Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Columbia Law School (7)
- Santa Clara Law (6)
- Georgetown University Law Center (2)
- Singapore Management University (2)
- University of Maryland Francis King Carey School of Law (2)
-
- University of Pennsylvania Carey Law School (2)
- Boston University School of Law (1)
- Brooklyn Law School (1)
- Cornell University Law School (1)
- Duke Law (1)
- New York Law School (1)
- Notre Dame Law School (1)
- UIC School of Law (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Kentucky (1)
- University of Missouri School of Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Windsor (1)
- Washington University in St. Louis (1)
- William & Mary Law School (1)
- Keyword
-
- Internet (5)
- Google (4)
- Adwords (3)
- Network neutrality (3)
- Privacy (3)
-
- Cyberlaw (2)
- Cyberspace (2)
- Data privacy (2)
- European Union (2)
- Law (2)
- Rosetta Stone (2)
- SSRN (2)
- Technology (2)
- Telecommunications (2)
- Torts (2)
- Trademark (2)
- Trademarked terms (2)
- (TCP/IP) (1)
- (Transmission Control Protocol/Internet Protocol) (1)
- Abstention (1)
- Access (1)
- Adam Walsh Child Protection and Safety Act 2006 (1)
- Ads (1)
- Affiliates (1)
- Alasdair MacIntyre (1)
- American Society of International Law Proceedings (1)
- Antitrust (1)
- Asymmetrical information (1)
- At-will employment (1)
- Auctions (1)
- Publication
-
- Faculty Scholarship (12)
- Rosetta Stone v. Google (Joint Appendix) (5)
- Faculty Publications (3)
- All Faculty Scholarship (2)
- Georgetown Law Faculty Publications and Other Works (2)
-
- Research Collection Yong Pung How School Of Law (2)
- Articles (1)
- Articles & Chapters (1)
- Cornell Law Faculty Publications (1)
- Journal Articles (1)
- Law Faculty Scholarly Articles (1)
- Law Faculty Scholarship (1)
- Law Publications (1)
- Publications (1)
- Scholarship@WashULaw (1)
- UF Law Faculty Publications (1)
- UIC Law Open Access Faculty Scholarship (1)
Articles 1 - 30 of 37
Full-Text Articles in Law
Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone
Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
The Structure Of Search Engine Law, James Grimmelmann
The Structure Of Search Engine Law, James Grimmelmann
Cornell Law Faculty Publications
Search engines are the new linchpins of the Internet, and a new body of law - search engine law - will increasingly determine the shape of the Internet. Making sensible search policy requires a clear understanding of how search works, what interests are at stake, and what legal questions intersect at search. This article offers the first comprehensive overview of search engine law, which it organizes into a systematic taxonomy. It then demonstrates the dense legal interrelationships created by search by discussing a series of important themes in search engine law, each of which cuts across many doctrinal areas.
Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang
Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google
Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman
Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman
Faculty Publications
This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.
Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee
Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Cyber-Trespass And 'Unauthorized Access' As Legal Mechanisms Of Access Control: Lessons From The Us Experience, Mary W. S. Wong
Cyber-Trespass And 'Unauthorized Access' As Legal Mechanisms Of Access Control: Lessons From The Us Experience, Mary W. S. Wong
Research Collection Yong Pung How School Of Law
The common law doctrine of trespass to chattels has recently been revived and applied by courts in the United States (US) to cover intrusions (in the form of electronic signals) to computer systems connected to the Internet. These cases represent judicial recognition of the need to protect certain unwanted intrusions in cyberspace, though the principles developed therewith are remarkably expansive. As such, they overlap with the concept of ‘unauthorized access’ under computer misuse legislation in the US and elsewhere. This overlap has yet to be judicially acknowledged. Since the US, the United Kingdom and other common law countries not only …
Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina Mulligan
Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina Mulligan
Faculty Scholarship
No abstract provided.
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Law Faculty Scholarly Articles
This Article provides a timely examination of the European Union's approach to information privacy on the internet, an approach that some legal scholars have held up as a model for law reform in the United States. Building on the author's recent piece discussing the U.S. approach to internet privacy, this Article applies to the EU's internet privacy regime a theoretical framework constructed from the writings of philosopher and social theorist Alasdair MacIntyre on the failures of Enlightenment and post-Enlightenment thought. The EU internet privacy regime is shown to reflect and reinforce three key elements of the "post-Enlightenment paradigm," i.e., the …
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …
The Structure Of Search Engine Law, James Grimmelmann
The Structure Of Search Engine Law, James Grimmelmann
Faculty Scholarship
This Article provides a road map to issues of search engine law. It indicates what questions we must consider when thinking about search engines, and it indicates the interconnections among those questions. It does not endorse any particular normative framework for search. Nor does it recommend who should regulate search. Instead, it provides the necessary foundation for informed decision-making, by whatever regulator and whatever its normative approach.
Part I will explain how modern search engines function and describe the business environment within which they operate. Search engine operations can be understood in terms of the information flows among four principal …
Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long
Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long
UIC Law Open Access Faculty Scholarship
Cyberspace is often a battlefield with a wide array of armies posed to challenge one another across the increasing array of rhetoric and technology that has made it such a potent arena for global digital commerce. Perry Barlow's infamous demand that cyberspace be left to its own devices because of its unique unregulated nature may have been answered by Larry Lessig's reply that code may in fact be used to regulate cyberspace, but the reality is that social norming demands, the evanescence of technological controls, and the perceived utility of illicit conduct utilizing the internet make any regulation problematic at …
The Dutch Auction Myth, Peter B. Oh
The Dutch Auction Myth, Peter B. Oh
Articles
The bursting of the internet bubble continues to have ripple effects on the initial public offering (IPO) process. Critics of this process have fashioned a complex set of interconnected objections to the orthodox bookbuilding method for conducting IPOs, pricing shares, and allocating them to preferred investors. Critics instead hail online reverse-bid, or Dutch, auctions (Dutch IPOs) as an alternative method promising more equitable access, efficient prices, and egalitarian allocations.
This article comprehensively assesses the case for Dutch IPOs. Part I dissects critiques of bookbuilding, which rely on anomalous data, derogate established financial literature, and largely evaporate in the face of …
Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali
Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali
Faculty Publications
Three employees of Mphasis, a business process outsourcing ("BPO") firm, which runs call center services for Citibank's U.S. customers in Bangalore, India, were arrested for allegedly siphoning $350,000 from the accounts of Citibank's U.S. customers. These employees used their positions, which provided them access to Citibank customers, to induce four customers into giving out the personal identification numbers to their accounts, allowing the employees to illegally siphon funds out of those accounts. Outsourcing is a growing trend among budgetconscious U.S. companies and institutions. Information being outsourced includes personal data and confidential proprietary information. For example, Unisys Corporation, a company that …
A Tale Of Two Platforms, Tim Wu
A Tale Of Two Platforms, Tim Wu
Faculty Scholarship
This paper discusses future competitions between cellular and computer platforms, in the context of a discussion of Jonathan Zittrain, The Generative Internet, 119 Harv. L. Rev. 1974 (2006).
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
Creative Sanctions For Online Investment Fraud, Jayne W. Barnard
Creative Sanctions For Online Investment Fraud, Jayne W. Barnard
Faculty Publications
No abstract provided.
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …
Should Property Or Liability Rules Govern Information?, Mark A. Lemley, Philip J. Weiser
Should Property Or Liability Rules Govern Information?, Mark A. Lemley, Philip J. Weiser
Publications
This Article focuses on an unappreciated and significant aspect of the debate over property rules in the technology law context. In particular, it argues that the classic justification for legal entitlements protected by a property rule - i.e., a right to injunctive relief - depends on the ability to define and enforce property rights effectively. In the case of many technology markets, the inability to tailor injunctive relief so that it protects only the underlying right rather than also enjoining noninfringing conduct provides a powerful basis for using a liability rule (i.e., awarding the relevant damages to the plaintiff) instead …
Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple
Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple
Law Publications
This paper proposes a bright line test to guide the Canadian Radio-television and Telecommunications Commission (‘‘CRTC’’) in regulating ‘‘network neutrality’’. When Internet service providers seek to discriminate between uses and users in administering their networks, the CRTC should ask whether the proposed discrimination is a reasonable effort to make the price paid by each user commensurate to the demands which his or her use places on the network. Discrimination which meets this description should be tolerated if not actively encouraged, because it encourages the economically efficient allocation of scarce bandwidth. All other forms of ISP discrimination— including discrimination based on …
Substantive Media Regulation In Three Dimensions, Gregory P. Magarian
Substantive Media Regulation In Three Dimensions, Gregory P. Magarian
Scholarship@WashULaw
Changes in the political and regulatory climates are prompting calls to revive substantive government regulation of the broadcast media, specifically the now-defunct fairness doctrine. In this article, Professor Magarian attempts to sharpen the present debate over substantive regulation by closely examining earlier defenses and criticisms of the fairness doctrine. The article assesses how supporters and opponents of the fairness doctrine have characterized three issues essential for assessing the doctrine's wisdom and constitutionality: who is regulating; who is being regulated; and the goal of the regulatory scheme. As to the first issue, who is regulating, fairness doctrine supporters emphasize the democratic …
Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami
Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami
Faculty Scholarship
This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was still primarily a market-creating organization and data protection in the European Union was aimed at rights abuses by market actors. Since the terrorist attacks of New York, Madrid, and London, however, cooperation on fighting crime has accelerated. Now, the challenge for the European Union is to protect privacy in its emerging system of criminal justice. This paper analyzes the first EU law to address data privacy in crime-fighting—the Data Retention Directive. Based on a detailed examination of the Directive’s legislative history, the …
Compulsory Licensing Vs. Private Negotiations In Peer-To-Peer File Sharing, Michael Botein, Edward Samuels
Compulsory Licensing Vs. Private Negotiations In Peer-To-Peer File Sharing, Michael Botein, Edward Samuels
Articles & Chapters
No abstract provided.
Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo
Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo
All Faculty Scholarship
"Net neutrality" has been among the leading issues of telecommunications policy this decade. Is the neutrality of the Internet fundamental to its success, and worth regulating to protect, or simply a technical design subject to improvement? In this debate-form commentary, Tim Wu and Christopher Yoo make clear the connection between net neutrality and broader issues of national telecommunications policy.
The Pros And Cons Of Strengthening Intellectual Property Protection: Technological Protection Measures And Section 1201 Of The Us Copyright Act, Jane C. Ginsburg
The Pros And Cons Of Strengthening Intellectual Property Protection: Technological Protection Measures And Section 1201 Of The Us Copyright Act, Jane C. Ginsburg
Faculty Scholarship
The recent announcement (in late November 2006) of the Copyright Office's triennial rulemaking to identify "classes of works" exempt from the § 1201(a)(1) prohibition on circumvention of a technological measure controlling access to copyrighted works in part occasions this assessment of the judicial and administrative construction of this chapter of the 1998 Digital Millennium Copyright Act. The current Rulemaking appears more innovative than its predecessors, particularly in defining the exempted class of works by reference to the characteristics of the works' users. Copyright owner overreaching or misuse may also underlie the relative vigor of this Rulemaking: if producers of devices …
Network Stories, Julie E. Cohen
Network Stories, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
In 1962, Rachel Carson named the natural environment. Scientists were beginning to understand the complex web of ecological cause and effect; naming that web gave it independent existence and invested that existence with political meaning. In 1996, James Boyle named the cultural environment. Boyle’s act of naming was intended to jumpstart a political movement by appropriating the complex web of political meaning centered on the interdependency of environmental resources.
But naming, although important, is only a beginning. The example of the natural environment shows us that to build from a name to a movement requires two things. First, you have …
Cyberspace As/And Space, Julie E. Cohen
Cyberspace As/And Space, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …
Safe From Sex Offenders? Legislating Internet Publication Of Sex Offender Registries, Bill F. Chamberlin, Christina Locke
Safe From Sex Offenders? Legislating Internet Publication Of Sex Offender Registries, Bill F. Chamberlin, Christina Locke
UF Law Faculty Publications
In July 2005, the U.S. Department of Justice implemented the National Sex Offender Public Registry, which links the registries of individual states. A year later, the Adam Walsh Bill created the Dru Sjodin National Sex Offender Public Website, which required the Department of Justice to maintain a comprehensive national sex offender registry.
The purpose of this article is to examine the statutory provisions of every state and the District of Columbia regarding the use of the Internet as a tool in administering Megan's Law. The analysis begins by examining sex offender registration and notification laws at the federal level and …
Mandating Access To Telecom And The Internet: The Hidden Side Of Trinko, Daniel F. Spulber, Christopher S. Yoo
Mandating Access To Telecom And The Internet: The Hidden Side Of Trinko, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
Antitrust has long played a major role in telecommunications policy, demonstrated most dramatically by the equal access mandate imposed during the breakup of AT&T. In this Article we explore the extent to which antitrust can continue to serve as a source of access mandates following the Supreme Court's 2004 Trinko decision. Although Trinko sharply criticized access remedies and antitrust courts' ability to enforce them, it is not yet clear whether future courts will interpret the opinion as barring all antitrust access claims. Even more importantly, the opinion contains language hinting at possible bases for differentiating among different types of access, …