Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2005

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 183

Full-Text Articles in Law

The Fight To Save America's Inbox: State Legislation And Litigation In The Wake Of Can-Spam, Emma Scanlan Dec 2005

The Fight To Save America's Inbox: State Legislation And Litigation In The Wake Of Can-Spam, Emma Scanlan

Washington Journal of Law, Technology & Arts

The fight to curb the ever-increasing amount of unsolicited commercial email or “spam” showing up in the inboxes of American businesses has generated both state and federal legislation. The CAN-SPAM Act of 2003 was enacted to create a bright-line between spam and legal commercial email. The Act preempted many state spam laws but also left significant enforcement abilities to the individual states. States that elect to create large civil damages for spam without criminalizing the transmission of unsolicited commercial email run the risk of winning cases where the damage awards are largely unenforceable and not effective deterrents to big-time spammers. …


An Analysis For The Valuation Of Venture Capital-Funded Startup Firm Patents, John Dubiansky Dec 2005

An Analysis For The Valuation Of Venture Capital-Funded Startup Firm Patents, John Dubiansky

ExpressO

In an era where forces such as the Bayh Dole act and the rise of the venture capital industry are reshaping the manner in which innovations are brought to market, the role of intellectual property in the financing of new ventures is becoming increasingly important. The investment community requires a better understanding of the risks of patent-based transactions as such deals become more prevalent. This paper addresses that need by explaining an analysis for the valuation of startup firm-held patents. The paper considers the commonly employed methods of patent valuation, and offers an analysis which considers Legal, Technical, and Technology-Market …


Note: The Lesson Of Lopez: The Political Dynamics Of Federalism's Political Safeguards, Daniel Lyons Nov 2005

Note: The Lesson Of Lopez: The Political Dynamics Of Federalism's Political Safeguards, Daniel Lyons

Daniel Lyons

No abstract provided.


Coddling Spies: Why The Law Doesn’T Adequately Address Computer Spyware, Alan F. Blakley, Daniel B. Garrie, Matthew J. Armstrong Nov 2005

Coddling Spies: Why The Law Doesn’T Adequately Address Computer Spyware, Alan F. Blakley, Daniel B. Garrie, Matthew J. Armstrong

Duke Law & Technology Review

Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another's computer to report a user's activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual's identity. Existing law does not address spyware adequately because authorization language, buried in "click-through" boilerplate, renders much of current law useless. …


The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai Nov 2005

The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai

ExpressO

This paper analyzes the policies and philosophy of punishment for computer crimes under the post-Sept. 11th regime. I argue that the judicial discourse represented in Mitra represents a willingness to use the Computer Fraud and Abuse Act to go after defendants that cause trouble with critical infrastructures, the so-called “domestic terrorist.” This is manifested in the levels of punishments for such offenses and calls into question whether the traditional theories of punishment are applicable. I argue that as a policy, it makes good sense but the hazy definitions of terrorism may present problems for its success, and instead an approach …


Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy Nov 2005

Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy

ExpressO

17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.

Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik Nov 2005

Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik

Research Collection Yong Pung How School Of Law

There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …


Understanding The Solution For Microsoft, Ivo T. Gico Oct 2005

Understanding The Solution For Microsoft, Ivo T. Gico

Ivo Teixeira Gico Jr.

Nesse artigo, o autor examinou a solução do caso da Microsoft, tentando responder as seguintes perguntas: Seria a Microsoft responsável pelo monopólio do mercado de sistemas operacionais e pela vinculação ilegal no mercado de navegadores? Qual seria a solução menos drástica e intrusiva que poderia solucionar todas as acusações? Teria o Judiciário encontrado uma solução equilibrada para criar a competção sem destruir a Microsoft? Que abordagem seria melhor?

In this paper, the author examines the issue of relief in the Microsoft case, trying to answer the following questions: Is Microsoft liable for monopolization on the operating system market and illegal …


Buggy Whips And Broadcast Flags: The Need For A New Politics Of Expression, Garrett Levin Oct 2005

Buggy Whips And Broadcast Flags: The Need For A New Politics Of Expression, Garrett Levin

Duke Law & Technology Review

In response to growing fears from the entertainment industry over online file-sharing of valuable content, the Federal Communications Commission ("FCC") enacted sweeping regulations over the production of electronic devices in the name of protecting digital television broadcasts. Although the FCC's "broadcast flag" regulation was struck down on jurisdictional grounds, Hollywood has not given up the push for strict control. If Hollywood successfully acquires broadcast flag protection there could be far-reaching implications for innovation and development of new digital technologies. While content providers have important reasons to protect copyrighted material, there is too much at stake to merely acquiesce to their …


Liability Under The Americans With Disabilities Act For Private Web Site Operators, Evgenia Fkiaras Oct 2005

Liability Under The Americans With Disabilities Act For Private Web Site Operators, Evgenia Fkiaras

Washington Journal of Law, Technology & Arts

The Americans with Disabilities Act of 1990 (“ADA”) is silent on the specific question of whether privately owned websites fall within its provisions. There is a circuit split on the issue, although the only case directly on point makes mandatory website compliance the exception rather than the rule. Nevertheless, given the direction that the law will probably head and the relative ease of making websites accessible to the group most in need—those who require the use of assistive technologies—it behooves businesses to construct or alter their websites to accommodate these individuals.


A New Weapon Against Piracy: Patent Protection As An Alternative Strategy For Enforcement Of Digital Rights, Dennis S. Fernandez, Matthew Chivvis, Mengfei Huang Oct 2005

A New Weapon Against Piracy: Patent Protection As An Alternative Strategy For Enforcement Of Digital Rights, Dennis S. Fernandez, Matthew Chivvis, Mengfei Huang

ExpressO

This article illustrates how patents and copyrights complement each other to provide a better defense for creative works. Copyrights protect expression, and patents protect underlying functions. Currently, the one-time strengths of copyrights are being eroded as courts allow new technologies to flourish which enable digital reproduction and piracy. This has encouraged companies and industries to move increasingly to patent protection and any company that fails to pursue this trend may be left behind. In sum, patents are a worthwhile strategy because they assist copyright owners in controlling the technology that enables infringement while copyrights alone would leave a company vulnerable …


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Oct 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.


Who Owns The Cow When We Give Away The Milk For Free? Fair Use And The Protection Of Web-Posted Materials, Annie R. Lin Oct 2005

Who Owns The Cow When We Give Away The Milk For Free? Fair Use And The Protection Of Web-Posted Materials, Annie R. Lin

Buffalo Intellectual Property Law Journal

No abstract provided.


Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman Oct 2005

Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman

All Faculty Scholarship

While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …


Harry Potter And The Three-Second Crime: Are We Vanishing The De Minimis Defense From Copyright Law?, Julie Cromer Sep 2005

Harry Potter And The Three-Second Crime: Are We Vanishing The De Minimis Defense From Copyright Law?, Julie Cromer

ExpressO

No abstract provided.


Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt Sep 2005

Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt

ExpressO

What if science developed technology that would eliminate violent crime on American streets entirely, without jeopardizing civil liberties or personal privacy? This article describes such a scenario, and uses it to take a critical look at some of legal commentary claiming that Americans are bound to lose their rights and privacy if they fail to object to modern tools of domestic security. It concludes that those who have criticize modern scientific applications to the security challenge are overlooking well-established legal doctrines, based on eccentric fears of technology and the nation's law enforcers.


A Powers-Based Approach To Idea-Submission Law, Larissa Katz Sep 2005

A Powers-Based Approach To Idea-Submission Law, Larissa Katz

ExpressO

This paper provides a unified account of idea-submission law in terms of legal powers. It argues that the duty upon a recipient of a novel and original idea results from the exercise of a legal power that the law confers on originators in order to enable them to share their ideas selectively. This paper contributes to our understanding of idea-submission law and to private law theory more generally in a number of ways that have not been addressed in the literature. First, it systematically reveals the lack of fit between the case law and conventional legal theories for the protection …


The Pull Of Patents, Brett M. Frischmann Sep 2005

The Pull Of Patents, Brett M. Frischmann

ExpressO

The conventional view of the role of patents in the university research context (and more generally) is that patent-enabled exclusivity improves the supply-side functioning of markets for university research results (and inventions more generally) as well as those markets further downstream for derivative commercial end-products. The reward, prospect, and commercialization theories of patent law take patent-enabled exclusivity as the relevant means for fixing a supply-side problem—the undersupply of private investment in the production of patentable subject matter or in the development and commercialization of patentable subject matter that would occur in the absence of patent-enabled exclusivity. Put another way, patents …


Forty-Two: The Hitchhiker's Guide To Teaching Legal Research To The Google Generation, Ian Gallacher Sep 2005

Forty-Two: The Hitchhiker's Guide To Teaching Legal Research To The Google Generation, Ian Gallacher

ExpressO

Students are coming to law school increasingly dependent on computers to serve their research needs. And they expect that computerized legal research will be both more efficient and more effective than book-based research. These expectations place students in conflict with traditionalists who point to the inherent limitations of computer-assisted legal research and the dangers in relying on legal research conducted entirely in electronic databases. These traditionalists favor a “books first,” if not a “books only,” approach. This paper explores the cultural conflict between the traditionalists and the “Google generation,” evaluates the dangers associated with computer-assisted legal research, and proposes a …


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Sep 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Revolution has created the apparent anomaly that information, though very cheap to create and near costless to share, is managed by industries that are increasingly concentrated and roiled by endless legal warfare. This paper surveys the major legal battles by subjecting all of them to the familiar norm of "maximizing economic value added", as defined by neo-classical "welfare economics". The various legal wars are traced to defects and confusions in current legal approaches to intellectual property (the "property wars") and to antitrust doctrines (the "monopoly wars").


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori Sep 2005

A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori

Michigan Telecommunications & Technology Law Review

Because of the economics of online information, thousands who do not know each other can band together in hours, without previous organizational coordination or any persistent central coordination, to affect others and conform society to their idea of the social good. This changes the dynamic of political action and the ability of unaffiliated, lone individuals to respond to social acts where government and the market have not. Through ad hoc volunteerism, the Sinclair participants produced regulatory action against a private party with whom they were not transacting--because they believed government failed to do so. Although ad hoc volunteerism has received …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik Sep 2005

Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik

Research Collection Yong Pung How School Of Law

Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …


When Big Brother Privatizes: Commercial Surveillance, The Privacy Act Of 1974, And The Future Of Rfid, John M. Eden Aug 2005

When Big Brother Privatizes: Commercial Surveillance, The Privacy Act Of 1974, And The Future Of Rfid, John M. Eden

Duke Law & Technology Review

RFID is a powerful new technology that has the potential to allow commercial retailers to undermine individual control over private information. Despite the potential of RFID to undermine personal control over such information, the federal government has not enacted a set of practicable standards to ensure that personal data does not become widely misused by commercial entities. Although some potential privacy abuses could be addressed by modifying RFID technology, this iBrief argues that it would be wise to amend the Privacy Act of 1974 so that corporations would have a statutory obligation to preserve individual anonymity and respect the privacy …


Building Universal Digital Libraries: An Agenda For Copyright Reform , Hannibal B. Travis Aug 2005

Building Universal Digital Libraries: An Agenda For Copyright Reform , Hannibal B. Travis

ExpressO

This article proposes a series of copyright reforms to pave the way for digital library projects like Project Gutenberg, the Internet Archive, and Google Print, which promise to make much of the world’s knowledge easily searchable and accessible from anywhere. Existing law frustrates digital library growth and development by granting overlapping, overbroad, and near-perpetual copyrights in books, art, audiovisual works, and digital content. Digital libraries would benefit from an expanded public domain, revitalized fair use doctrine and originality requirement, rationalized systems for copyright registration and transfer, and a new framework for compensating copyright owners for online infringement without imposing derivative …


Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz Aug 2005

Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz

ExpressO

This article analyzes the US and Polish law on contract formation by electronic agents. It persents the main similarities and differences in the approaches of common and civil legal systems. Finally, it discusses changes in legal theories in Poland that had to be made in order to comply with standards of electronic commerce.


Looking For Sullivan In Cyberspace, Geoffrey A. Neri Aug 2005

Looking For Sullivan In Cyberspace, Geoffrey A. Neri

ExpressO

No abstract provided.


The World Summit On The Information Society: Making The Case For Private Industry Filtering To Control Extraterritorial Jurisdiction And Transnational Internet Censorship Conflicts, Jay Wahlquist Aug 2005

The World Summit On The Information Society: Making The Case For Private Industry Filtering To Control Extraterritorial Jurisdiction And Transnational Internet Censorship Conflicts, Jay Wahlquist

Brigham Young University International Law & Management Review

No abstract provided.