Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Contracting Spyware By Contract, Jane K. Winn Jan 2005

Contracting Spyware By Contract, Jane K. Winn

Articles

The question of what constitutes "spyware" is controversial because many programs that are adware in the eyes of their distributors may be perceived as spyware in the eyes of the end user. Many of these programs are loaded on the computers of end users after the end user has agreed to the terms of a license presented in a click-through interface.

This paper analyzes whether it might be possible to reduce the volume of unwanted software loaded on end users' computers by applying contract law doctrine more strictly. Unwanted programs are often bundled with programs that the end user wants, …


Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy, Jacqueline D. Lipton Jan 2005

Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy, Jacqueline D. Lipton

Articles

All good 'cyberlawyers' know that in the late 1990s, legal and regulatory measures were adopted, both at the domestic and international level to address the then-growing problem of 'cybersquatting': that is, the registration of often multiple domain names corresponding to valuable corporate trademarks with the intention of extorting high prices from the trademark owners for transferring the names to them. Since 1999, the Uniform Domain Name Dispute Resolution Policy ('UDRP') in particular, complemented by the Anti-Cybersquatting Consumer Protection Act ('ACPA'), has been very successful in combating this practice. Unfortunately, since the late 1990s, there has been little movement towards developing …


General Public License 3.0: Hacking The Free Software Movement's Constitution, Robert W. Gomulkiewicz Jan 2005

General Public License 3.0: Hacking The Free Software Movement's Constitution, Robert W. Gomulkiewicz

Articles

The General Public License (GPL) enshrines a software hacker’s freedom to use code in important ways. Hackers often refer to the GPL as the free software movement’s “constitution.” Richard Stallman, founder of the Free Software Foundation (FSF) wrote the most recent version of the GPL, version 2.0, back in 1991. For a constitution, a fourteen-year-old document is young, but for a license, it is quite old. The revision process is finally underway, led by Stallman and Eben Moglen, FSF’s general counsel.

The release of GPL version 3.0 will be momentous for many reasons, but one reason stands out: The GPL …


General Public License 3.0: Hacking The Free Software Movement's Constitution, Robert W. Gomulkiewicz Jan 2005

General Public License 3.0: Hacking The Free Software Movement's Constitution, Robert W. Gomulkiewicz

Articles

The General Public License (GPL) enshrines a softwarehacker's' freedom to use code in important ways. Hackers oftenrefer to the GPL as the free software movement's "constitution."Richard Stallman, founder of the Free Software Foundation (FSF), wrote the most recent version of the GPL, version 2.0, back in 1991. For a constitution, a fourteen-year-old document is young, but for a license, it is quite old. The revision process is finally underway, led by Stallman and Eben Moglen, FSF's general counsel.

The release of GPL version 3.0 will be momentous for many reasons, but one reason stands out: The GPL governs much of …