Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

1996

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 74 of 74

Full-Text Articles in Law

Conflicts On The Net: Choice Of Law In Transnational Cyberspace, Matthew R. Burnsteln Jan 1996

Conflicts On The Net: Choice Of Law In Transnational Cyberspace, Matthew R. Burnsteln

Vanderbilt Journal of Transnational Law

No recent technological advance has captured the attention and imagination of the United States and the international community like the advent of global communications networks--the Internet, Cyberspace, the Information Superhighway. While the technology advances daily, a legal regime for ordering cyberspace has not yet evolved. Already, cases are reaching the courts in which plaintiffs complain of improper and unlawful activities by defendants in cyberspace. Both cyberspace's growing ubiquity and the anonymity found online will increase international use of the networks for interaction and commerce. This Note considers the conflict of laws implications of transnational cyberspace. The need to consider choice …


Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika Jan 1996

Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika

Touro Law Review

No abstract provided.


Starting An Electronic Journal In Law, I. Trotter Hardy Jan 1996

Starting An Electronic Journal In Law, I. Trotter Hardy

Faculty Publications

Starting and operating an electronic journal is similar to starting and operating any journal; it is only the actual “mailing” of an electronic journal that is easier. The author discusses his experience in starting the Journal of Online Law, an electronic journal dealing with the legal issues of cyberspace. He describes his experience in addressing questions such as whether to charge for access, how to gain visibility for the journal, what type of articles make the most sense for electronic publication, which forms of electronic distribution make the most sense, and other issues.


International Law And The Information Age, John K. Gamble Jan 1996

International Law And The Information Age, John K. Gamble

Michigan Journal of International Law

The subject of this article is problematic because of the paucity of other work addressing the topic and its amorphous and technical nature. The author shall argue that the information age will affect almost all aspects of how international law is made and studied, everything from theory to sources to research to teaching. Rather than limiting the article to one or two aspects of the changes brought by the information age, the author offers a tour d'horizon. This risks superficiality, but is consonant with the goal of stimulating discussion about issues that are important to the future of international …


Book Review. Telecom Regulation Monitor (S. Gieman And E. Herman, Eds.), Juliet Casper Smith Jan 1996

Book Review. Telecom Regulation Monitor (S. Gieman And E. Herman, Eds.), Juliet Casper Smith

Articles by Maurer Faculty

No abstract provided.


Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll Jan 1996

Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber Jan 1996

Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber

Law Faculty Articles and Essays

This article addresses the repercussions of Stern v. Delphi Internet Services Corporation and argues that the decision in Stern opens the door to a broader interpretation of “newsworthiness” and “public interest” that will enable advertisers broader First Amendment protections when using “unauthorized” likenesses. This article posits that artful advertisers could very well use the theory of Stern as a basis for virtually ensuring that every “unauthorized likeness” will enjoy First Amendment protection and not be considered as violative of the right of publicity.


It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin Jan 1996

It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin

Articles

No abstract provided.


Property (And Copyright) In Cyberspace, I. Trotter Hardy Jan 1996

Property (And Copyright) In Cyberspace, I. Trotter Hardy

Faculty Publications

No abstract provided.


Governing Networks And Rule-Making In Cyberspace, Joel R. Reidenberg Jan 1996

Governing Networks And Rule-Making In Cyberspace, Joel R. Reidenberg

Faculty Scholarship

The global network environment defies traditional regulatory theories and policymaking practices. At present, policymakers and private sector organizations are searching for appropriate regulatory strategies to encourage and channel the global information infrastructure (“GII”). Most attempts to define new rules for the development of the GII rely on disintegrating concepts of territory and sector, while ignoring the new network and technological borders that transcend national boundaries. The GII creates new models and sources for rules. Policy leadership requires a fresh approach to the governance of global networks. Instead of foundering on old concepts, the GII requires a new paradigm for governance …


A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen Jan 1996

A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader’s paradise—an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are enabling information providers to amass an unprecedented wealth of data about who their customers are and what they like to read. In the new …


Cybermarks: A Proposed Hierarchical Modeling System Of Registration And Internet Architecture For Domain Names, 29 J. Marshall L. Rev. 623 (1996), G. Andrew Barger Jan 1996

Cybermarks: A Proposed Hierarchical Modeling System Of Registration And Internet Architecture For Domain Names, 29 J. Marshall L. Rev. 623 (1996), G. Andrew Barger

UIC Law Review

No abstract provided.


Law In Cyberspace, Fred H. Cate Jan 1996

Law In Cyberspace, Fred H. Cate

Articles by Maurer Faculty

No abstract provided.


Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald Dec 1995

Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald

Susan Freiwald

This article argues that the coming tide of electronic Federal law protects the privacy of transmitted communications under a two-tiered system. The actual contents of communications occupy the first tier, where they enjoy fairly effective protection against disclosure. Communication attributes encompass all of the other information that can be learned about a communication, such as when and where it occurred, to whom and from whom it was sent and how long it lasted. They occupy a lowly second tier, where the protections against disclosure are weak, ambiguous and in some cases non-existent. This bifurcated system becomes increasingly untenable as advances …