Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 4 of 4
Full-Text Articles in Law
Taxing The New Intellectual Property Right, Xuan-Thao Nguyen, Jeffrey A. Maine
Taxing The New Intellectual Property Right, Xuan-Thao Nguyen, Jeffrey A. Maine
Faculty Publications
How should the acquisition of domain names be treated under the current tax regime for intellectual property? This article proposes that domain names that function as source identifiers should be treated under the tax regime applicable to trademarks. Generic domain names, however, possess inherent goodwill that dictates different treatment.
Domestic Violence, Jennifer Wriggins
Worker Ownership In Enron's Wake - Revisiting A Community Development Tactic, Peter R. Pitegoff
Worker Ownership In Enron's Wake - Revisiting A Community Development Tactic, Peter R. Pitegoff
Faculty Publications
Worker ownership of business enterprise has long been touted as a vehicle for community economic development. Employee stock ownership plans in leveraged buy-outs, ESOPs and broad-based stock options in going concerns, and worker cooperatives in selected sectors - the experience has varied widely in goals, method, and outcome.
This Article reflects on the continued utility of worker ownership as a component of community development and calls attention to contrasts with conventional corporate governance and goals. Rather than an end in itself or just another way of doing business, worker ownership can be a vital element of a broader job creation, …
Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik
Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik
Faculty Publications
The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to address hacking and the growing problem of computer crime. Recently, however, in an attempt to control competition and maintain market share, a number of companies have sought to prevent entities they deem unwelcome from obtaining data on their websites. Utilizing the civil action provisions of the CFAA, these companies have surprisingly succeeded in convincing federal courts that hacking includes accessing and using the factual information a company has chosen to post on a publicly available website. Despite the fact that many of the …