Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Compelled Production Of Encrypted Data, John E.D. Larkin Jan 2012

Compelled Production Of Encrypted Data, John E.D. Larkin

Vanderbilt Journal of Entertainment & Technology Law

There is a myth that shadowy and powerful government agencies can crack the encryption software that criminals use to protect computers filled with child pornography and stolen credit card numbers. The reality is that cheap or free encryption programs can place protected data beyond law enforcement's reach. If courts seriously mean to protect the victims of Internet crime--all too often children--then Congress must adopt a legal mechanism to remedy the technological deficiency.

To date, police and prosecutors have relied on subpoenas to either compel defendants to produce their password, or to decipher their protected data. This technique has been met …


Promoting Trademark's Ends And Means Through Online Contributory Liability, E. Jordan Teague Jan 2012

Promoting Trademark's Ends And Means Through Online Contributory Liability, E. Jordan Teague

Vanderbilt Journal of Entertainment & Technology Law

Trademark law accomplishes its ultimate end--helping consumers easily find, distinguish between, and trust products and services from different brands--through the means of giving markholders an incentive to develop and cultivate these brands in the first place. While individual trademark laws should serve these ends and means, this is not the case with contributory infringement in the United States as applied to the Internet. First, since the doctrine is based entirely in common law with little case law specifically addressing the online context, contributory infringement gives online service providers (OSPs) little notice as to what types of behaviors could result in …


"Do-Not-Track" As Contract, Joshua A.T. Fairfield Jan 2012

"Do-Not-Track" As Contract, Joshua A.T. Fairfield

Vanderbilt Journal of Entertainment & Technology Law

Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically--telephone numbers do not change, whereas Internet protocol (IP) addresses may …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert H. Sloan Jan 2012

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert H. Sloan

Vanderbilt Journal of Entertainment & Technology Law

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors website advertising as closely as possible to individual interests. The vast majority of consumers want considerably more control over our information. Consumers nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data …


The Romantic Collective Author, Margaret Chon Jan 2012

The Romantic Collective Author, Margaret Chon

Vanderbilt Journal of Entertainment & Technology Law

Although the romantic collective author is a much more elusive creature than its romantic individual counterpart, it can be discerned amidst the proliferation of expression on the Internet. This Article first outlines the ways in which the romantic author effect operates through both its genius and its arbiter prongs within collaborative authorship practices in digital networks. It next turns to scientific collaboration, where this author effect is attenuated, to assess whether scientific authorship practices might contribute to a more realistic and less romantic understanding of expressive authorship practices. A subsequent case study of collaborative digital authorship by Wikipedia contributors uncovers …


Curbing Copyblight, John Tehranian Jan 2012

Curbing Copyblight, John Tehranian

Vanderbilt Journal of Entertainment & Technology Law

This Article identifies and analyzes the growing problem of "copyblight" the use of overreaching claims by putative copyright holders to ownership of public domain works, and, more broadly, to exclusive rights which they do not hold in copyrighted works. Despite the fact that copyblight circumscribes political and social discourse, stifles creativity, and constricts the dissemination of information, present law provides few, if any, disincentives against the practice. Building on the groundbreaking work of Paul Heald and Jason Mazzone, this Article advances three proposals to temper the problems of overreach in order to restore a needed balance in our copyright system: …


The Risks Of Taking Facebook At Face Value: Why The Psychology Of Social Networking Should Influence The Evidentiary Relevance Of Facebook Photographs, Kathryn R. Brown Jan 2012

The Risks Of Taking Facebook At Face Value: Why The Psychology Of Social Networking Should Influence The Evidentiary Relevance Of Facebook Photographs, Kathryn R. Brown

Vanderbilt Journal of Entertainment & Technology Law

Social networking sites in general, and Facebook in particular, have changed the way individuals communicate and express themselves. Facebook users share a multitude of personal information through the website, especially photographs. Additionally, Facebook enables individuals to tailor their online profiles to project a desired persona. However, as social scientists have demonstrated, the image users portray can mislead outside observers. Given the wealth of information available on Facebook, it is no surprise that attorneys often peruse the website for evidence to dispute opponents' claims.

This Note examines the admission and relevance of Facebook photographs offered to prove a litigant's state of …