Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2007

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 164

Full-Text Articles in Law

Zoning The Internet: A New Approach To Protecting Children Online, Cheryl B. Preston Dec 2007

Zoning The Internet: A New Approach To Protecting Children Online, Cheryl B. Preston

BYU Law Review

This Article considers how Internet architecture can be harnessed to create an online environment where government regulation of material harmful to minors can be effective but not unreasonably burdensome. It proposes a solution that engages technology in refocusing the point of regulation, thereby reducing the burden on speech and increasing the ability to achieve constitutionally recognized governmental objectives. This Article briefly examines failed congressional attempts to restrict children's access to sexually explicit content online, and then introduces the Internet Community Ports Concept, which relies on channeling technology to divide kinds of content among various Internet ports. After briefly outlining ...


Making Family-Friendly Internet A Reality: The Internet Community Ports Act, Dawn C. Nunziato Dec 2007

Making Family-Friendly Internet A Reality: The Internet Community Ports Act, Dawn C. Nunziato

BYU Law Review

No abstract provided.


Technology And Pornography, Arnold H. Loewy Dec 2007

Technology And Pornography, Arnold H. Loewy

BYU Law Review

No abstract provided.


A New First Amendment Model For Evaluating Content-Based Regulation Ofinternet Pornography: Revising The Strict Scrutiny Model To Better Reflect The Realities Of The Modern Media Age, Mark S. Kende Dec 2007

A New First Amendment Model For Evaluating Content-Based Regulation Ofinternet Pornography: Revising The Strict Scrutiny Model To Better Reflect The Realities Of The Modern Media Age, Mark S. Kende

BYU Law Review

No abstract provided.


Www.Sam·S_Stationery_And_Luncheonette.Com: Bringing Ginsberg V. New York Into The Internet Age, John Fee Dec 2007

Www.Sam·S_Stationery_And_Luncheonette.Com: Bringing Ginsberg V. New York Into The Internet Age, John Fee

BYU Law Review

No abstract provided.


Obscenity And The World Wide Web, John E. Fee Dec 2007

Obscenity And The World Wide Web, John E. Fee

BYU Law Review

No abstract provided.


Introduction To The 2007 Byu Law Review Symposium: Warning! Kids Online: Pornography, Free Speech, And Technology, Cheryl B. Preston Dec 2007

Introduction To The 2007 Byu Law Review Symposium: Warning! Kids Online: Pornography, Free Speech, And Technology, Cheryl B. Preston

BYU Law Review

No abstract provided.


Regulating Internet Pornography Aimed At Children: A Comparative Constitutional Perspective On Passing The Camel Through The Needle's Eye, Kevin W. Saunders Dec 2007

Regulating Internet Pornography Aimed At Children: A Comparative Constitutional Perspective On Passing The Camel Through The Needle's Eye, Kevin W. Saunders

BYU Law Review

No abstract provided.


Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan Dec 2007

Rethinking The Communications Decency Act: Eliminating Statutory Protections Of Discriminatory Housing Advertisements On The Internet, James D. Shanahan

Federal Communications Law Journal

The recent decision in Craigslist signals a drastic reduction in the effectiveness of the prohibition on discriminatory housing advertisements under the Fair Housing Act ("FHA"). Section 230 of the Communications Decency Act gives blanket immunity to Internet Content Providers from publisher liability for content originating from third parties. One of the effects of this immunity is the creation of a monopoly for discriminatory advertisements otherwise proscribed by the FHA. This Note argues that the simplest solution for Congress is to adjust the language of § 230 by adding the FHA to the list of exceptions to statutory immunity.


Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone Nov 2007

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Electronic Data: A Commentary On The Law In Virginia In 2007, Hon. Thomas D. Horne Nov 2007

Electronic Data: A Commentary On The Law In Virginia In 2007, Hon. Thomas D. Horne

University of Richmond Law Review

No abstract provided.


Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono Nov 2007

Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono

San Diego International Law Journal

Part I of this comment will examine the history and application of freedom of expression in Japanese case law and the evolution of the public welfare concept and its circumscribing effect on individual freedoms. Part II will explore the recent local regulatory efforts and the historical underpinnings for these laws that place restrictions on materials to children. Part III will compare the Japanese legislative endeavors with their American counterparts and highlight the reasons why United States laws will continue to be struck down by courts. Part IV will analyze the response of the video game industry to the onslaught of ...


Net Neutrality: An International Policy For The United States, Frederick W. Pfister Nov 2007

Net Neutrality: An International Policy For The United States, Frederick W. Pfister

San Diego International Law Journal

Consider this scenario: Alex and John still are avid video game players and play hours a day, each connecting from the same town through different ISPs. However, since it is a peak Internet traffic time, it may be difficult for them to play. While Alex has the "Diamond" package from his ISP that ensures he has guaranteed high-bandwidth connection, John's ISP does not offer anything other than regular residential service. John must compete with everyone else in his local area for bandwidth, including a few who constantly watch high-definition video-on-demand and subsequently constrain bandwidth for other users. Would it ...


Introduction To The 2007 Editors’ Symposium: Informational Privacy: Philosophical Foundations And Legal Implications, Larry Alexander Nov 2007

Introduction To The 2007 Editors’ Symposium: Informational Privacy: Philosophical Foundations And Legal Implications, Larry Alexander

San Diego Law Review

The outstanding collection of articles and comments thereon that follows this Introduction constitutes the 2007 Editors' Symposium of the San Diego Law Review. This year's theme is: "Informational Privacy: Philosophical Foundations and Legal Implications."


The Human Right To Privacy, James Griffin Nov 2007

The Human Right To Privacy, James Griffin

San Diego Law Review

To say much of interest about a particular human right, we have to know its content. So we have to know how to decide its content. That is where I shall start.


Does Warrantless Wiretapping Violate Moral Rights?, Evan Tsen Lee Nov 2007

Does Warrantless Wiretapping Violate Moral Rights?, Evan Tsen Lee

San Diego Law Review

The controversy over the Bush Administration's warrantless wiretapping program will not disappear any time soon. Legislators, policymakers, and academics should be thinking about whether and under what circumstances such surveillance should be illegal. A major factor in that decision is the moral status of such wiretapping. This essay, written for a symposium on moral rights to informational privacy, argues that two key determinants in the morality of warrantless wiretapping are (1) whether the subjects of the surveillance are known terrorists; and (2) whether the wiretapping is part of a pre-emptive surveillance program, or instead whether government operatives actually know ...


"I'Ve Got Nothing To Hide" And Other Misunderstandings Of Privacy, Daniel J. Solove Nov 2007

"I'Ve Got Nothing To Hide" And Other Misunderstandings Of Privacy, Daniel J. Solove

San Diego Law Review

In this short Article, written for a symposium in the San Diego Law Review, Professor Daniel Solove examines the nothing to hide argument. When asked about government surveillance and data mining, many people respond by declaring: "I've got nothing to hide." According to the nothing to hide argument, there is no threat to privacy unless the government uncovers unlawful activity, in which case a person has no legitimate justification to claim that it remain private. The nothing to hide argument and its variants are quite prevalent, and thus are worth addressing. In this essay, Solove critiques the nothing to ...


The Right To Privacy Unveiled, Samuel C. Rickless Nov 2007

The Right To Privacy Unveiled, Samuel C. Rickless

San Diego Law Review

The purpose of this Article is to bring order to this theoretical chaos. In my view, none of these accounts of the right to privacy is accurate. As I will argue, we are better served by a completely different theoretical description of the relevant right. It is my hope that greater philosophical clarity in this area of ethics will lead to a more careful appreciation of the value of the right to privacy, as well as legislation and judicial reasoning that is more carefully crafted to protect against violations of the right. This Article is organized as follows: In Part ...


Some Questions For The Barrier Theory, Alan Rubel Nov 2007

Some Questions For The Barrier Theory, Alan Rubel

San Diego Law Review

Having set out the basics, Rickless considers several questions one might pose for the Barrier Theory. For example, must the barrier be solid? No. Must the barrier be erected by, rather than merely used by, the rightholder? No. Must the barrier be morally permissible in the first instance? No. While Rickless's answers seem correct, I think that they raise some concerns about the Barrier Theory.


Toward Informational Privacy Rights, Adam D. Moore Nov 2007

Toward Informational Privacy Rights, Adam D. Moore

San Diego Law Review

In this paper I will offer several arguments in support of the view that individuals have moral claims to control personal information. Coupled with rights to control access to one's body, capacities, and powers, or physical privacy rights, we will have taken important steps toward a general right to privacy. In Part I, a definition of privacy is offered along with an account of the value of privacy. Simply put, privacy - defined as control over access to locations and information - is necessary for human well-being. In Part II, an attempt to move beyond claims of value to claims of ...


Separation, Risk, And The Necessity Of Privacy To Well-Being: A Comment On Adam Moore's Toward Informational Privacy Rights, Kenneth Einar Himma Nov 2007

Separation, Risk, And The Necessity Of Privacy To Well-Being: A Comment On Adam Moore's Toward Informational Privacy Rights, Kenneth Einar Himma

San Diego Law Review

In this Article, I want to raise doubts about certain of Moore's premises in his argument defending information privacy rights. As always and I say this as a continuing admirer of his skill as a philosopher, information theorist, and legal theorist his argument is well thought out and persuasively written. But, as we will see, there are serious problems with each major plank of his schema for justifying privacy rights.


Privacy Versus Security: Why Privacy Is Not An Absolute Value Or Right, Kenneth Einar Himma Nov 2007

Privacy Versus Security: Why Privacy Is Not An Absolute Value Or Right, Kenneth Einar Himma

San Diego Law Review

In this Article, I consider the scope of this right to informational privacy relative to our interests in security and argue, in particular, that the right to privacy must yield to these interests in the case of a direct conflict. I offer arguments from a number of different perspectives. I will, for example, begin with a case directly rooted in what I take to be ordinary case intuitions and then continue with an argument grounded in the distinction between intrinsic and instrumental value, which is thought to serve as a rough mark between what is important from a moral point ...


Claims To Privacy And The Distributed Value View, Alan Rubel Nov 2007

Claims To Privacy And The Distributed Value View, Alan Rubel

San Diego Law Review

This Article is organized as follows. In Part II, I briefly explain my view of what privacy is - the particularized judgment account. I then turn to the question of privacy - value in Part III, where I examine several views prominent in the literature. In Part IV, I outline my view of privacy's value. I argue that, at its strongest, privacy has constitutive value, which is to say that privacy is a constituent part of intrinsically valuable states of affairs. However, in many cases, privacy's value is not morally weighty. Unlike other goods to which privacy is compared, I ...


The Structure Of Search Engine Law, James Grimmelmann Nov 2007

The Structure Of Search Engine Law, James Grimmelmann

Cornell Law Faculty Publications

Search engines are the new linchpins of the Internet, and a new body of law - search engine law - will increasingly determine the shape of the Internet. Making sensible search policy requires a clear understanding of how search works, what interests are at stake, and what legal questions intersect at search. This article offers the first comprehensive overview of search engine law, which it organizes into a systematic taxonomy. It then demonstrates the dense legal interrelationships created by search by discussing a series of important themes in search engine law, each of which cuts across many doctrinal areas.


"Can I See Some Id?" Age Verification Requirements For The Online Liquor Store, Boris Reznikov Oct 2007

"Can I See Some Id?" Age Verification Requirements For The Online Liquor Store, Boris Reznikov

Washington Journal of Law, Technology & Arts

Teenagers are starting to use the Internet to circumvent the ordinarily stringent restrictions on the sale of alcohol to underage individuals. Since states have always punished vendors for furnishing alcohol to minors, companies that choose to sell alcohol online must recognize that they could be criminally and civilly liable if they do not take reasonable precautions to ensure that minors do not obtain their product. This Article examines the steps online alcohol vendors might take in order to protect themselves from liability so that they can continue to run their ventures in a profitable manner.


The Genographic Project: Traditional Knowledge And Population Genetics, Matthew Rimmer Oct 2007

The Genographic Project: Traditional Knowledge And Population Genetics, Matthew Rimmer

Matthew Rimmer

This article considers the debate over patent law, informed consent, and benefit-sharing in the context of biomedical research in respect of Indigenous communities. In particular, it focuses upon three key controversies over large-scale biology projects, involving Indigenous populations. These case studies are representative of the tensions between research organisations, Indigenous communities, and funding agencies. Section two considers the aims and origins of the Human Genome Diversity Project, and criticisms levelled against the venture by Indigenous peak bodies and anti-biotechnology groups, such as the Rural Advancement Foundation International. It examines the ways in which the United Nations Educational, Scientific, and Cultural ...


Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang Aug 2007

Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


An Overview Of The Broadband Market In Thailand, Tanit Follett Aug 2007

An Overview Of The Broadband Market In Thailand, Tanit Follett

Tanit Follett, J.S.D.

Thailand’s telecommunications sector is not fully transformed from monopolistic telecommunications markets into competitive one. The establishment of National Telecommunications Commission (“NTC”), an independent telecommunications regulatory agency, in 2004 has brought about the goal of creating a level-playing competition among incumbents: state enterprises, concessionaires, and new entrants. However, it becomes more challenging for NTC to achieve that goal when the concession agreement still exists. This fundamental problem has a direct impact on residential broadband Internet access as its system architecture relies heavily on fixed-line telecommunications network. The lack of enforcement by regulator and uncompromising attitudes between state enterprises and concessionaires ...


The Adverse Economic Effects Of Spectrum Set-Asides, Robert W. Crandall, Allan T. Ingrahm Aug 2007

The Adverse Economic Effects Of Spectrum Set-Asides, Robert W. Crandall, Allan T. Ingrahm

Canadian Journal of Law and Technology

In February 2007, Industry Canada released a consultation that outlined a proposed auction design for spectrum Ifor Advanced Wireless Services. As part of its consultation, Industry Canada contemplated a spectrum set-aside in the AWS auction to facilitate the entry of a new wireless service provider in Canada; however, it noted that a potential drawback of a spectrum set-aside is that it can induce uneconomic entry into the market. In this paper, we show that a set-aside for AWS spectrum in Canada is more likely to result in uneconomic entry than in a viable domestic entrant into the Canadian wireless industry ...


You Must Remember This: The Copyright Conundrum Of "Translation Memory" Databases, Francie Gow Aug 2007

You Must Remember This: The Copyright Conundrum Of "Translation Memory" Databases, Francie Gow

Canadian Journal of Law and Technology

Translation memory databases (compilations of texts linked with their translations) can be valuable resources in the process of translating subsequent texts. This article explores the circumstances under which such compilations might be considered sufficiently original to attract copyright protection that is independent of any copyright already subsisting in the underlying translations and source texts. Various characteristics of the tools and the translation industry in general make the analysis highly fact-specific; whether particular translation memory databases attract protection, and, if so, who can claim to be their ‘‘authors’’, must be evaluated on a case-by-case basis. Any protection that is granted may ...