Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 5311 - 5340 of 6086

Full-Text Articles in Law

The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky Jan 2000

The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky

Richmond Journal of Law & Technology

The "interruption of computer services to authorized users," involves a violation of a series of federal and state computer-related crime laws which are designed to protect the authorized users of computer systems.Because most of these laws have only recently been legislated, and since few people have ever actually been charged with such violations, there is very little history or case law in this area. However, as computer-related crimes continue to escalate, these statutes could prove to be a positive force in efforts to catch the electronic criminals of the future. "Although there has never been accurate nationwide reporting of computer …


Consumer Privacy On The Internet, Andrew Shen Jan 2000

Consumer Privacy On The Internet, Andrew Shen

Richmond Journal of Law & Technology

If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …


Understanding Internet Co-Branding Deals, Eric Goldman, Candice Lee Jan 2000

Understanding Internet Co-Branding Deals, Eric Goldman, Candice Lee

Faculty Publications

The Internet has spawned new business practices regarding the ways users access and obtain information and services. Because linking can create a network of web pages that appear integrated and seamless to users, many Internet companies enter what are known as co-branding relationships. This article addresses a common type of co-branding relationship in which a "provider" maintains a set of pages ("the co-branded site") that looks and feels like the "brander's" web site. The co-branded site is promoted on the brander's web site through linking.


Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman Jan 2000

Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman

Faculty Publications

Co-brand agreements are what I do. I am the self-titled "King of CoBrands," as this is what I've been doing with my life.

So, let's talk a little about co-branding agreements and about why they might matter. First let's define our terms.

Now, where there used to be one site, the provider site, there will be two sites, the provider site and co-branded site, which contains the branding of the portal, but contains all the same functionality, or similar functionality, as is in the provider's site.

Then the portal will drive traffic to this co-branding site, for purposes that we'll …


Web Word War (Www): A New Approach To Trademark Infringement And Unfair Competition Claims Under The Lanham Act In Brookfield Communications, Inc. V. West Coast Entertainment Corp., Melissa M. Mcgann Jan 2000

Web Word War (Www): A New Approach To Trademark Infringement And Unfair Competition Claims Under The Lanham Act In Brookfield Communications, Inc. V. West Coast Entertainment Corp., Melissa M. Mcgann

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post Jan 2000

Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post

Vanderbilt Journal of Entertainment & Technology Law

MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …


How To Can Spam, Gary Miller Jan 2000

How To Can Spam, Gary Miller

Vanderbilt Journal of Entertainment & Technology Law

Receiving unsolicited commercial email, also known as "Spam," is like receiving junk mail, postage due. Spam shifts the cost of advertising from the advertiser to the consumer. This imposes enormous costs on Internet Service Providers (ISPs) and their customers. The Spam problem cries out for a legislative solution, and that is why I introduced H.R. 2162, the "Can Spam Act." The source of the Spam moniker for unsolicited commercial e-mail is apparently attributed to an annoying song in a Monty Python skit. In the skit, actors dressed like Vikings sing the word "Spam" over and over again, becoming louder and …


The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney Jan 2000

The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney

Vanderbilt Journal of Entertainment & Technology Law

The text of the ADA does not support such an extension. The interpretative canons of "noscitur a sociis" and "ejusdem generis" dictate that "places of public accommodation" refer exclusively to physical facilities. The canons also sufficiently resolve any possible statutory ambiguities, thereby foreclosing the opportunity for contrary agency interpretations. Although the intentionally broad purpose and design of the ADA make the statute an attractive avenue for advocates of online expansion, that same purpose and design limit the ADA to physical facilities. This note addresses the issues in two parts. First, it presents the arguments just listed. Second, it recognizes the …


Resolving Tensions Between Copyright And The Internet, Walter Effross Jan 2000

Resolving Tensions Between Copyright And The Internet, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat Jan 2000

"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat

Seattle University Law Review

Although there are a wide array of unresolved trademark issues with regard to the Internet, this Comment will not address disputes involving anything beyond the visible content of an individual's website. Domain name and meta-tag issues, though often referenced in order to demonstrate trends in analysis, are not the subjects of this inquiry. Rather, this Comment will focus on the triumvirate of claims most frequently asserted against individual web masters in the battle over the propriety of consumer commentary: trademark infringement, unfair competition, and trademark dilution. A recent court decision, Bally Total Fitness v. Faber, provides an example of the …


Wrong Turn In Cyberspace: Using Icann To Route Around The Apa And The Constitution, A. Michael Froomkin Jan 2000

Wrong Turn In Cyberspace: Using Icann To Route Around The Apa And The Constitution, A. Michael Froomkin

Articles

The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the "root." Control of the root provides singular power in cyberspace.

This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt to meet concerns that the United States could so dominate an Internet chokepoint, the U.S. Department of Commerce (DoC) summoned into being the Internet Corporation for Assigned Names and Numbers …


The Marketplace Of Ideas In Cyberspace, Margaret Chon Jan 2000

The Marketplace Of Ideas In Cyberspace, Margaret Chon

Faculty Articles

In the Panel Discussion on The Marketplace Of Ideas In Cyberspace at the 1999-2000 Oliver Wendell Holmes Symposium And Lectureship At Mercer University, Professor Margaret Chon discusses censorship and hate speech on the internet. Professor Chon questions the exporting of our First Amendment jurisprudence in this particular area, since we are the only democratic country to speak of, that protects what we've been referring to as hate speech.


An Analysis Of California's Common And Statutory Law Dealing With Unsolicited Commercial Electronic Mail: An Argument For Revision, Calvin Whang Jan 2000

An Analysis Of California's Common And Statutory Law Dealing With Unsolicited Commercial Electronic Mail: An Argument For Revision, Calvin Whang

San Diego Law Review

This Comment will examine the law governing unsolicited commercial electronic mail in California. Part II details the growth of the Internet and unsolicited commercial electronic mail. Part III examines the law of trespass to chattel as applied to unsolicited commercial electronic mail in California. Part IV examines recent legislative efforts to regulate spam in California. Part V analyzes the implications of the new unsolicited electronic mail legislation in California. Finally, Part VI details some suggested revisions to the California statute dealing with unsolicited commercial electronic mail.


Cyberspace And The "Devil's Hatband", Jonathan J. Rusch Jan 2000

Cyberspace And The "Devil's Hatband", Jonathan J. Rusch

Seattle University Law Review

In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …


Computer Network Trespasses: Solving New Problems With Old Solutions, Susan M. Ballantine Jan 2000

Computer Network Trespasses: Solving New Problems With Old Solutions, Susan M. Ballantine

Washington and Lee Law Review

No abstract provided.


Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg Jan 2000

Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg

Faculty Journal Articles and Book Chapters

Despite cliches about Internet speed, disputes that arise on and about the Internet can be time-consuming to resolve, legally murky, and factually complex. In response, Internet players with market power are opting out: mandatory arbitration is replacing both substantive law and court procedure, and technological remedies are providing self-help without any dispute resolution at all. These alternative procedures tend to move faster than courts and to cost their corporate creators less than lawsuits. They are also structured to maximize the success of the powerful. But faster is not always better. Cheap is not always fair or accurate. Market power is …


Internet Gambling Policy: Prohibition Versus Regulation, Theresa E. Loscalzo Jan 2000

Internet Gambling Policy: Prohibition Versus Regulation, Theresa E. Loscalzo

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


Internet Gambling: Is It Worth The Risk, James R. Hobbs Jan 2000

Internet Gambling: Is It Worth The Risk, James R. Hobbs

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


Gambling And The Law: The Future Of Internet Gambling, I. Nelson Rose Jan 2000

Gambling And The Law: The Future Of Internet Gambling, I. Nelson Rose

Jeffrey S. Moorad Sports Law Journal

No abstract provided.


The Electronic Self-Help Provisions Of Ucita: A Virtual Repo Man?, 33 J. Marshall L. Rev. 663 (2000), Craig Dolly Jan 2000

The Electronic Self-Help Provisions Of Ucita: A Virtual Repo Man?, 33 J. Marshall L. Rev. 663 (2000), Craig Dolly

UIC Law Review

No abstract provided.


Liability Issues Facing Online Businesses, David E. Shipley Jan 2000

Liability Issues Facing Online Businesses, David E. Shipley

Scholarly Works

Online businesses are confronted by a wide variety of liability issues covering almost the full range of the standard law school curriculum. The liability problems that face a small business in Vidalia, Georgia, which is selling Vidalia onion products at specialty stores, through print advertising, and by mail, do not go away when the business starts marketing through a Web site. In fact, there might be more exposure doing business online, and there are variations depending upon the nature of the business in question. For example, as discussed below, an Internet Service Provider ("ISP") like America Online has worries that …


State Taxation Of Electronic Commerce: Perspectives On Proposals For Change And Their Constitutionality, Kendall L. Houghton, Walter Hellerstein Jan 2000

State Taxation Of Electronic Commerce: Perspectives On Proposals For Change And Their Constitutionality, Kendall L. Houghton, Walter Hellerstein

Scholarly Works

Over the past few years, an enormous amount of attention has been devoted to the problems raised by state taxation of electronic commerce, possible solutions to those problems, and, more recently, the question of whether there is a ‘problem‘ at all. We have both been, and continue to be, deeply involved in the debate over these issues -- a debate that has sometimes generated more heat than light. We view this forum as furnishing us an opportunity to take a step back from the fray and to offer our views not only on the critical issues that are dominating the …


Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky Jan 2000

Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky

Faculty Publications

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …


Taxing The Reticulum Taxation And Tariff Issues In Electronic Commerce, Neil Lovett Wilkinson Jan 2000

Taxing The Reticulum Taxation And Tariff Issues In Electronic Commerce, Neil Lovett Wilkinson

LLM Theses and Essays

This thesis will explore, first within a historical context, and second, in a contemporary model, the impact and effect of electronic commerce in both a general and Electronic magazines. The thesis will explore governmental and legal responses, from a taxation and tariff point of view to the challenges posed by commercial transactions initiated and completed via the Internet and the World Wide Web. The broad question is therefore presented: How should governments, primarily American state and local governments, but also governments worldwide, respond to changes in technology that have a direct effect on the way business is conducted within their …


The Internet And Public International Law, John M. Rogers Jan 2000

The Internet And Public International Law, John M. Rogers

Law Faculty Scholarly Articles

It is perhaps commonplace to observe that recent developments in information technology are revolutionizing most aspects of our lives. Anything that affects our lives so profoundly will, of necessity, have a significant effect on the law. We can expect that the information revolution will have a comparably significant impact on the international system of binding obligations often called public international law. Just what that will be is of course extremely difficult to predict. Compounding that difficulty is the lack of consensus on just what actually amounts to the public international legal system. Scholars and lawyers still debate fundamental questions regarding …


Cyber-Nations, Ruth Wedgwood Jan 2000

Cyber-Nations, Ruth Wedgwood

Kentucky Law Journal

No abstract provided.


The Internet Is Changing The Public International Legal System, Henry H. Perritt Jr. Jan 2000

The Internet Is Changing The Public International Legal System, Henry H. Perritt Jr.

Kentucky Law Journal

No abstract provided.


Law On A Boundless Frontier: The Internet And International Law, Heather Mcgregor Jan 2000

Law On A Boundless Frontier: The Internet And International Law, Heather Mcgregor

Kentucky Law Journal

No abstract provided.


Online Service Provider Copyright Liability: Is The Digital Millennium Copyright Act The Answer?, Justin Williamson Jan 2000

Online Service Provider Copyright Liability: Is The Digital Millennium Copyright Act The Answer?, Justin Williamson

Kentucky Law Journal

No abstract provided.


Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen Jan 2000

Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests. On a theoretical level, data processors and other data privacy opponents argue that imposing restrictions on the collection, use, and exchange of personal data would ignore established understandings of property, limit individual freedom of choice, violate principles of rational information use, and infringe data processors' freedom of speech. In this article, Professor Julie Cohen explores these theoretical challenges to informational privacy protection. She concludes that categorical arguments from property, choice, truth, and speech lack weight, and mask …