Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

2002

Institution
Keyword
Publication

Articles 1 - 30 of 92

Full-Text Articles in Law

Mom & Pop V. Dot-Com: A Disparity In Taxation Based On How You Shop?, Jaime Klima Dec 2002

Mom & Pop V. Dot-Com: A Disparity In Taxation Based On How You Shop?, Jaime Klima

Duke Law & Technology Review

With the extension of the Internet Tax Freedom Act, concern has resurfaced over whether and when shoppers will be forced to pay state sales taxes on purchases made over the Internet. In fact, consumers should be paying sales tax on all Internet purchases, though few actually do. This iBrief explores the current law on taxation of e-commerce purchases and argues that small modifications by state tax administrators will align the tax treatment of mom & pop stores and e-retailers.


The U.S. Supreme Court Addresses The Child Pornography Prevention Act And Child Online Protection Act In Ashcroft V. Free Speech Coalition And Ashcroft V. American Civil Liberties Union, Sue Ann Mota Dec 2002

The U.S. Supreme Court Addresses The Child Pornography Prevention Act And Child Online Protection Act In Ashcroft V. Free Speech Coalition And Ashcroft V. American Civil Liberties Union, Sue Ann Mota

Federal Communications Law Journal

Both the Child Pornography Prevention Act ("CPPA") and the Child Online Protection Act ("COPA") were intended by Congress to protect minors. The CPPA was intended to protect minors from the harmful effects of virtual child pornography. The COPA was intended to protect minors from pornography currently available commercially on the World Wide Web. However, in 2002, the U.S. Supreme Court addressed the constitutionality of both statutes: The Court struck down sections of the CPPA as overbroad and unconstitutional in Ashcroft v. Free Speech Coalition. In Ashcroft v. ACLU, the Court upheld some sections of COPA as not unconstitutionally overbroad, but …


What’S In A Name?, Jonathan Zittrain Dec 2002

What’S In A Name?, Jonathan Zittrain

Federal Communications Law Journal

Book Review: Ruling the Root, Milton L. Mueller, Cambridge, Mass.: MIT Press, 2002, 301 pages.

A review of Milton L. Mueller's Ruling the Root, The MIT Press, 2002. In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order-a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law-came about because the management of obscure but critical centralized Internet functions was at a political crossroads. In Ruling the Root, Mueller thoroughly documents the colorful history both before and after this moment of inflection, and gives …


Music Piracy And The Audio Home Recording Act, Tia Hall Nov 2002

Music Piracy And The Audio Home Recording Act, Tia Hall

Duke Law & Technology Review

In spite of the guidance provided by the Audio Home Recording Act (AHRA) of 1992, music companies are once again at odds with consumer electronics manufacturers. This time around, the dispute is over certain information technology products that enable consumers to copy digital music and transfer them to different formats, or exchange them over the Internet. This article will discuss anti-piracy measures being taken by digital content owners and the United States legislature to combat piracy and evaluate them in light of the AHRA.


Online Brokers And The Sec: Still Working Out The Glitches, Philip J. Bezanson Nov 2002

Online Brokers And The Sec: Still Working Out The Glitches, Philip J. Bezanson

Duke Law & Technology Review

Common sense dictates that some customers of an on-line brokerage service are bound to have some of the same difficulties in conducting business but that does not mean all customers or even many customers had the same problems. In addition, as to customers who may have had problems executing buy and/or sell orders, there are many variables regarding the circumstances and conditions for each customer's transaction. Variables such as, but not limited to, account status, time of order, i.e., time of day and day of the week, and the customer's computer modem capabilities and internet service provider. Plaintiffs fail to …


Technology Law, J. Douglas Cuthbertson, Glen L. Gross Nov 2002

Technology Law, J. Douglas Cuthbertson, Glen L. Gross

University of Richmond Law Review

No abstract provided.


The Future Of Wireless Spam, Evan Cramer Oct 2002

The Future Of Wireless Spam, Evan Cramer

Duke Law & Technology Review

Though US cellular networks currently lack the capacity for widespread distribution of unsolicited wireless advertising (wireless spam), these advertisements are already well known in Japan and Europe, where they have proven to be a significant burden on cellular users. This iBrief examines the recently ratified legislation in Japan and Asia that have attempted to stop the glut of wireless advertisements, as a foreshadowing of the problems and questions that will soon have to be addressed in the United States.


Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Virtual Child Pornography On The Internet: A “Virtual” Victim?, Dannielle Cisneros Sep 2002

Virtual Child Pornography On The Internet: A “Virtual” Victim?, Dannielle Cisneros

Duke Law & Technology Review

Child pornography is an exception to First Amendment freedoms because it exploits and abuses our nation's youth. The latest trend in that industry is "virtual child" pornography. "Virtual child" pornography does not use real children or images of real identifiable children. When the object of desire is not a child, but merely a combination of millions of computer pixels crafted by a skilled artist, can the government ban this allegedly victimless creation?


New “Unbundling” Rules: Will The Fcc Finally Open Up Cable Broadband?, Sarah North Sep 2002

New “Unbundling” Rules: Will The Fcc Finally Open Up Cable Broadband?, Sarah North

Duke Law & Technology Review

This iBrief discusses a recent Court of Appeals decision remanding FCC rules on the "unbundling" of Internet services by telephone exchange carriers. These rules ordered many Internet service providers to share their equipment with competitors, so that consumers could choose their providers instead of having to accept all services from the company who installed the physical Internet connection. Cable Internet providers are not included in these rules. This iBrief predicts that cable broadband operators will soon be governed by the same "unbundling" provisions as other ISPs.


Microsoft And The European Union Face Off Over Internet Privacy Concerns, Seagrumn Smith Aug 2002

Microsoft And The European Union Face Off Over Internet Privacy Concerns, Seagrumn Smith

Duke Law & Technology Review

Amidst what appears to be a multi-faceted attack by the European Union on Microsoft, the newest angle is the European Commission's announcement last month that it was considering a formal investigation of Microsoft's .Net Passport data processing system for possible violations of the European Union Data Privacy Directive. This iBrief explores the European Data Privacy Directive and seeks to explain why the European Commission believes .Net Passport may be in violation of its privacy policies and a case for further investigation.


Open Source, Open Arms: An Open-Ended Question, Alana Maurushat Aug 2002

Open Source, Open Arms: An Open-Ended Question, Alana Maurushat

Canadian Journal of Law and Technology

This paper is structured to address several aspects and challenges to the open source movement. Beginning with an outline of the historical and cultural components of the open source movement, the paper will move on to explore the economic and philosophical underpinnings of intellectual property. It will be demonstrated that open source finds itself uniquely situated within these theories and doctrines. The questions that open source poses for intellectual property will then be examined. My arguments will stem from the general premise that open source is threatened by three mechanisms: the uncertainty of the validity of open source licenses, potentially …


The New Singapore Domain Name Dispute Resolution Policy: The Context Of The Common Law And Icann's Udrp, Richard Wu Aug 2002

The New Singapore Domain Name Dispute Resolution Policy: The Context Of The Common Law And Icann's Udrp, Richard Wu

Canadian Journal of Law and Technology

In this article, I will analyse the salient features of the Policy and evaluate the extent to which they match international practice. I will focus, in particular, upon the Uniform Domain Name Dispute Resolution Policy (UDRP) and the rules made under the UDRP. The Internet Corporation for Assigned Names and Numbers (ICANN), the international body responsible for domain name management, adopted both in 1999. As the nature of domain name disputes and dispute resolution rules are very similar in different countries, domain name disputes are becoming a global phenomenon, leading to the development of a kind of ‘‘Internet common law’’. …


M-Commerce: The Notion Of Consumer Consent In Receiving Location-Based Advertising, Eloïse Gratton Aug 2002

M-Commerce: The Notion Of Consumer Consent In Receiving Location-Based Advertising, Eloïse Gratton

Canadian Journal of Law and Technology

The development of location-based advertising, for all its convenience and usefulness, introduces new and heightened privacy risks for consumers that must be addressed. The portability of wireless devices and the ubiquity of their applications, coupled with an ability to pinpoint the location of wireless users and reveal it to others, could produce a system where the everyday activities and movements of these users are tracked and recorded. Wireless users would receive unanticipated advertising messages on their wireless device, commonly referred to as ‘‘wireless spam’’, generally considered a form of privacy violation.

In order to obtain a valid consent from the …


Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele Aug 2002

Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele

Canadian Journal of Law and Technology

This paper provides an overview of trade-related aspects of electronic commerce, and examines three approaches for regulating international trade in cyber- space. A model which integrates these approaches is then proposed, emphasizing private standards of self-regula- tion within a broader public framework of minimal background standards. A summary of potential areas of conflict between competing regulatory approaches fol- lows, and the paper concludes that both the WTO and the OECD have important roles to play in the develop- ment of international consensus towards a harmonized framework for the regulation of global TRECs.


The Personal Information Protection And Electronic Documents Act: A Comprehensive Guide By William Charnetski, Patrick Flaherty And Jeremy Robinson (Toronto Canada Law Book Inc., 2001), Teresa Scassa Aug 2002

The Personal Information Protection And Electronic Documents Act: A Comprehensive Guide By William Charnetski, Patrick Flaherty And Jeremy Robinson (Toronto Canada Law Book Inc., 2001), Teresa Scassa

Canadian Journal of Law and Technology

The Personal Information Protection and Electronic Documents Act: A Comprehensive Guide (the Guide) is the second book to be published in English in Canada dealing expressly with the Personal Information Protec- tion and Electronic Documents Act (PIPEDA). The Guide is different from the earlier work, in that it is not a section by section discussion or annotation of the provisions of PIPEDA. Rather, it is organized into eight chapters, each addressing a distinct theme or topic. The Guide is also aimed at a more professional audience than the earlier work. In its introduction, and in its choice of content, it …


Solving Legal Issues In Electronic Government: Jurisdiction, Regulation, Governance, John D. Gregory Aug 2002

Solving Legal Issues In Electronic Government: Jurisdiction, Regulation, Governance, John D. Gregory

Canadian Journal of Law and Technology

This paper looks at who can be governed, what can be governed, and how it can be governed in an electronic world. Whether law aims to be enabling (i.e., confirming the ground rules and the legal effectiveness of general conduct) or normative (i.e., imposing standards of conduct on more or less willing subjects), the new media presents difficulties for its rational evolution.

These are distinct questions from those raised by government online. Electronic service delivery issues tend to focus on how government can carry on its traditional programs using electronic means and how the law can support it in doing …


The Patriation Of .Ca, Gregory R. Hagen, Kim G. Von Arx Aug 2002

The Patriation Of .Ca, Gregory R. Hagen, Kim G. Von Arx

Canadian Journal of Law and Technology

Country code top level domains (‘‘ccTLD’’s), such as .ca, are distinct from generic top-level domains (‘‘gTLD’’s), such as .com, in that they are generally conceived to be associated with a specific country. In Canada, the authority to operate the technical functions of the .ca domain name registry has been delegated to the Canadian Internet Registration Authority (‘‘CIRA’’) by a United States non-profit corporation, the Internet Corporation for Assigned Names and Numbers (‘‘ICANN’’). The authority to make policy regarding the .ca has purportedly been delegated to CIRA by the Government of Canada. There is an issue, however, as to whether ICANN’s …


Law And Order On The Wild, Wild West (Www), Jeffrey J. Look Jul 2002

Law And Order On The Wild, Wild West (Www), Jeffrey J. Look

University of Arkansas at Little Rock Law Review

No abstract provided.


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion May 2002

Protecting The E-Marketplace Of Ideas By Protecting Employers: Immunity For Employers Under Section 230 Of The Communications Decency Act, Eric M.D. Zion

Federal Communications Law Journal

While we credit employers that provide employees with free Internet access, such access comes at a price to the public because employers are one of the traditional defendents in defamation suits. Complicating matters, Congress enacted the Communications Decency Act. Its section 230 provides broad federal immunity for ISPs when defamatory material of a third party is published using their services. With the passage of section 230, Congress rendered employers immune for the same tort which they are so closely associated. Some argue that employers should not be capable of invoking the immunity because it would allow employers to defame with …


Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson May 2002

Injunctive Relief In The Internet Age: The Battle Between Free Speech And Trade Secrets, Adam W. Johnson

Federal Communications Law Journal

The information revolution has led to technological innovations in the movement, storage, and dissemination of information. The Internet allows a person, with good or bad intent, to distribute information to millions of people. This ability raises serious implications when trade secret information is the subject of Internet postings. Once a trade secret becomes publicly available, it loses its legal secrecy, and special legal protection. Additionally, competitors and everyone else on the Internet can gain access to the information. For those who rely on trade secret protection to guard their inventions, this presents a growing concern.

This Note will illustrate the …


Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham May 2002

Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham

Federal Communications Law Journal

On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …


Arkansas Surfers And Their Privacy, Or Lack Thereof: Does The Common Law Invasion Of Privacy Tort Prohibit E-Tailers' Use Of "Cookies"?, Bryan T. Mckinney, Dwayne Whitten Apr 2002

Arkansas Surfers And Their Privacy, Or Lack Thereof: Does The Common Law Invasion Of Privacy Tort Prohibit E-Tailers' Use Of "Cookies"?, Bryan T. Mckinney, Dwayne Whitten

University of Arkansas at Little Rock Law Review

No abstract provided.


Solving Legal Issues In Electronic Government: Authority And Authentication, John D. Gregory Apr 2002

Solving Legal Issues In Electronic Government: Authority And Authentication, John D. Gregory

Canadian Journal of Law and Technology

This article is an overview of some of the legal themes and issues faced by governments in the electronic age, with particular regard to their own operations: electronic service delivery and the administration of government itself.

Electronic government is the performance of any function of government using electronic records and electronic communications. It may involve, in the language of the Uniform Electronic Commerce Act, ‘‘us[ing] electronic means to create, collect, receive, store, transfer, distribute, publish or otherwise deal with documents or information.’’ The term thus covers the provision of governmental services to the public, including commu- nication from the public …


Use "The Filter You Were Born With": The Unconstitutionality Of Mandatory Internet Filtering For The Adult Patrons Of Public Libraries, Richard J. Peltz Apr 2002

Use "The Filter You Were Born With": The Unconstitutionality Of Mandatory Internet Filtering For The Adult Patrons Of Public Libraries, Richard J. Peltz

Washington Law Review

The only federal court (at the time of this writing) to consider the question ruled unconstitutional the mandatory filtering of Internet access for the adult patrons of public libraries. That 1998 decision helped the American Library Association and other free speech advocates fend off mandatory filtering for two years at the state and federal level, against the vigorous efforts of filtering proponents. Then, in 2000, the U.S. Congress conditioned federal funding of libraries on filter use, forcing the question into the courts as the latest colossal struggle over Internet regulation. This Article contends that the federal court in 1998 was …


Le Droit De Faire Jouer La Radio En Public, Ou La Petite Histoire D'Une Drôle D'Exemption, René Pépin Apr 2002

Le Droit De Faire Jouer La Radio En Public, Ou La Petite Histoire D'Une Drôle D'Exemption, René Pépin

Canadian Journal of Law and Technology

L’article 69 de la loi canadienne sur le droit d’auteur prévoit qu’aucun montant n’est exigible d’une personne qui utilise en public un appareil radio, pourvu que ce soit fait dans un endroit, tel un commerce ou un restaurant, où le public est invité à se rendre sans qu’il lui soit chargé un prix d’entrée. Plusieurs pays ont une disposition semblable dans leur législation en matière de droit d’auteur. Cela évite que les détenteurs de droits d’auteur sur des pièces musicales, ou les compagnies de disques, prétendent que le propriétaire de l’appareil radio se trouve à «représenter publiquement» ou à «exécuter …


Collective Management Of Copyright And Neighbouring Rights In Canada: An International Perspective, Daniel J. Gervais Apr 2002

Collective Management Of Copyright And Neighbouring Rights In Canada: An International Perspective, Daniel J. Gervais

Canadian Journal of Law and Technology

In this paper, we will compare the current Canadian framework and activities of Collective Management Organizations with the situation in a number of other major countries and suggest possible improvements to the current regime. The comparison will focus first on the general legal background for collective management and, second, on issues specific to the digital age. The paper only addresses some of the specific issues raised by the 1996 WCT and WPPT.


Book Review: Privacy Law In Canada By Colin H.H. Mcnairn And Alexander K. Scott, Anne Mussett Apr 2002

Book Review: Privacy Law In Canada By Colin H.H. Mcnairn And Alexander K. Scott, Anne Mussett

Canadian Journal of Law and Technology

Privacy Law in Canada is a 360-page work that broadly covers legislation at both the federal and provin- cial level, and criminal and civil liability for privacy intru- sions in the context of case law from across Canada. Particular focus is given to privacy issues associated with the workplace, personal health information, technolog- ical surveillance, and protecting consumers and debtors. The authors take a practical approach in examining chal- lenging questions, such as whether a consumer’s consent is required to obtain a credit report; disclosure of med- ical information; monitoring an employee’s computer use and voice mail; how the PIPEDA …