Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2006

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 199

Full-Text Articles in Law

Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers Aug 2006

Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers

ExpressO

The copyright fair use doctrine is a key to increasing access to knowledge and decreasing the digital divide between information-rich and information-poor countries. Publishers have sued Google for copyright infringement for scanning the copyrighted books of the publishers into a digital database, so Google users can search the database for certain words to determine what books contain words of interest to the user. The Google litigation, however, is only a small piece of the larger access to knowledge puzzle. The larger issue is access to the books themselves, translated into the native languages of citizens of developing countries. Yet copyright …


Law And The Science Of Networks: An Overview And An Application To The "Patent Explosion", Katherine J. Strandburg Aug 2006

Law And The Science Of Networks: An Overview And An Application To The "Patent Explosion", Katherine J. Strandburg

ExpressO

The network may be the metaphor of the present era. A network, consisting of “nodes” and “links,” may be a group of individuals linked by friendship; a group of computers linked by network cables; a system of roads or airline flights -- or another of a virtually limitless variety of systems of connected “things.” The past few years have seen an explosion of interest in “network science,” which seeks to move beyond metaphor to analysis in fields from physics to sociology. Network science highlights the role of relationship patterns in determining collective behavior. It underscores and begins to address the …


Don't Send That E-Mail To A Minor!: Compliance With State Child Protection Registry Statutes, Laura Dunlop Aug 2006

Don't Send That E-Mail To A Minor!: Compliance With State Child Protection Registry Statutes, Laura Dunlop

Washington Journal of Law, Technology & Arts

In July of 2004, Michigan and Utah enacted child protection registry laws that prohibit businesses from sending e-mail advertisements for certain types of goods and services to “contact points” (e.g. individual or school e-mail domains) listed on registries maintained by each state. The prohibited goods and services include alcohol, tobacco, pornography, and illegal drugs. This Article summarizes these statutes and provides guidance to businesses concerning statutory compliance. The Article also highlights certain concerns about the scope and ambiguities in the statutory language. Despite ongoing debate surrounding these statutes, companies that choose to market via the Internet must understand their statutory …


Regulating Evolution For Sale: An Evolutionary Biology Model For Regulating The Unnatural Selection Of Genetically Modified Organisms, Mary Jane Angelo Aug 2006

Regulating Evolution For Sale: An Evolutionary Biology Model For Regulating The Unnatural Selection Of Genetically Modified Organisms, Mary Jane Angelo

ExpressO

In the past ten years there has been an explosion in the genetic manipulation of living organisms to create commercial products. This genetic manipulation has, in effect, been a directed change in the evolutionary process for the purpose of profit. This deliberate alteration of the path of evolution has brought with it a panoply of novel environmental, human health, and economic risks that could not have been foreseen when U.S. environmental and health protection laws evolved. Many products of genetic engineering have been modified to possess traits that increase their ability to reproduce and survive in the environment. By genetically …


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


Five Recommendations To Law Schools Offering Legal Instruction Over The Internet, Daniel C. Powell Aug 2006

Five Recommendations To Law Schools Offering Legal Instruction Over The Internet, Daniel C. Powell

ExpressO

This article addresses the emerging market for legal distance education. The market is being driven by recent changes in ABA regulations, as well as specialization in the curriculum, and expanding costs of traditional education. We are seeing the emergence of legal distance education consortiums, which offer a platform for the trading or selling of courses and programs.

However, much skepticism remains about the ability of distance education technology to offer law schools and law students a sufficiently interactive pedagogy. In the words of Supreme Court Justice Ruth Bader Ginsburg legal education is a “shared enterprise, a genuine interactive endeavor” that …


In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Aug 2006

In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

ExpressO

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Defining Fair Use In The Digital Era, Joseph James Raffetto Aug 2006

Defining Fair Use In The Digital Era, Joseph James Raffetto

ExpressO

The increasing prevalence of technology, and the ease with which the public and companies can reproduce, recombine, and reuse copyrighted works, has rendered the once-confusing fair use doctrine a virtual uncertainty. Given limited congressional guidance, courts have relied heavily on the secondary use’s potential effect on the market for the original work. While this reliance is based on the valid concern of maintaining adequate creative incentives, the enormous growth of licensing markets has resulted in an overemphasis on economic concerns. Recent court decisions indicate that fair use now turns not on the protection of creative incentives, but rather the preservation …


Copyright Distributive Injustice, Daniel Benoliel Aug 2006

Copyright Distributive Injustice, Daniel Benoliel

ExpressO

By design, copyright is a legal field that is not distinctively designed for redistribution. And yet, numerous fairness scholars and other critics of the economics paradigm quite markedly argue that copyright law should be based upon some measure of distribution, not efficiency.

This essay argues that copyright law should not promote distributive justice concerns, subject to narrow exceptions and that other more efficient law such as taxation and welfare laws should do that instead. It does so in accordance to the prevailing welfare economics interpretative approach to copyright jurisprudence, with emphasis on the latest Peer-to-Peer (P2P) file sharing litigation.

It …


The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer Aug 2006

The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer

Canadian Journal of Law and Technology

This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.


Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds Aug 2006

Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds

Canadian Journal of Law and Technology

This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …


Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland Aug 2006

Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland

Canadian Journal of Law and Technology

This article examines podcasting and its specific characteristics to see, first, where it fits within Canada’s copyright law, and second, how the licensing regime for musical works in Canada applies to podcasting. The discussion next turns to whether or not the current licensing regime for podcasting is desirable in light of the purpose of copyright in Canada, and with a view to the various interests at stake: those of artists, in being paid, and those of society, in enabling podcasters to access material in order to produce their work. An examination of the current and proposed licensing regime and its …


Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald Aug 2006

Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald

Canadian Journal of Law and Technology

This paper argues that Canadian courts can, and should, adopt electronic trespass as a viable cause of action for the protection of property rights on the Internet. Of course, this conclusion presupposes that property rights in fact exist on the Internet. While American courts have accepted the existence of property rights on the Internet without any real controversy, a significant body of criticism has developed around American jurisprudence. Part III examines the critiques levelled against the assumption of property rights inherent in electronic trespass, and argues that there are property rights that need to be protected on the Internet. Part …


Why It Is Time To Eliminate Genomic Patents, Together With Natural Extracts Doctrine That Have Supported Such Patents, Allen K. Yu Jul 2006

Why It Is Time To Eliminate Genomic Patents, Together With Natural Extracts Doctrine That Have Supported Such Patents, Allen K. Yu

ExpressO

The constitutional purpose of intellectual property is to “promote the progress of science and useful arts.” Given the utilitarian basis of patents, it is critical that policies and laws must be continually adjusted to reflect the needs of new technologies. When the law tries to shield itself from rather than confront the realities of underlying technologies, patents end up actually subverting rather than promote technological progress. This paper explores why the natural extracts doctrine belongs to the class of doctrines that subvert progress. The doctrine, established over a century ago to enable the patenting of purified compounds for use as …


Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel Jul 2006

Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel

ExpressO

Briefly, the article proposes to have courts focus on the nature of an individual's use and apply the "UART" (Use As a Research Tool) factors to determine if a patented invention is being used as a research tool. If a patented invention is being used as a research tool, then the court is to presume that the activities are not covered by the FDA exemption. However, this presumption can be rebutted by a researcher's demonstration of the research tool owner using his patent to block efforts to develop a competing product. If the presumption is rebutted, then the court applies …


The End Of Net Neutrality, William G. Laxton Jr. Jul 2006

The End Of Net Neutrality, William G. Laxton Jr.

Duke Law & Technology Review

In 2005, the FCC changed the competitive landscape of the high-speed Internet access industry by classifying both DSL and cable modem service as "information services." While many hail this move as a victory for competition and free markets, others fear the ruling could jeopardize the future of the Internet. This iBrief examines the potential end of "net neutrality" and concludes that new federal regulations are unnecessary because antitrust laws and a competitive marketplace will provide consumers with sufficient protection.


Applying Tort Theory To Information Technology, Marvin L. Longabaugh Jul 2006

Applying Tort Theory To Information Technology, Marvin L. Longabaugh

ExpressO

In this article, I discuss the issue of whether torts attributable to Information Systems products, both hardware and software, should be subject to litigation as a contract action, a tort action, or both. I further suggest a protocol for attorneys and courts to consider when attempting to discern whether a particular cause of action is appropriate. Last, I briefly discuss whether the advent of certification programs for computer professionals should result in the courts reconsideration of the concept of computer malpractice.


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jul 2006

Primer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Memorias del Primer Congreso Nacional de Organismos Públicos Autonomos


A Technological Theory Of The Arms Race, Lee Kovarsky Jul 2006

A Technological Theory Of The Arms Race, Lee Kovarsky

Indiana Law Journal

Although the "technological arms race" has recently emerged as a vogue-ish piece of legal terminology, scholarship has quite conspicuously failed to explore the phenomenon systematically. What are "technological" arms races? Why do they happen? Does the recent spike in scholarly attention actually reflect their novelty? Are they always inefficient? How do they differ from military ones? What role can legal institutions play in slowing them down?

In this Article I seek to answer these questions. I argue that copyright enforcement and self-help represent substitutable tactics for regulating access to expressive assets, and that the efficacy of each tactic depends on …


Performing Rights Societies And The Digital Environment, Philippe Gilliéron Jun 2006

Performing Rights Societies And The Digital Environment, Philippe Gilliéron

ExpressO

No abstract provided.


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


The “Csi Effect”: Better Jurors Through Television And Science?, Michael D. Mann Jun 2006

The “Csi Effect”: Better Jurors Through Television And Science?, Michael D. Mann

ExpressO

This Comment discusses how television shows such as CSI and Law & Order create heightened juror expectations. This will be published in the Buffalo Public Interest Law Journal's 2005-2006 issue.


Access To Audiences As A First Amendment Right: Its Relevance And Implications For Electronic Media Policy, Philip M. Napoli, Sheea T. Sybblis Jun 2006

Access To Audiences As A First Amendment Right: Its Relevance And Implications For Electronic Media Policy, Philip M. Napoli, Sheea T. Sybblis

ExpressO

When the issue of speakers’ rights of access arises in media regulation and policy contexts, the focus typically is on the concept of speakers’ rights of access “to the media,” or “to the press.” This right usually is premised on the audience’s need for access to diverse sources and content. In contrast, in many non-mediated contexts, the concept of speakers’ rights of access frequently is defined in terms of the speaker’s own First Amendment right of access to audiences. This paper explores the important distinctions between these differing interpretations of a speaker’s access rights and argues that the concept of …


A Default-Logic Paradigm For Legal Reasoning And Factfinding, Vern R. Walker Jun 2006

A Default-Logic Paradigm For Legal Reasoning And Factfinding, Vern R. Walker

ExpressO

Unlike research in linguistics and artificial intelligence, legal research has not used advances in logical theory very effectively. This article uses default logic to develop a paradigm for analyzing all aspects of legal reasoning, including factfinding. The article provides a formal model that integrates legal rules and policies with the evaluation of both expert and non-expert evidence – whether the reasoning occurs in courts or administrative agencies, and whether in domestic, foreign, or international legal systems. This paradigm can standardize the representation of legal reasoning, guide empirical research into the dynamics of such reasoning, and put the representations and research …


Interconnection Policy And Technological Progress, Gerald W. Brock Jun 2006

Interconnection Policy And Technological Progress, Gerald W. Brock

Federal Communications Law Journal

No abstract provided.


Rivalrous Telecommunications Networks With And Without Mandatory Sharing, Thomas W. Hazlett Jun 2006

Rivalrous Telecommunications Networks With And Without Mandatory Sharing, Thomas W. Hazlett

Federal Communications Law Journal

No abstract provided.


'Wi-Fi'ght Them When You Can Join Them? How The Philadelphia Compromise May Have Saved Municipally-Owned Telecommunications Services, Adam Christensen Jun 2006

'Wi-Fi'ght Them When You Can Join Them? How The Philadelphia Compromise May Have Saved Municipally-Owned Telecommunications Services, Adam Christensen

Federal Communications Law Journal

When the Mayor of Philadelphia announced his plan to provide municipally sponsored Wi-Fi Internet access, Verizon, the incumbent telecommunications service provider organized lobbyists to block the plan. The compromise eventually struck between Pennsylvania municipalities and Verizon, which allows municipalities to offer telecommunications services after giving Verizon a right of first refusal has resulted in a certain degree of uncertainty in the future of municipally sponsored Internet access. This Note examines this compromise and argues that it represents an optimistic future for municipally sponsored telecommunications services. The Note first discusses the history of Wi-Fi technology and the development of the law …


What Does Granholm V. Heald Mean For The Future Of The Twenty-First Amendment, The Three-Tier System, And Efficient Alcohol Distribution?, Gregory E. Durkin Jun 2006

What Does Granholm V. Heald Mean For The Future Of The Twenty-First Amendment, The Three-Tier System, And Efficient Alcohol Distribution?, Gregory E. Durkin

Washington and Lee Law Review

No abstract provided.


The Problem Of Freedom Override By Digital Rights Management Technologies: The Market Mechanisms And Possible Legal Options, Yuko Noguchi May 2006

The Problem Of Freedom Override By Digital Rights Management Technologies: The Market Mechanisms And Possible Legal Options, Yuko Noguchi

ExpressO

One of the major problems of copyright regulations in the digital and network era is that the Digital Rights Management (DRM) technologies are overriding the freedom incorporated within the copyright regulations in the analog world. The override problem partly comes from the strict implementation of the DRM systems by the market, and partly from the anti-circumvention regulations that almost blindly protect such implementation. This research reviews the scope of anti-circumvention regulations by introducing Japanese regulations, which are rather modest, and by comparing with the U.S. regulations. It also extensively analyzes the market mechanisms that cause rather strict implementation of DRM …