Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

ISPs

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 23 of 23

Full-Text Articles in Law

Book Review: Mike Zajko, Telecom Tension: Internet Service Providers And Public Policy In Canada*, Matt Malone Jan 2022

Book Review: Mike Zajko, Telecom Tension: Internet Service Providers And Public Policy In Canada*, Matt Malone

Canadian Journal of Law and Technology

The world of telecommunications, writes Mike Zajko in this timely analysis of internet service providers (ISPs), “is a world many of us have never wondered about, just as we are rarely curious about where our sewage goes or how the electricity grid is configured.” Yet ISPs are not just conduits of fast-traveling light pulses that deliver the internet; they transmit, channel, form, and express a multitude of public policy issues, and they have an important level of agency in the construction and exercise of those policies, too. These dynamics have implications for a large bandwidth of topics relevant to Canadians, …


Evaluating A Unified Intellectual Property System Of Internet Service Providers In The Electronic Commerce Law -- A Comparative Research Between China And The U.S., Yifan Huang Jan 2019

Evaluating A Unified Intellectual Property System Of Internet Service Providers In The Electronic Commerce Law -- A Comparative Research Between China And The U.S., Yifan Huang

Maurer Theses and Dissertations

As the Electronic Commerce Law went into effective in Jan. 1st, 2019, not only did China establish a unified IP protection system of ISPs, but also set up a blueprint for a comprehensive mechanism of ISPs for the future improvement. The question is whether this new law can effectively prevent the serious IP infringement issues of ISPs and therefore successfully improve the IP protection in China. To answerer this question, the dissertation analyzes the development of the mechanism of ISPs in copyright and trademark regimes before the Electronic Commerce Law, and seeks to demonstrate the impact of the Electronic Commerce …


The Fourth Amendment In A Digital World, Laura K. Donohue Jan 2017

The Fourth Amendment In A Digital World, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Fourth Amendment doctrines created in the 1970s and 1980s no longer reflect how the world works. The formal legal distinctions on which they rely—(a) private versus public space, (b) personal information versus third party data, (c) content versus non-content, and (d) domestic versus international—are failing to protect the privacy interests at stake. Simultaneously, reduced resource constraints are accelerating the loss of rights. The doctrine has yet to catch up with the world in which we live. A necessary first step for the Court is to reconsider the theoretical underpinning of the Fourth Amendment, to allow for the evolution of a …


Evaluating The Legal Issues Of Internet Service Providers In China -- A Comparative Copyright Analysis Of Chinese Isps, The U.S. Isps, And Japanese Isps, Yifan Huang Nov 2016

Evaluating The Legal Issues Of Internet Service Providers In China -- A Comparative Copyright Analysis Of Chinese Isps, The U.S. Isps, And Japanese Isps, Yifan Huang

Maurer Theses and Dissertations

This thesis is motivated by a legal challenge in the area of Chinese copyright protection: Baidu, which was considered a disaster by the copyright owners in China. To solve this legal challenge, the Chinese could learn from the legal experience of Japan and the U.S. regarding this issue.

The traditional ISP legal system provides a passive-reactive approach to the secondary copyright liability of ISPs. However, the Baidu issue in China indicates that a passive-reactive ISP model is not able to prevent copyright infringement. Recent cases in China and the U.S. reflect a new trend that the judicial branch adopts an …


The Revised Uniform Fiduciary Access To Digital Assets Act: Has The Law Caught Up With Technology?, Elizabeth Sy Jan 2016

The Revised Uniform Fiduciary Access To Digital Assets Act: Has The Law Caught Up With Technology?, Elizabeth Sy

Touro Law Review

No abstract provided.


The Bias Of Neutrality: An Examination Of A Congressman's Motivations On The Issue Of Network Neutrality, Harrison Beau Bryant Sep 2014

The Bias Of Neutrality: An Examination Of A Congressman's Motivations On The Issue Of Network Neutrality, Harrison Beau Bryant

e-Research: A Journal of Undergraduate Work

The United States Congress is an institution that, especially in recent times, is continuously faced with more modern and complex problems. The political dilemma surrounding the issue of network neutrality is a perfect example of a highly complex and technical problem that members of Congress have been forced to think about and act on. Because use of the Internet has now been almost entirely integrated into American society, with nearly 80% of the U.S. population connected in one way or another, the Internet's priority as a subject of legislation has seen a meteoric rise in Congress (data.worldbank.org; opencongress.org). In fact, …


Fcc Comments Workshop, Laura Quilter Jul 2014

Fcc Comments Workshop, Laura Quilter

Laura Quilter

No abstract provided.


Now Playing At A Youtube Near You: "Innocence Of [Internet Service Providers]", Brian A. Oliver Oct 2013

Now Playing At A Youtube Near You: "Innocence Of [Internet Service Providers]", Brian A. Oliver

University of Miami International and Comparative Law Review

No abstract provided.


International Covergence On The Need For Third Parties To Become Internet Copyright Police (But Why?), Dennis S. Karjala Jan 2013

International Covergence On The Need For Third Parties To Become Internet Copyright Police (But Why?), Dennis S. Karjala

Richmond Journal of Global Law & Business

No abstract provided.


Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden Oct 2011

Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …


The Dmca And Repeat Infringers, James Gibson Jan 2011

The Dmca And Repeat Infringers, James Gibson

Law Faculty Publications

The recent agreement between big media companies and big Internet service providers (ISPs) concerning online copyright infringement has the law and technology world abuzz. ISPs like Comcast, Verizon, and Time Warner Cable have agreed to implement a system under which subscribers who repeatedly and illegally download copyrighted content will have their Internet access impeded and maybe even terminated.

This is big news, and it will probably receive more attention in this IP Viewpoints series. But the purpose of this column is to put this agreement in context, because much of what the companies have agreed to do appears to be …


Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid Jan 2010

Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid

Publications

In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).

Citing the scholarship that has criticized the third-party …


Internet Packet Sniffing And Its Impact On The Network Neutrality Debate And The Balance Of Power Between Intellectual Property Creators And Consumers, Rob Frieden Mar 2008

Internet Packet Sniffing And Its Impact On The Network Neutrality Debate And The Balance Of Power Between Intellectual Property Creators And Consumers, Rob Frieden

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Section 512 In The Educational Context, Laura Quilter Jul 2007

Section 512 In The Educational Context, Laura Quilter

Laura Quilter

No abstract provided.


Intellectual Property And Free Speech In The Online World: How Educational Institutions And Other Online Service Providers Are Coping With Cease And Desist Letters And Takedown Notices, Laura Quilter, Marjorie Heins Jan 2007

Intellectual Property And Free Speech In The Online World: How Educational Institutions And Other Online Service Providers Are Coping With Cease And Desist Letters And Takedown Notices, Laura Quilter, Marjorie Heins

Laura Quilter

Study of educational institutions and online service providers (Internet service providers) and their responses to cease and desist notices.


Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi Nov 2004

Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi

Laura Quilter

Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.


Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi Nov 2004

Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi

Peter Jaszi

Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.


Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan Sep 2003

Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan

Laura Quilter

Amicus brief in the MGM v. Grokster case.


Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan Sep 2003

Mgm V. Grokster, Brief Amici Curiae Of 40 Intellectual Property And Technology Law Professors Supporting Affirmance By The Ninth Circuit Of The Lower Court, Laura Quilter, Jennifer Urban, Pam Samuelson, Deirdre Mulligan

Jennifer M. Urban

Amicus brief in the MGM v. Grokster case.


In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy Jan 2002

In Search Of A Balance Between Police Power And Privacy In The Cybercrime Treaty, D.C. Kennedy

Richmond Journal of Law & Technology

Imagine that you wake up one morning, turn on your computer, and open an e-mail message with a catchy phrase in the subject line. Immediately after opening the e-mail’s attachment, your personal computer is severely damaged. Obviously having a bad day, you head to your job as an attorney for a multinational corporation. By the time you arrive at work, there has been damage to company computers across the globe. The monetary costs of the damage, coupled with the downtime, are astronomical. The CEO of your company is furious. You hope to diffuse the situation by informing your boss that …


Defamatory E-Mail And Employer Liability: Why Razing Zeran V. America Online Is A Good Thing, Michael H. Spencer Jan 2000

Defamatory E-Mail And Employer Liability: Why Razing Zeran V. America Online Is A Good Thing, Michael H. Spencer

Richmond Journal of Law & Technology

Electronic mail ("e-mail") has taken its place as an integral part of communication in modern society. Unlike other forms of communication, e-mail can cheaply and efficiently be placed in a public domain for literally the world to see. These public areas, otherwise known as bulletin boards, have expanded society's ability to communicate over vast distances. Individuals or groups can also engage in mass communication, which involves a myriad of topics and concerns. Nevertheless, such electronic communications, as almost any other form of communication, can become volatile and create animosity among users. Hence, many of the remarks made in such exchanges …


Electronic Commerce And Non-Resident Aliens: The Internal Revenue Service Versus International Cyberspace Transactions, Jonathane M. Ricci Jan 1999

Electronic Commerce And Non-Resident Aliens: The Internal Revenue Service Versus International Cyberspace Transactions, Jonathane M. Ricci

Richmond Journal of Law & Technology

The year is 1999. Jack Jones has just retired from practicing civil law in the United States and has returned to his home country of Trinidad, just off the coast of South America, where he now resides. Jack has an idea to keep him busy during retirement. He made many contacts in the U.S. legal community and his work is well-respected. So, Jack decided to keep writing for attorneys in the U.S.


How Have Internet Service Providers Beat Spammers?, Cathryn Le Jan 1998

How Have Internet Service Providers Beat Spammers?, Cathryn Le

Richmond Journal of Law & Technology

Popularly known as cyberspace, the Internet continues to evolve and expand, keeping pace with the lives of its users as a complex communications network. Many people rely on the Internet, an intricate link of numerous computers and computer networks, as a research and communications tool. The Internet is a "decentralized, global medium of communications--or 'cyberspace'--that links people, institutions, corporations, and governments around the world." No single entity owns the Internet, but the individual computers that compose the Internet are owned by various individuals, governmental, public and private organizations and institutions. The Internet cannot have a main control center nor can …