Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Law

Three Reactions To Mgm V. Grokster, Pamela Samuelson Oct 2006

Three Reactions To Mgm V. Grokster, Pamela Samuelson

Michigan Telecommunications & Technology Law Review

It was prescient of the Michigan Telecommunications and Technology Law Review to have organized a conference to discuss the Supreme Court's decision in Metro-Goldwyn-Mayer, Inc. v. Grokster, Inc. As the articles in this issue reveal, commentators have had somewhat mixed reactions to the Grokster decision. Perhaps I am the most mixed (or mixed up) about Grokster among its commentators, for I have had not just one but three reactions to the Grokster decision. My first reaction was to question whether MGM and its co-plaintiffs really won the Grokster case, or at least won it in the way they had hoped. …


File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber Oct 2006

File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber

Michigan Telecommunications & Technology Law Review

Much economic, political, judicial and legal attention has been showered on the significant changes currently taking place within the music production and distribution business forced by the use of the Internet for both file sharing (of unauthorized copyrighted material) and more recent online (legal) music distribution. The strong demand for music, coupled with the low cost of distributing illegal copies via peer-to-peer (P2P) systems, is unraveling the business model by which music has traditionally been created, developed, and distributed. Application of traditional copyright law has been ineffective in stopping the loss of business in the traditional channels. Producers have implemented …


The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher Oct 2006

The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher

Michigan Telecommunications & Technology Law Review

Google's major new initiative is to undertake the task of digitizing the world's collection of books so as to make them searchable. The very idea is audacious, but what is more so is that Google plans to copy without first seeking the permission of the owners of these works. Google Print would make available what is, by conventional measures at least, the highest grade of information--books produced by millions of the world's leading scholars. This is in stark contrast to the inconsistent quality spectrum one encounters through other online sources such as peer-to-peer networks and blogs, where there currently exists …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Oct 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

Michigan Telecommunications & Technology Law Review

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden Sep 2006

Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden

ExpressO

Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.

While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Interconnection Policy And Technological Progress, Gerald W. Brock Jun 2006

Interconnection Policy And Technological Progress, Gerald W. Brock

Federal Communications Law Journal

No abstract provided.


Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman Apr 2006

Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman

ExpressO

This paper calls for mandated “network neutrality,” the principle that broadband service providers (BSPs) should generally treat all nondestructive data equally. Without such a mandate, BSPs will likely begin charging content providers for the right to send data at the fastest speeds available. The present frequency with which BSPs block some data entirely will also likely increase.

Neutral networks are preferable for two key reasons. First, they spawn innovation, as illustrated by the explosive online innovation to date. Second, neutral networks better distribute communication power, promoting First Amendment values. Extant and likely future acts of discrimination erode both goals. The …


Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison Apr 2006

Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison

Indiana Law Journal

No abstract provided.


The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger Apr 2006

The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger

Law Faculty Scholarly Articles

The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and the accompanying disappearance of rational justifications …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes Apr 2006

Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes

Faculty Scholarship

The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …


Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal Mar 2006

Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal

ExpressO

Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …


Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton Mar 2006

Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton

ExpressO

This paper first describes the various mechanical aspects of Internet gambling, and then reviews the U.S. criminal laws that apply to gambling conducted online. As part of this review, several criminal and civil cases involving Internet gambling activities are discussed. Lastly, how the rapidly changing gambling landscape in the United States and the world may effect future federal lawmaking efforts for controlling Internet gambling is considered.


Regulatory Status Of Voip In The Post-Brand X World, Jerry Ellig Mar 2006

Regulatory Status Of Voip In The Post-Brand X World, Jerry Ellig

ExpressO

During the past several years, the Federal Communications Commission has engaged in a series of rulemakings to determine the regulatory status of Voice over Internet Protocol (VoIP). The Supreme Court’s Brand X decision clarifies that even if the FCC’s determination conflicts with that of a court, the FCC’s judgment holds sway as long as the decision is reasonable. We believe that VoIP should be classified as an information service, rather than a telecommunications service, for several reasons. First, the Internet Protocol nature of VoIP technology means that it functions like an information service, rather than a telecommunications service. Second, in …


Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes Jan 2006

Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes

University of Michigan Journal of Law Reform

In its 2003 media ownership proceedings, the FCC relied on the existence of the Internet to provide justification for radically relaxing the FCC ownership rules. These rules limited the national audience reach of the broadcast licensees and the cross-ownership of different media properties by broadcasters and newspapers. In relaxing these rules, the FCC failed to recognize that a media submarket for African Americans and Latinos/as existed. This separate market is evidenced by the different television viewing habits of African Americans and Latinos/as as compared to Whites and Billboard magazine's delineation of R&B/urban music radio stations as a separate radio station …


Internet Cookies: When Is Permission Consent?, Max Oppenheimer Jan 2006

Internet Cookies: When Is Permission Consent?, Max Oppenheimer

All Faculty Scholarship

No abstract provided.


Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski Jan 2006

Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski

Aaron K. Perzanowski

This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment. The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …


Digital Copyright, Jessica D. Litman Jan 2006

Digital Copyright, Jessica D. Litman

Books

In 1998, copyright lobbyists succeeded in persuading Congress to enact laws greatly expanding copyright owners' control over individuals' private uses of their works. The efforts to enforce these new rights have resulted in highly publicized legal battles between established media and new upstarts.

In this book, law professor Jessica Litman questions whether copyright laws crafted by lawyers and their lobbyists really make sense for the vast majority of us. Should every interaction between ordinary consumers and copyright-protected works be restricted by law? Is it practical to enforce such laws, or expect consumers to obey them? What are the effects of …


Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer Jan 2006

Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer

Cleveland State Law Review

This Symposium focuses in part on the ideas of Margaret Jane Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems …


Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer Jan 2006

Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer

Faculty Publications

Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …


Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer Jan 2006

Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David R. Barnhizer

Law Faculty Articles and Essays

This Symposium focuses in part on the ideas of Margaret Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems through …


A Comment On Information Propertization And Its Legal Milieu, Margaret Jane Radin Jan 2006

A Comment On Information Propertization And Its Legal Milieu, Margaret Jane Radin

Cleveland State Law Review

My main purpose in this essay is to urge that policy arguments about property in the digital environment take explicit cognizance of other policy considerations that tend to bound propertization: contractual ordering, competition, and freedom of expression. These policy considerations form the legal milieu in which propertization is situated.


Rankings, Reductionism, And Responsibility , Frank Pasquale Jan 2006

Rankings, Reductionism, And Responsibility , Frank Pasquale

Cleveland State Law Review

After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …


Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski Jan 2006

Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron Perzanowski

Articles

This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment.

The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …


The World Trade Law Of Censorship And Internet Filtering, Tim Wu Jan 2006

The World Trade Law Of Censorship And Internet Filtering, Tim Wu

Faculty Scholarship

Consider the following events, all from the last five years: (1) An American newsmagazine, Barron's, posts an unflattering profile of an Australian billionaire named Joseph Gutnick on its web site – the publisher, Dow Jones, Inc., is sued in Australia and forced to settle; (2) Mexico's incumbent telephone company, Telmex, blocks Mexicans from reaching the web site of the Voice-over-IP firm Skype; (3) the United States begins a major crackdown on web gambling services, causing serious economic damage to several small Caribbean economies; (4) the Chinese government prevents its citizens from using various foreign Internet services, including foreign e-mail and …


Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu Jan 2006

Network Neutrality: Competition, Innovation, And Nondiscriminatory Access, Tim Wu

Faculty Scholarship

The best proposals for network neutrality rules are simple. They ban abusive behavior like tollboothing and outright blocking and degradation. And they leave open legitimate network services that the Bells and Cable operators want to provide, such as offering cable television services and voice services along with a neutral internet offering. They are in line with a tradition of protecting consumer's rights on networks whose instinct is just this: let customers use the network as they please. No one wants to deny companies the right to charge for their services and charge consumers more if they use more. But what …


Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain Dec 2005

Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain

Jonathan Zittrain

We assess the impact of spam that touts stocks upon the trading activity of those stocks and sketch how profitable such spamming might be for spammers and how harmful it is to those who heed advice in stock-touting e-mails. We find convincing evidence that stock prices are being manipulated through spam. We suggest that the effectiveness of spammed stock touting calls into question prevailing models of securities regulation that rely principally on the proper labeling of information and disclosure of conflicts of interest as means of protecting consumers, and we propose several regulatory and industry interventions. Based on a large …


The Blogosphere And The New Pamphleteers, Donald J. Kochan Dec 2005

The Blogosphere And The New Pamphleteers, Donald J. Kochan

Donald J. Kochan

The future of the free dissemination of information lies in the blog, some may say. The internet has entirely transformed how we receive and consume information. It’s the newest incarnation of information dissemination. From the insights of Alexis de Tocqueville, “Feelings and opinions are recruited, the heart is enlarged, and the human mind is developed only by the reciprocal influence of men upon one another.” Bloggers are a powerful force in the distribution of information and ideas and the creation of communities of conversation. Throughout history, the dissemination of information, news, opinions, and ideas has continuously transformed. In the 18th …