Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computers (2)
- Compatibility (1)
- Computer Law (1)
- Copyleft (1)
- Cryptography (1)
-
- Cyberspace (1)
- Data protection (1)
- Economics (1)
- Encryption policies (1)
- European Union (1)
- Export control rules (1)
- International trade (1)
- Internet (1)
- Law of war (1)
- Legal Liability (1)
- Military Law (1)
- Patent (1)
- Print (1)
- Privacy (1)
- Product Liability (1)
- Publication (1)
- Regulation of encryption (1)
- Right to privacy (1)
- Software (1)
- Technology (1)
- Telecommunications (1)
- Warranty (1)
- Year 2000 Transition (1)
Articles 1 - 8 of 8
Full-Text Articles in Law
The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin
The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin
Articles
No abstract provided.
In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer
In Vento Scribere: The Intersection Of Cyberspace And Patent Law, Max Oppenheimer
All Faculty Scholarship
No abstract provided.
Discrimination In The Laws Of Information Warfare, Mark R. Shulman
Discrimination In The Laws Of Information Warfare, Mark R. Shulman
Elisabeth Haub School of Law Faculty Publications
No abstract provided.
When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book
When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book
Faculty Publications
No abstract provided.
W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces
W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces
Faculty Publications
No abstract provided.
The Medium Is The Mistake: The Law Of Software For The First Amendment, R. Polk Wagner
The Medium Is The Mistake: The Law Of Software For The First Amendment, R. Polk Wagner
All Faculty Scholarship
Is computer software ? code written by humans that instructs a computer to perform certain tasks ? protected by the First Amendment? The answer to this question will significantly impact the course of future technological regulation, and will affect the scope of free expression rights in new media. In this note, I attempt to establish a framework for analysis, noting at the outset that the truly important question in this context is the threshold question: what is "speech or . . . the press"? I first describe two general ways that the Supreme Court has addressed the threshold question. One …
How Copyleft Uses License Rights To Succeed In The Open Source Software Revolution And The Implications For Article 2b, Robert W. Gomulkiewicz
How Copyleft Uses License Rights To Succeed In The Open Source Software Revolution And The Implications For Article 2b, Robert W. Gomulkiewicz
Articles
The computer industry moves from one “next great thing” to the next “next great thing” with amazing speed. Graphical user interface, object-oriented programming, client-server computing, multimedia software, Java applets, the network computer, and the Internet have all been hailed as technological breakthroughs at one time or another. Some of these promising developments fizzle, some evolve and succeed slowly, and some revolutionize the industry overnight.
Led by a group of software developers known as “hackers,” the latest “next great thing” is “open source” software. The word “source” refers to software in source code form. Source code is the collection of instructions …
The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate
The Changing Face Of Privacy Protection In The European Union And The United States, Fred H. Cate
Articles by Maurer Faculty
Among the wide variety of national and multinational legal regimes for protecting privacy, two dominant models have emerged, reflecting two very different approaches to the control of information. The European Union has enacted a sweeping data protection directive that imposes significant restrictions on most data collection, processing, dissemination, and storage activities, not only within Europe, but throughout the world if the data originates in a member state. The United States has taken a very different approach that extensively regulates government processing of data, while facilitating private, market-based initiatives to address private sector data processing.
Under the EU data protection directive, …