Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2007

Series

Institution
Keyword
Publication

Articles 1 - 30 of 37

Full-Text Articles in Law

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone Nov 2007

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Structure Of Search Engine Law, James Grimmelmann Nov 2007

The Structure Of Search Engine Law, James Grimmelmann

Cornell Law Faculty Publications

Search engines are the new linchpins of the Internet, and a new body of law - search engine law - will increasingly determine the shape of the Internet. Making sensible search policy requires a clear understanding of how search works, what interests are at stake, and what legal questions intersect at search. This article offers the first comprehensive overview of search engine law, which it organizes into a systematic taxonomy. It then demonstrates the dense legal interrelationships created by search by discussing a series of important themes in search engine law, each of which cuts across many doctrinal areas.


Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang Aug 2007

Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google Jun 2007

Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee Mar 2007

Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Cyber-Trespass And 'Unauthorized Access' As Legal Mechanisms Of Access Control: Lessons From The Us Experience, Mary W. S. Wong Mar 2007

Cyber-Trespass And 'Unauthorized Access' As Legal Mechanisms Of Access Control: Lessons From The Us Experience, Mary W. S. Wong

Research Collection Yong Pung How School Of Law

The common law doctrine of trespass to chattels has recently been revived and applied by courts in the United States (US) to cover intrusions (in the form of electronic signals) to computer systems connected to the Internet. These cases represent judicial recognition of the need to protect certain unwanted intrusions in cyberspace, though the principles developed therewith are remarkably expansive. As such, they overlap with the concept of ‘unauthorized access’ under computer misuse legislation in the US and elsewhere. This overlap has yet to be judicially acknowledged. Since the US, the United Kingdom and other common law countries not only …


Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page Jan 2007

Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina Mulligan Jan 2007

Perfect Enforcement Of Law: When To Limit And When To Use Technology, Christina Mulligan

Faculty Scholarship

No abstract provided.


Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger Jan 2007

Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger

Law Faculty Scholarly Articles

This Article provides a timely examination of the European Union's approach to information privacy on the internet, an approach that some legal scholars have held up as a model for law reform in the United States. Building on the author's recent piece discussing the U.S. approach to internet privacy, this Article applies to the EU's internet privacy regime a theoretical framework constructed from the writings of philosopher and social theorist Alasdair MacIntyre on the failures of Enlightenment and post-Enlightenment thought. The EU internet privacy regime is shown to reflect and reinforce three key elements of the "post-Enlightenment paradigm," i.e., the …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …


The Structure Of Search Engine Law, James Grimmelmann Jan 2007

The Structure Of Search Engine Law, James Grimmelmann

Faculty Scholarship

This Article provides a road map to issues of search engine law. It indicates what questions we must consider when thinking about search engines, and it indicates the interconnections among those questions. It does not endorse any particular normative framework for search. Nor does it recommend who should regulate search. Instead, it provides the necessary foundation for informed decision-making, by whatever regulator and whatever its normative approach.

Part I will explain how modern search engines function and describe the business environment within which they operate. Search engine operations can be understood in terms of the information flows among four principal …


Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long Jan 2007

Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long

UIC Law Open Access Faculty Scholarship

Cyberspace is often a battlefield with a wide array of armies posed to challenge one another across the increasing array of rhetoric and technology that has made it such a potent arena for global digital commerce. Perry Barlow's infamous demand that cyberspace be left to its own devices because of its unique unregulated nature may have been answered by Larry Lessig's reply that code may in fact be used to regulate cyberspace, but the reality is that social norming demands, the evanescence of technological controls, and the perceived utility of illicit conduct utilizing the internet make any regulation problematic at …


The Dutch Auction Myth, Peter B. Oh Jan 2007

The Dutch Auction Myth, Peter B. Oh

Articles

The bursting of the internet bubble continues to have ripple effects on the initial public offering (IPO) process. Critics of this process have fashioned a complex set of interconnected objections to the orthodox bookbuilding method for conducting IPOs, pricing shares, and allocating them to preferred investors. Critics instead hail online reverse-bid, or Dutch, auctions (Dutch IPOs) as an alternative method promising more equitable access, efficient prices, and egalitarian allocations.

This article comprehensively assesses the case for Dutch IPOs. Part I dissects critiques of bookbuilding, which rely on anomalous data, derogate established financial literature, and largely evaporate in the face of …


Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali Jan 2007

Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali

Faculty Publications

Three employees of Mphasis, a business process outsourcing ("BPO") firm, which runs call center services for Citibank's U.S. customers in Bangalore, India, were arrested for allegedly siphoning $350,000 from the accounts of Citibank's U.S. customers. These employees used their positions, which provided them access to Citibank customers, to induce four customers into giving out the personal identification numbers to their accounts, allowing the employees to illegally siphon funds out of those accounts. Outsourcing is a growing trend among budgetconscious U.S. companies and institutions. Information being outsourced includes personal data and confidential proprietary information. For example, Unisys Corporation, a company that …


A Tale Of Two Platforms, Tim Wu Jan 2007

A Tale Of Two Platforms, Tim Wu

Faculty Scholarship

This paper discusses future competitions between cellular and computer platforms, in the context of a discussion of Jonathan Zittrain, The Generative Internet, 119 Harv. L. Rev. 1974 (2006).


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Creative Sanctions For Online Investment Fraud, Jayne W. Barnard Jan 2007

Creative Sanctions For Online Investment Fraud, Jayne W. Barnard

Faculty Publications

No abstract provided.


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle K. Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher's strict liability standard as undermining economic development, American courts and …


Should Property Or Liability Rules Govern Information?, Mark A. Lemley, Philip J. Weiser Jan 2007

Should Property Or Liability Rules Govern Information?, Mark A. Lemley, Philip J. Weiser

Publications

This Article focuses on an unappreciated and significant aspect of the debate over property rules in the technology law context. In particular, it argues that the classic justification for legal entitlements protected by a property rule - i.e., a right to injunctive relief - depends on the ability to define and enforce property rights effectively. In the case of many technology markets, the inability to tailor injunctive relief so that it protects only the underlying right rather than also enjoining noninfringing conduct provides a powerful basis for using a liability rule (i.e., awarding the relevant damages to the plaintiff) instead …


Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple Jan 2007

Network Neutrality: Justifiable Discrimination, Unjustifiable Discrimination, And The Bright Line Between Them, Noel Semple

Law Publications

This paper proposes a bright line test to guide the Canadian Radio-television and Telecommunications Commission (‘‘CRTC’’) in regulating ‘‘network neutrality’’. When Internet service providers seek to discriminate between uses and users in administering their networks, the CRTC should ask whether the proposed discrimination is a reasonable effort to make the price paid by each user commensurate to the demands which his or her use places on the network. Discrimination which meets this description should be tolerated if not actively encouraged, because it encourages the economically efficient allocation of scarce bandwidth. All other forms of ISP discrimination— including discrimination based on …


Substantive Media Regulation In Three Dimensions, Gregory P. Magarian Jan 2007

Substantive Media Regulation In Three Dimensions, Gregory P. Magarian

Scholarship@WashULaw

Changes in the political and regulatory climates are prompting calls to revive substantive government regulation of the broadcast media, specifically the now-defunct fairness doctrine. In this article, Professor Magarian attempts to sharpen the present debate over substantive regulation by closely examining earlier defenses and criticisms of the fairness doctrine. The article assesses how supporters and opponents of the fairness doctrine have characterized three issues essential for assessing the doctrine's wisdom and constitutionality: who is regulating; who is being regulated; and the goal of the regulatory scheme. As to the first issue, who is regulating, fairness doctrine supporters emphasize the democratic …


Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami Jan 2007

Privacy And Law Enforcement In The European Union: The Data Retention Directive, Francesca Bignami

Faculty Scholarship

This paper examines a recent twist in EU data protection law. In the 1990s, the European Union was still primarily a market-creating organization and data protection in the European Union was aimed at rights abuses by market actors. Since the terrorist attacks of New York, Madrid, and London, however, cooperation on fighting crime has accelerated. Now, the challenge for the European Union is to protect privacy in its emerging system of criminal justice. This paper analyzes the first EU law to address data privacy in crime-fighting—the Data Retention Directive. Based on a detailed examination of the Directive’s legislative history, the …


Compulsory Licensing Vs. Private Negotiations In Peer-To-Peer File Sharing, Michael Botein, Edward Samuels Jan 2007

Compulsory Licensing Vs. Private Negotiations In Peer-To-Peer File Sharing, Michael Botein, Edward Samuels

Articles & Chapters

No abstract provided.


Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo Jan 2007

Keeping The Internet Neutral?: Tim Wu And Christopher Yoo Debate, Tim Wu, Christopher S. Yoo

All Faculty Scholarship

"Net neutrality" has been among the leading issues of telecommunications policy this decade. Is the neutrality of the Internet fundamental to its success, and worth regulating to protect, or simply a technical design subject to improvement? In this debate-form commentary, Tim Wu and Christopher Yoo make clear the connection between net neutrality and broader issues of national telecommunications policy.


The Pros And Cons Of Strengthening Intellectual Property Protection: Technological Protection Measures And Section 1201 Of The Us Copyright Act, Jane C. Ginsburg Jan 2007

The Pros And Cons Of Strengthening Intellectual Property Protection: Technological Protection Measures And Section 1201 Of The Us Copyright Act, Jane C. Ginsburg

Faculty Scholarship

The recent announcement (in late November 2006) of the Copyright Office's triennial rulemaking to identify "classes of works" exempt from the § 1201(a)(1) prohibition on circumvention of a technological measure controlling access to copyrighted works in part occasions this assessment of the judicial and administrative construction of this chapter of the 1998 Digital Millennium Copyright Act. The current Rulemaking appears more innovative than its predecessors, particularly in defining the exempted class of works by reference to the characteristics of the works' users. Copyright owner overreaching or misuse may also underlie the relative vigor of this Rulemaking: if producers of devices …


Network Stories, Julie E. Cohen Jan 2007

Network Stories, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In 1962, Rachel Carson named the natural environment. Scientists were beginning to understand the complex web of ecological cause and effect; naming that web gave it independent existence and invested that existence with political meaning. In 1996, James Boyle named the cultural environment. Boyle’s act of naming was intended to jumpstart a political movement by appropriating the complex web of political meaning centered on the interdependency of environmental resources.

But naming, although important, is only a beginning. The example of the natural environment shows us that to build from a name to a movement requires two things. First, you have …


Cyberspace As/And Space, Julie E. Cohen Jan 2007

Cyberspace As/And Space, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …


Safe From Sex Offenders? Legislating Internet Publication Of Sex Offender Registries, Bill F. Chamberlin, Christina Locke Jan 2007

Safe From Sex Offenders? Legislating Internet Publication Of Sex Offender Registries, Bill F. Chamberlin, Christina Locke

UF Law Faculty Publications

In July 2005, the U.S. Department of Justice implemented the National Sex Offender Public Registry, which links the registries of individual states. A year later, the Adam Walsh Bill created the Dru Sjodin National Sex Offender Public Website, which required the Department of Justice to maintain a comprehensive national sex offender registry.

The purpose of this article is to examine the statutory provisions of every state and the District of Columbia regarding the use of the Internet as a tool in administering Megan's Law. The analysis begins by examining sex offender registration and notification laws at the federal level and …


Mandating Access To Telecom And The Internet: The Hidden Side Of Trinko, Daniel F. Spulber, Christopher S. Yoo Jan 2007

Mandating Access To Telecom And The Internet: The Hidden Side Of Trinko, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

Antitrust has long played a major role in telecommunications policy, demonstrated most dramatically by the equal access mandate imposed during the breakup of AT&T. In this Article we explore the extent to which antitrust can continue to serve as a source of access mandates following the Supreme Court's 2004 Trinko decision. Although Trinko sharply criticized access remedies and antitrust courts' ability to enforce them, it is not yet clear whether future courts will interpret the opinion as barring all antitrust access claims. Even more importantly, the opinion contains language hinting at possible bases for differentiating among different types of access, …