement is an agreement between a manufacturer and retailers stipulating that retailers will charge a certain price for the manufacturer's products. This Note argues that the Supreme Court should have instructed lower courts to consider intertype competition in addition to interbrand and intrabrand competition when evaluating RPM agreements under the rule of reason. Two reasons lead to this conclusion. First, the Internet has invigorated intertype competition and has made …


Working Toward Spontaneous Copyright Licensing: A Simple Solution For A Complex Problem, Tanya M. Woods Jan 2009

Working Toward Spontaneous Copyright Licensing: A Simple Solution For A Complex Problem, Tanya M. Woods

Vanderbilt Journal of Entertainment & Technology Law

As the web evolves, so too are discussions on how to manage the rights of copyright owners online. Finding a solution that is balanced and that accounts for the international nature of the Internet is essential. While many have attempted to craft such a solution, a model that accommodates the spontaneity of copyright content users and that recognizes the multi-territorial nature of the Internet has yet to materialize. For this reason, this Article formulates a macro-level conceptual approach to building a practical copyright licensing model that could generate spontaneous digital copyright licenses to accommodate the creative impulses of web users …


"Transformative" User-Generated Content In Copyright Law: Infringing Derivative Works Or Fair Use?, Mary W.S. Wong Jan 2009

"Transformative" User-Generated Content In Copyright Law: Infringing Derivative Works Or Fair Use?, Mary W.S. Wong

Vanderbilt Journal of Entertainment & Technology Law

In the United States, the line between the type and level of transformation required for a copyrightable derivative work and that required to constitute fair use has not been drawn clearly. With the rise of user-generated content, this question (which arises in two distinct copyright contexts) has become even more important. At the same time, copyright law has generally shied away from defining authorship as a legal concept, preferring instead to develop and rely on the related (but not identical) concept of originality. This has resulted in a low copyrightability threshold that does not adequately account for the fact that …


Mass Culture And The Culture Of The Masses: A Manifesto For User-Generated Rights, Debora Halbert Jan 2009

Mass Culture And The Culture Of The Masses: A Manifesto For User-Generated Rights, Debora Halbert

Vanderbilt Journal of Entertainment & Technology Law

User-generated content is a term used to describe the division between culture produced as a commodity for consumption and the culture that is generated by people acting as creative beings without any market incentive. While under current copyright law all types of creativity are protected, the laws of copyright exist primarily to protect commercial forms of expression, not the non-commercial ones that form the foundation of user-generated content. The disconnect between what current copyright law protects and how most people create generates tensions that must be addressed. This Article presents an argument for broader protection of all creative work, including …


The Magic Circle, Joshua A.T. Fairfield Jan 2009

The Magic Circle, Joshua A.T. Fairfield

Vanderbilt Journal of Entertainment & Technology Law

This Article examines the concept of the "magic circle," the metaphorical barrier that supposedly excludes real-world law from virtual worlds. The Article argues that this metaphor fails because there is no "real" world as distinguished from "virtual" worlds. Instead of a magic circle, this Article advocates a rule of consent: actions in a virtual world give rise to legal liability if they exceed the scope of consent given by other players within the game. The Article concludes that although real-world law cannot reasonably be excluded from virtual worlds, game gods and players can control the interface between law and virtual …


Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril Jan 2009

Two Notions Of Privacy Online, Avner Levin, Patricia S. Abril

Vanderbilt Journal of Entertainment & Technology Law

Users of social networking websites tend to disclose much personal information online yet seem to retain some form of an expectation of privacy. Is this expectation of privacy always unreasonable? How do users of online social networks define their expectations of privacy online?

These questions were the impetus behind an empirical study, the findings of which are presented in this Article. The project, simultaneously conducted in Canada, at Ryerson University, and in the United States, at the University of Miami, consisted of a survey regarding personal information protection and expectations of privacy on online social networks (OSNs). Approximately 2,500 young …


Just Click Submit: The Collection, Dissemination, And Tagging Of Personally Identifying Information, Corey Ciocchetti Jan 2008

Just Click Submit: The Collection, Dissemination, And Tagging Of Personally Identifying Information, Corey Ciocchetti

Vanderbilt Journal of Entertainment & Technology Law

As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, Websites collect vast amounts of personally identifying information (PHII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits--such as tailored Web sites and relevant marketing--that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit their personal information …


User-Generated Content And Virtual Worlds, Greg Lastowka Jan 2008

User-Generated Content And Virtual Worlds, Greg Lastowka

Vanderbilt Journal of Entertainment & Technology Law

Many legal commentators have claimed that virtual worlds owe their popularity to their focus on user-generated content and user creativity. While this is true in part and authorial freedom may draw consumers to virtual worlds, user-generated content can also pose risks to virtual world business from both an aesthetic and legal perspective. A significant tension exists between permitting participants to create content freely and building a successful virtual environment. In some instances, user-generated content can overwhelm virtual worlds. The future of user-generated content in virtual worlds is not clear, given the significant practical and legal problems that accompany user-generated content.


Xiaoning V. Yahoo! Inc.'S Invocation Of The Alien Tort Statute: An Important Issue But An Improper Vehicle, Denae Thomas Jan 2008

Xiaoning V. Yahoo! Inc.'S Invocation Of The Alien Tort Statute: An Important Issue But An Improper Vehicle, Denae Thomas

Vanderbilt Journal of Entertainment & Technology Law

U.S.-based Internet service providers (ISPs) are faced with a dilemma when operating in countries with restrictive Internet speech laws: should they comply with these governments' demands for personally identifying information of Internet dissidents or respect their own country's dedication to free speech and refuse to comply? On behalf of Chinese dissidents who were imprisoned for violating Chinese speech laws, human rights advocates have invoked the Alien Tort Statute (ATS) in an attempt to hold ISPs accountable for their acquiescence with the Chinese government's demands. This Note examines one such case, Xiaoning v. Yahoo! Inc., and ultimately concludes that, while the …


A Common Tool For Individual Solutions: Why Countries Should Establish An International Organization To Regulate Internet Content, Paul Przybylski Jan 2007

A Common Tool For Individual Solutions: Why Countries Should Establish An International Organization To Regulate Internet Content, Paul Przybylski

Vanderbilt Journal of Entertainment & Technology Law

This note advances the case for an international organization to control Internet content. Part I describes the current state of affairs with respect to Internet regulation. First, this part describes briefly how the Internet works, to the extent that such a description is necessary to advance the argument presented in this note. Second, concentrating on Europe, the United States, and China, Part I describes the diverging preferences of countries regarding Internet regulation, the approaches they have taken, and the problems they have encountered due to the international nature of the Internet. Third, this part addresses the major attempt at international …


From Safe Harbor To Choppy Waters: Youtube, The Digital Millennium Copyright Act,And A Much Needed Change Of Course, Lauren B. Patten Jan 2007

From Safe Harbor To Choppy Waters: Youtube, The Digital Millennium Copyright Act,And A Much Needed Change Of Course, Lauren B. Patten

Vanderbilt Journal of Entertainment & Technology Law

YouTube.com, named Time magazine's "Invention of the Year" for 2006 and widely recognized as the most-visited video site on the Internet, has changed the face of online entertainment. With the site's acquisition by Google in October 2006, the possibilities for YouTube's growth became truly endless. However, there is a darker side to the story of the Internet sensation, one that is grounded in its potential liability for copyright infringement. The issue is that many of the most-viewed and most-popular videos on the site are copyrighted. The copyright owners of those popular clips want their works back and are suing YouTube …


Cyber-Libeling The Glitterati: Protecting The First Amendment For Internet Speech, Abbey L. Mansfield Jan 2007

Cyber-Libeling The Glitterati: Protecting The First Amendment For Internet Speech, Abbey L. Mansfield

Vanderbilt Journal of Entertainment & Technology Law

Celebrity gossip is disseminated on the Internet not only by profitable publications and Internet tabloids with professional writers and sophisticated legal teams, but also by countless numbers of "blogs" posted by ordinary individuals, often with nothing more than a dial-up connection. Americans posting speech on the Internet must be aware of the implications of the Gutnick decision and recognize that they could be dragged into court and held liable for defamation abroad. This note explores theoretical changes to the law that should be adopted to protect the First Amendment as it applies to Internet speech. Additionally, this note discusses various …


All In, But Left Out: How The Unlawful Internet Gambling Enforcement Act Seeks To Eradicate Online Gambling In The United States, Benjamin C. Wickert Jan 2007

All In, But Left Out: How The Unlawful Internet Gambling Enforcement Act Seeks To Eradicate Online Gambling In The United States, Benjamin C. Wickert

Vanderbilt Journal of Entertainment & Technology Law

In recent years, gambling on the Internet has evolved into a multi-billion dollar enterprise. The industry has been particularly entrenched in the United States, whose citizens at one time accounted for up to one-half of all Internet gambling revenues. However, the landscape of Internet gambling in the United States changed drastically in 2006, when President George W Bush signed into law the Unlawful Internet Gambling Enforcement Act (UIGEA). The crucial provision of the UIGEA is its prohibition of the acceptance of payments, made by United States banks and creditors, to purveyors of unlawful Internet gambling enterprises. By targeting United States …


Calling All Angles: Perspectives On Regulating Internet Telephony, Melissa Winberg Jan 2007

Calling All Angles: Perspectives On Regulating Internet Telephony, Melissa Winberg

Vanderbilt Journal of Entertainment & Technology Law

In 1996, Congress passed the Telecommunications Act, substantially revising the Communications Act of 1934 to reflect technological advances, including the Internet, and Congress's deregulatory goals. Currently, however, new technologies are challenging the viability of the statutory definitions and regulatory schemes of the statute. Internet telephony, commonly called Voice over Internet Protocol (VoIP), is both a replacement for traditional telephone service and a new web-based technology. Given the current competitive political climate and the magnitude of the interests involved, Congress is unlikely to succeed in altering the telecommunications regime. Thus, the Federal Communications Commission, which has the authority to regulate interstate …


State Regulation Of Unsolicited Bulk Commercial E-Mail And The Dormant Commerce Clause, Jeffrey D. Zentner Jan 2006

State Regulation Of Unsolicited Bulk Commercial E-Mail And The Dormant Commerce Clause, Jeffrey D. Zentner

Vanderbilt Journal of Entertainment & Technology Law

This note will analyze the implications of the dormant Commerce Clause as applied to Virginia's stringent anti-spam law, under which two spammers have already been convicted of felony spamming. Part I will lay out the background of anti-spam legislation, case law involving other state statutes, and a brief history of United States Supreme Court dormant Commerce Clause jurisprudence. Part II will examine the validity of state spam regulation under the Federal CAN-SPAM Act of 2003 and current dormant Commerce Clause jurisprudence, using Virginia's anti-spam law as an example. Finally, Part III will examine the shortcomings of the CAN-SPAM Act and …


A Winner Is Who? Fair Use And The Online Distribution Of Manga And Video Game Fan Translations, Jaime E. Muscar Jan 2006

A Winner Is Who? Fair Use And The Online Distribution Of Manga And Video Game Fan Translations, Jaime E. Muscar

Vanderbilt Journal of Entertainment & Technology Law

This note examines the legality of fan translations of Japanese comic books, known as manga, and video games distributed over the Internet, with special consideration given to the application of the fair use doctrine. Technology related to the distribution of media online grows exponentially compared to the law governing this technology. Although much recent litigation has limited the online distribution of traditional media, both copyright holders and courts have largely ignored a fringe segment of this distribution. This fringe includes manga and video games. Manga can be easily shared online by scanning images, and video games are now frequently converted …


Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell Jan 2006

Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell

Vanderbilt Journal of Entertainment & Technology Law

Part I of this note provides an overview of the use of media during war. It also reviews case law relating to the military's limited right to freedom of speech under the First Amendment. Part II analyzes the problems of regulating milblogs in terms of societal costs and the technological challenges of regulating behavior on the Internet. This note argues that the military's "unexceptionalist" approach toward regulation, wherein it applies the traditional principles embodied in the UCMJ to milblog regulation, undermines its goal of maintaining operational security and impedes the free flow of ideas. Finally, Part II introduces an "exceptionalist" …


Why Is Betamax An Anachronism In The Digital Age?, Jiarui Liu Jan 2005

Why Is Betamax An Anachronism In The Digital Age?, Jiarui Liu

Vanderbilt Journal of Entertainment & Technology Law

This Article aims to examine whether, as some courts indicate, the Sony doctrine is largely irrelevant in cyberspace. If the answer is no, how should courts properly apply the Sony doctrine to protect copyright holders' legitimate interests and further the innovation and prosperity of Internet technologies? This Article argues that the Sony doctrine should be given the widest application possible and not be subject to any preconceived formula. In the digital age, the test of "capable of substantial noninfringing uses" is still well suited to advance the ultimate objective of copyright law contemplated by the Supreme Court as well as …