Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- BLR (39)
- UIC School of Law (28)
- Schulich School of Law, Dalhousie University (17)
- New York Law School (9)
- Duke Law (8)
-
- Selected Works (8)
- University of Richmond (8)
- Washington and Lee University School of Law (6)
- University of Michigan Law School (5)
- University of Pennsylvania Carey Law School (5)
- Brigham Young University Law School (4)
- Santa Clara Law (4)
- University of Colorado Law School (4)
- University of Washington School of Law (4)
- Maurer School of Law: Indiana University (3)
- SelectedWorks (3)
- University of Pittsburgh School of Law (3)
- American University Washington College of Law (2)
- Seattle University School of Law (2)
- Singapore Management University (2)
- Syracuse University (2)
- University at Buffalo School of Law (2)
- Vanderbilt University Law School (2)
- Columbia Law School (1)
- Edith Cowan University (1)
- Georgetown University Law Center (1)
- Notre Dame Law School (1)
- Texas A&M University School of Law (1)
- University of Baltimore Law (1)
- University of Kentucky (1)
- Keyword
-
- Law and Technology (39)
- Intellectual Property Law (23)
- Internet (19)
- Science and Technology (19)
- Copyright (17)
-
- Computer Law (12)
- Law and Society (10)
- Law and Economics (9)
- Communications Law (8)
- Economics (8)
- Intellectual property (8)
- Fair use (7)
- Comparative and Foreign Law (6)
- Privacy (6)
- Administrative Law (5)
- Arts and Entertainment (5)
- Constitutional Law (5)
- Cyberspace (5)
- General Law (5)
- Information (5)
- International Law (5)
- International Trade (5)
- Legal History (5)
- Antitrust (4)
- Civil Rights and Discrimination (4)
- Conflict of laws (4)
- Consumer Protection Law (4)
- Corporations (4)
- Energy and Utilities Law (4)
- First Amendment (4)
- Publication
-
- ExpressO (37)
- UIC John Marshall Journal of Information Technology & Privacy Law (27)
- Canadian Journal of Law and Technology (17)
- Duke Law & Technology Review (8)
- Richmond Journal of Law & Technology (7)
-
- All Faculty Scholarship (6)
- Washington and Lee Law Review (6)
- NYLS Law Review (5)
- Articles & Chapters (4)
- Michigan Telecommunications & Technology Law Review (4)
- Articles (3)
- Faculty Publications (3)
- Faculty Scholarship (3)
- Federal Communications Law Journal (3)
- Publications (3)
- Brigham Young University International Law & Management Review (2)
- Daniel Lyons (2)
- Journal Articles (2)
- Research Collection Yong Pung How School Of Law (2)
- Rosetta Stone v. Google (Joint Appendix) (2)
- School of Information Studies - Faculty Scholarship (2)
- Seattle University Law Review (2)
- Washington Journal of Law, Technology & Arts (2)
- Washington Law Review (2)
- American University International Law Review (1)
- Articles in Law Reviews & Other Academic Journals (1)
- BYU Law Review (1)
- Brigham Young University Education and Law Journal (1)
- Buffalo Intellectual Property Law Journal (1)
- Dr. A.V Narsimha Rao (1)
- Publication Type
Articles 1 - 30 of 183
Full-Text Articles in Law
The Fight To Save America's Inbox: State Legislation And Litigation In The Wake Of Can-Spam, Emma Scanlan
The Fight To Save America's Inbox: State Legislation And Litigation In The Wake Of Can-Spam, Emma Scanlan
Washington Journal of Law, Technology & Arts
The fight to curb the ever-increasing amount of unsolicited commercial email or “spam” showing up in the inboxes of American businesses has generated both state and federal legislation. The CAN-SPAM Act of 2003 was enacted to create a bright-line between spam and legal commercial email. The Act preempted many state spam laws but also left significant enforcement abilities to the individual states. States that elect to create large civil damages for spam without criminalizing the transmission of unsolicited commercial email run the risk of winning cases where the damage awards are largely unenforceable and not effective deterrents to big-time spammers. …
An Analysis For The Valuation Of Venture Capital-Funded Startup Firm Patents, John Dubiansky
An Analysis For The Valuation Of Venture Capital-Funded Startup Firm Patents, John Dubiansky
ExpressO
In an era where forces such as the Bayh Dole act and the rise of the venture capital industry are reshaping the manner in which innovations are brought to market, the role of intellectual property in the financing of new ventures is becoming increasingly important. The investment community requires a better understanding of the risks of patent-based transactions as such deals become more prevalent. This paper addresses that need by explaining an analysis for the valuation of startup firm-held patents. The paper considers the commonly employed methods of patent valuation, and offers an analysis which considers Legal, Technical, and Technology-Market …
Note: The Lesson Of Lopez: The Political Dynamics Of Federalism's Political Safeguards, Daniel Lyons
Note: The Lesson Of Lopez: The Political Dynamics Of Federalism's Political Safeguards, Daniel Lyons
Daniel Lyons
No abstract provided.
Coddling Spies: Why The Law Doesn’T Adequately Address Computer Spyware, Alan F. Blakley, Daniel B. Garrie, Matthew J. Armstrong
Coddling Spies: Why The Law Doesn’T Adequately Address Computer Spyware, Alan F. Blakley, Daniel B. Garrie, Matthew J. Armstrong
Duke Law & Technology Review
Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another's computer to report a user's activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual's identity. Existing law does not address spyware adequately because authorization language, buried in "click-through" boilerplate, renders much of current law useless. …
The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai
The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai
ExpressO
This paper analyzes the policies and philosophy of punishment for computer crimes under the post-Sept. 11th regime. I argue that the judicial discourse represented in Mitra represents a willingness to use the Computer Fraud and Abuse Act to go after defendants that cause trouble with critical infrastructures, the so-called “domestic terrorist.” This is manifested in the levels of punishments for such offenses and calls into question whether the traditional theories of punishment are applicable. I argue that as a policy, it makes good sense but the hazy definitions of terrorism may present problems for its success, and instead an approach …
Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy
Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy
ExpressO
17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.
Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
ExpressO
This is a discussion of the legal and economic ramifications of password theft.
Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik
Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik
Research Collection Yong Pung How School Of Law
There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …
Understanding The Solution For Microsoft, Ivo T. Gico
Understanding The Solution For Microsoft, Ivo T. Gico
Ivo Teixeira Gico Jr.
Nesse artigo, o autor examinou a solução do caso da Microsoft, tentando responder as seguintes perguntas: Seria a Microsoft responsável pelo monopólio do mercado de sistemas operacionais e pela vinculação ilegal no mercado de navegadores? Qual seria a solução menos drástica e intrusiva que poderia solucionar todas as acusações? Teria o Judiciário encontrado uma solução equilibrada para criar a competção sem destruir a Microsoft? Que abordagem seria melhor?
In this paper, the author examines the issue of relief in the Microsoft case, trying to answer the following questions: Is Microsoft liable for monopolization on the operating system market and illegal …
Buggy Whips And Broadcast Flags: The Need For A New Politics Of Expression, Garrett Levin
Buggy Whips And Broadcast Flags: The Need For A New Politics Of Expression, Garrett Levin
Duke Law & Technology Review
In response to growing fears from the entertainment industry over online file-sharing of valuable content, the Federal Communications Commission ("FCC") enacted sweeping regulations over the production of electronic devices in the name of protecting digital television broadcasts. Although the FCC's "broadcast flag" regulation was struck down on jurisdictional grounds, Hollywood has not given up the push for strict control. If Hollywood successfully acquires broadcast flag protection there could be far-reaching implications for innovation and development of new digital technologies. While content providers have important reasons to protect copyrighted material, there is too much at stake to merely acquiesce to their …
Liability Under The Americans With Disabilities Act For Private Web Site Operators, Evgenia Fkiaras
Liability Under The Americans With Disabilities Act For Private Web Site Operators, Evgenia Fkiaras
Washington Journal of Law, Technology & Arts
The Americans with Disabilities Act of 1990 (“ADA”) is silent on the specific question of whether privately owned websites fall within its provisions. There is a circuit split on the issue, although the only case directly on point makes mandatory website compliance the exception rather than the rule. Nevertheless, given the direction that the law will probably head and the relative ease of making websites accessible to the group most in need—those who require the use of assistive technologies—it behooves businesses to construct or alter their websites to accommodate these individuals.
A New Weapon Against Piracy: Patent Protection As An Alternative Strategy For Enforcement Of Digital Rights, Dennis S. Fernandez, Matthew Chivvis, Mengfei Huang
A New Weapon Against Piracy: Patent Protection As An Alternative Strategy For Enforcement Of Digital Rights, Dennis S. Fernandez, Matthew Chivvis, Mengfei Huang
ExpressO
This article illustrates how patents and copyrights complement each other to provide a better defense for creative works. Copyrights protect expression, and patents protect underlying functions. Currently, the one-time strengths of copyrights are being eroded as courts allow new technologies to flourish which enable digital reproduction and piracy. This has encouraged companies and industries to move increasingly to patent protection and any company that fails to pursue this trend may be left behind. In sum, patents are a worthwhile strategy because they assist copyright owners in controlling the technology that enables infringement while copyrights alone would leave a company vulnerable …
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
ExpressO
The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.
Who Owns The Cow When We Give Away The Milk For Free? Fair Use And The Protection Of Web-Posted Materials, Annie R. Lin
Who Owns The Cow When We Give Away The Milk For Free? Fair Use And The Protection Of Web-Posted Materials, Annie R. Lin
Buffalo Intellectual Property Law Journal
No abstract provided.
Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman
Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman
All Faculty Scholarship
While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …
Harry Potter And The Three-Second Crime: Are We Vanishing The De Minimis Defense From Copyright Law?, Julie Cromer
Harry Potter And The Three-Second Crime: Are We Vanishing The De Minimis Defense From Copyright Law?, Julie Cromer
ExpressO
No abstract provided.
Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt
Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt
ExpressO
What if science developed technology that would eliminate violent crime on American streets entirely, without jeopardizing civil liberties or personal privacy? This article describes such a scenario, and uses it to take a critical look at some of legal commentary claiming that Americans are bound to lose their rights and privacy if they fail to object to modern tools of domestic security. It concludes that those who have criticize modern scientific applications to the security challenge are overlooking well-established legal doctrines, based on eccentric fears of technology and the nation's law enforcers.
A Powers-Based Approach To Idea-Submission Law, Larissa Katz
A Powers-Based Approach To Idea-Submission Law, Larissa Katz
ExpressO
This paper provides a unified account of idea-submission law in terms of legal powers. It argues that the duty upon a recipient of a novel and original idea results from the exercise of a legal power that the law confers on originators in order to enable them to share their ideas selectively. This paper contributes to our understanding of idea-submission law and to private law theory more generally in a number of ways that have not been addressed in the literature. First, it systematically reveals the lack of fit between the case law and conventional legal theories for the protection …
The Pull Of Patents, Brett M. Frischmann
The Pull Of Patents, Brett M. Frischmann
ExpressO
The conventional view of the role of patents in the university research context (and more generally) is that patent-enabled exclusivity improves the supply-side functioning of markets for university research results (and inventions more generally) as well as those markets further downstream for derivative commercial end-products. The reward, prospect, and commercialization theories of patent law take patent-enabled exclusivity as the relevant means for fixing a supply-side problem—the undersupply of private investment in the production of patentable subject matter or in the development and commercialization of patentable subject matter that would occur in the absence of patent-enabled exclusivity. Put another way, patents …
Forty-Two: The Hitchhiker's Guide To Teaching Legal Research To The Google Generation, Ian Gallacher
Forty-Two: The Hitchhiker's Guide To Teaching Legal Research To The Google Generation, Ian Gallacher
ExpressO
Students are coming to law school increasingly dependent on computers to serve their research needs. And they expect that computerized legal research will be both more efficient and more effective than book-based research. These expectations place students in conflict with traditionalists who point to the inherent limitations of computer-assisted legal research and the dangers in relying on legal research conducted entirely in electronic databases. These traditionalists favor a “books first,” if not a “books only,” approach. This paper explores the cultural conflict between the traditionalists and the “Google generation,” evaluates the dangers associated with computer-assisted legal research, and proposes a …
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
ExpressO
The Digital Revolution has created the apparent anomaly that information, though very cheap to create and near costless to share, is managed by industries that are increasingly concentrated and roiled by endless legal warfare. This paper surveys the major legal battles by subjecting all of them to the familiar norm of "maximizing economic value added", as defined by neo-classical "welfare economics". The various legal wars are traced to defects and confusions in current legal approaches to intellectual property (the "property wars") and to antitrust doctrines (the "monopoly wars").
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori
A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori
Michigan Telecommunications & Technology Law Review
Because of the economics of online information, thousands who do not know each other can band together in hours, without previous organizational coordination or any persistent central coordination, to affect others and conform society to their idea of the social good. This changes the dynamic of political action and the ability of unaffiliated, lone individuals to respond to social acts where government and the market have not. Through ad hoc volunteerism, the Sinclair participants produced regulatory action against a private party with whom they were not transacting--because they believed government failed to do so. Although ad hoc volunteerism has received …
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes
Michigan Telecommunications & Technology Law Review
The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …
Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik
Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik
Research Collection Yong Pung How School Of Law
Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …
When Big Brother Privatizes: Commercial Surveillance, The Privacy Act Of 1974, And The Future Of Rfid, John M. Eden
When Big Brother Privatizes: Commercial Surveillance, The Privacy Act Of 1974, And The Future Of Rfid, John M. Eden
Duke Law & Technology Review
RFID is a powerful new technology that has the potential to allow commercial retailers to undermine individual control over private information. Despite the potential of RFID to undermine personal control over such information, the federal government has not enacted a set of practicable standards to ensure that personal data does not become widely misused by commercial entities. Although some potential privacy abuses could be addressed by modifying RFID technology, this iBrief argues that it would be wise to amend the Privacy Act of 1974 so that corporations would have a statutory obligation to preserve individual anonymity and respect the privacy …
Building Universal Digital Libraries: An Agenda For Copyright Reform , Hannibal B. Travis
Building Universal Digital Libraries: An Agenda For Copyright Reform , Hannibal B. Travis
ExpressO
This article proposes a series of copyright reforms to pave the way for digital library projects like Project Gutenberg, the Internet Archive, and Google Print, which promise to make much of the world’s knowledge easily searchable and accessible from anywhere. Existing law frustrates digital library growth and development by granting overlapping, overbroad, and near-perpetual copyrights in books, art, audiovisual works, and digital content. Digital libraries would benefit from an expanded public domain, revitalized fair use doctrine and originality requirement, rationalized systems for copyright registration and transfer, and a new framework for compensating copyright owners for online infringement without imposing derivative …
Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz
Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz
ExpressO
This article analyzes the US and Polish law on contract formation by electronic agents. It persents the main similarities and differences in the approaches of common and civil legal systems. Finally, it discusses changes in legal theories in Poland that had to be made in order to comply with standards of electronic commerce.
Looking For Sullivan In Cyberspace, Geoffrey A. Neri
The World Summit On The Information Society: Making The Case For Private Industry Filtering To Control Extraterritorial Jurisdiction And Transnational Internet Censorship Conflicts, Jay Wahlquist
Brigham Young University International Law & Management Review
No abstract provided.