Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (15)
- Intellectual Property Law (13)
- Comparative and Foreign Law (3)
- Computer Law (3)
- Privacy Law (3)
-
- Communications Law (2)
- Fourth Amendment (2)
- International Law (2)
- Science and Technology Law (2)
- American Politics (1)
- Business (1)
- Criminal Procedure (1)
- E-Commerce (1)
- Education Law (1)
- Entertainment, Arts, and Sports Law (1)
- Estates and Trusts (1)
- First Amendment (1)
- Human Rights Law (1)
- Labor and Employment Law (1)
- Political Science (1)
- Social and Behavioral Sciences (1)
- Tax Law (1)
- Institution
- Publication Year
- Publication
-
- Laura Quilter (5)
- Richmond Journal of Law & Technology (4)
- Maurer Theses and Dissertations (2)
- Canadian Journal of Law and Technology (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
-
- Georgetown Law Faculty Publications and Other Works (1)
- Jennifer M. Urban (1)
- Law Faculty Publications (1)
- Peter Jaszi (1)
- Publications (1)
- Richmond Journal of Global Law & Business (1)
- Rob Frieden (1)
- Touro Law Review (1)
- University of Miami International and Comparative Law Review (1)
- e-Research: A Journal of Undergraduate Work (1)
- Publication Type
Articles 1 - 23 of 23
Full-Text Articles in Law
Book Review: Mike Zajko, Telecom Tension: Internet Service Providers And Public Policy In Canada*, Matt Malone
Book Review: Mike Zajko, Telecom Tension: Internet Service Providers And Public Policy In Canada*, Matt Malone
Canadian Journal of Law and Technology
The world of telecommunications, writes Mike Zajko in this timely analysis of internet service providers (ISPs), “is a world many of us have never wondered about, just as we are rarely curious about where our sewage goes or how the electricity grid is configured.” Yet ISPs are not just conduits of fast-traveling light pulses that deliver the internet; they transmit, channel, form, and express a multitude of public policy issues, and they have an important level of agency in the construction and exercise of those policies, too. These dynamics have implications for a large bandwidth of topics relevant to Canadians, …
Evaluating A Unified Intellectual Property System Of Internet Service Providers In The Electronic Commerce Law -- A Comparative Research Between China And The U.S., Yifan Huang
Maurer Theses and Dissertations
As the Electronic Commerce Law went into effective in Jan. 1st, 2019, not only did China establish a unified IP protection system of ISPs, but also set up a blueprint for a comprehensive mechanism of ISPs for the future improvement. The question is whether this new law can effectively prevent the serious IP infringement issues of ISPs and therefore successfully improve the IP protection in China. To answerer this question, the dissertation analyzes the development of the mechanism of ISPs in copyright and trademark regimes before the Electronic Commerce Law, and seeks to demonstrate the impact of the Electronic Commerce …
The Fourth Amendment In A Digital World, Laura K. Donohue
The Fourth Amendment In A Digital World, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …
Evaluating The Legal Issues Of Internet Service Providers In China -- A Comparative Copyright Analysis Of Chinese Isps, The U.S. Isps, And Japanese Isps, Yifan Huang
Maurer Theses and Dissertations
This thesis is motivated by a legal challenge in the area of Chinese copyright protection: Baidu, which was considered a disaster by the copyright owners in China. To solve this legal challenge, the Chinese could learn from the legal experience of Japan and the U.S. regarding this issue.
The traditional ISP legal system provides a passive-reactive approach to the secondary copyright liability of ISPs. However, the Baidu issue in China indicates that a passive-reactive ISP model is not able to prevent copyright infringement. Recent cases in China and the U.S. reflect a new trend that the judicial branch adopts an …
The Revised Uniform Fiduciary Access To Digital Assets Act: Has The Law Caught Up With Technology?, Elizabeth Sy
The Revised Uniform Fiduciary Access To Digital Assets Act: Has The Law Caught Up With Technology?, Elizabeth Sy
Touro Law Review
No abstract provided.
The Bias Of Neutrality: An Examination Of A Congressman's Motivations On The Issue Of Network Neutrality, Harrison Beau Bryant
The Bias Of Neutrality: An Examination Of A Congressman's Motivations On The Issue Of Network Neutrality, Harrison Beau Bryant
e-Research: A Journal of Undergraduate Work
The United States Congress is an institution that, especially in recent times, is continuously faced with more modern and complex problems. The political dilemma surrounding the issue of network neutrality is a perfect example of a highly complex and technical problem that members of Congress have been forced to think about and act on. Because use of the Internet has now been almost entirely integrated into American society, with nearly 80% of the U.S. population connected in one way or another, the Internet's priority as a subject of legislation has seen a meteoric rise in Congress (data.worldbank.org; opencongress.org). In fact, …
Fcc Comments Workshop, Laura Quilter
Now Playing At A Youtube Near You: "Innocence Of [Internet Service Providers]", Brian A. Oliver
Now Playing At A Youtube Near You: "Innocence Of [Internet Service Providers]", Brian A. Oliver
University of Miami International and Comparative Law Review
No abstract provided.
International Covergence On The Need For Third Parties To Become Internet Copyright Police (But Why?), Dennis S. Karjala
International Covergence On The Need For Third Parties To Become Internet Copyright Police (But Why?), Dennis S. Karjala
Richmond Journal of Global Law & Business
No abstract provided.
Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden
Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden
Rob Frieden
Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …
The Dmca And Repeat Infringers, James Gibson
The Dmca And Repeat Infringers, James Gibson
Law Faculty Publications
The recent agreement between big media companies and big Internet service providers (ISPs) concerning online copyright infringement has the law and technology world abuzz. ISPs like Comcast, Verizon, and Time Warner Cable have agreed to implement a system under which subscribers who repeatedly and illegally download copyrighted content will have their Internet access impeded and maybe even terminated.
This is big news, and it will probably receive more attention in this IP Viewpoints series. But the purpose of this column is to put this agreement in context, because much of what the companies have agreed to do appears to be …
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Publications
In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).
Citing the scholarship that has criticized the third-party …
Internet Packet Sniffing And Its Impact On The Network Neutrality Debate And The Balance Of Power Between Intellectual Property Creators And Consumers, Rob Frieden
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Section 512 In The Educational Context, Laura Quilter
Section 512 In The Educational Context, Laura Quilter
Laura Quilter
No abstract provided.
Intellectual Property And Free Speech In The Online World: How Educational Institutions And Other Online Service Providers Are Coping With Cease And Desist Letters And Takedown Notices, Laura Quilter, Marjorie Heins
Intellectual Property And Free Speech In The Online World: How Educational Institutions And Other Online Service Providers Are Coping With Cease And Desist Letters And Takedown Notices, Laura Quilter, Marjorie Heins
Laura Quilter
Study of educational institutions and online service providers (Internet service providers) and their responses to cease and desist notices.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Laura Quilter
Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan
Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan
Laura Quilter
Amicus brief in the MGM v. Grokster case.
Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan
Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan
Jennifer M. Urban
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy
Richmond Journal of Law & Technology
Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …
Defamatory E-Mail And Employer Liability: Why Razing Zeran V. America Online Is A Good Thing, Michael H. Spencer
Defamatory E-Mail And Employer Liability: Why Razing Zeran V. America Online Is A Good Thing, Michael H. Spencer
Richmond Journal of Law & Technology
Electronic mail ("e-mail") has taken its place as an integral part of communication in modern society. Unlike other forms of communication, e-mail can cheaply and efficiently be placed in a public domain for literally the world to see. These public areas, otherwise known as bulletin boards, have expanded society's ability to communicate over vast distances. Individuals or groups can also engage in mass communication, which involves a myriad of topics and concerns. Nevertheless, such electronic communications, as almost any other form of communication, can become volatile and create animosity among users. Hence, many of the remarks made in such exchanges …
Electronic Commerce And Non-Resident Aliens: The Internal Revenue Service Versus International Cyberspace Transactions, Jonathane M. Ricci
Electronic Commerce And Non-Resident Aliens: The Internal Revenue Service Versus International Cyberspace Transactions, Jonathane M. Ricci
Richmond Journal of Law & Technology
The year is 1999. Jack Jones has just retired from practicing civil law in the United States and has returned to his home country of Trinidad, just off the coast of South America, where he now resides. Jack has an idea to keep him busy during retirement. He made many contacts in the U.S. legal community and his work is well-respected. So, Jack decided to keep writing for attorneys in the U.S.
How Have Internet Service Providers Beat Spammers?, Cathryn Le
How Have Internet Service Providers Beat Spammers?, Cathryn Le
Richmond Journal of Law & Technology
Popularly known as cyberspace, the Internet continues to evolve and expand, keeping pace with the lives of its users as a complex communications network. Many people rely on the Internet, an intricate link of numerous computers and computer networks, as a research and communications tool. The Internet is a "decentralized, global medium of communications--or 'cyberspace'--that links people, institutions, corporations, and governments around the world." No single entity owns the Internet, but the individual computers that compose the Internet are owned by various individuals, governmental, public and private organizations and institutions. The Internet cannot have a main control center nor can …