Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi Nov 2004

The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi

George Mason University School of Law Working Papers Series

One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the discipline of law & economics has yet to be fully applied to the issue. This introduction presents work by leading national scholars who examine this complex national security challenge from a law and economics perspective. The focus spans from a discussion of pure market solutions to public-private issue analysis, providing a valuable basis for policy considerations concerning the appropriate governmental role on the issue of …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan Sep 2004

Vol. Ix, Tab 41 - Ex. I - Hagan Deposition From Geico (Google Managing Counsel - Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 58 - Deposition Of Rose Hagan From Geico V. Google (Google Managing Counsel Trademarks), Rose Hagan Sep 2004

Vol. Ix, Tab 46 - Ex. 58 - Deposition Of Rose Hagan From Geico V. Google (Google Managing Counsel Trademarks), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


On Software Regulation, Polk Wagner Aug 2004

On Software Regulation, Polk Wagner

All Faculty Scholarship

This Article develops a novel analytic framework for the evaluation of regulatory policy in cyberspace, flowing from a reconceptualization of cyberlaw’s central premise: software code as complementary to law rather than its substitute. This approach emphasizes the linkage between law and software; for every quantum of legal-regulatory impact, there is a corresponding equilibria of regulation-bysoftware. The absence of a legal right will stimulate a technological response—and such incentives will moderate with increased rights. Rather than “code is law,” this is “code meets law.” The implications of this methodological shift are explored in the context of the emerging (and intensely controversial) …


The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian Jul 2004

The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian

Working Paper Series

This article proposes a major expansion in the scope of First Amendment law and offers a fresh way of understanding the public-private distinction. It contends that the Supreme Court should invoke the First Amendment to enjoin nongovernmental behavior that substantially impedes public political debate during times of war and national emergency. As the article explains, the present campaign against international terrorism has seen employers, property owners, and media corporations restrict political discussion more frequently and aggressively than the government has. If political debate is the most important object of First Amendment protection – which the article contends it is – …


Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck Jun 2004

Vol. Viii, Tab 39 - Ex. 1 - Email From Lepe Bismarck, Lepe Bismarck

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 41 - Ex 6 - Google Three Ad Policy Changes, Google Apr 2004

Vol. Ix, Tab 41 - Ex 6 - Google Three Ad Policy Changes, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


No Wonder They Dislike Us: Us Admonishes Europe For Protecting Itself From Microsoft's Predation, Albert A. Foer, Robert H. Lande Mar 2004

No Wonder They Dislike Us: Us Admonishes Europe For Protecting Itself From Microsoft's Predation, Albert A. Foer, Robert H. Lande

All Faculty Scholarship

This short article applauds the European Commission for holding that Microsoft violated European competition laws, and admonishes the U.S. for criticizing the Europeans for protecting themselves from Microsoft's anticompetitive activity.


Vol. Ix, Tab 46 - Ex. 40 - Document Tmprocess.Txt Trademark Meeting 3/4, Google Mar 2004

Vol. Ix, Tab 46 - Ex. 40 - Document Tmprocess.Txt Trademark Meeting 3/4, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 30 - Document Google Trademark Policy Task Force, Google Feb 2004

Vol. Ix, Tab 46 - Ex. 30 - Document Google Trademark Policy Task Force, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xxiii, Tab 60 - Ex. 7 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria Feb 2004

Vol. Xxiii, Tab 60 - Ex. 7 - Email From Prashant Fuloria (Google Product Management Director), Prashant Fuloria

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Incredible Shrinking First-Sale Rule: Are Software Resale Limits Lawful?, John A. Rothchild Jan 2004

The Incredible Shrinking First-Sale Rule: Are Software Resale Limits Lawful?, John A. Rothchild

Law Faculty Research Publications

No abstract provided.


Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler Jan 2004

Institutions Of Learning Or Havens For Illegal Activities: How The Supreme Court Views Libraries, 25 N. Ill. U. L. Rev. 1 (2004), Raizel Liebler

UIC Law Open Access Faculty Scholarship

The role of libraries in American society is varied: libraries act as curators and repositories of American culture's recorded knowledge, as places to communicate with others, and as sources where one can gain information from books, magazines and other printed materials, as well as audio-video materials and the Internet. Courts in the United States have called libraries "the quintessential locus of the receipt of information, "'places that are "dedicated to quiet, to knowledge, and to beauty," and "a mighty resource in the free marketplace of ideas." These positive views of libraries are often in sharp contrast with views by some …


A Topic Both Timely And Timeless, James Gibson Jan 2004

A Topic Both Timely And Timeless, James Gibson

Law Faculty Publications

Electronic discovery therefore represents one of the most momentous developments in the everyday life of the modern lawyer. Its effect on civil litigators is obvious, but other lawyers need to pay heed to the issue as well. Transactional attorneys, legislative aides, prosecutors, in-house counsel, and anyone else with legal responsibilities must be aware of the consequences of using electronic means of documentation and communication. Even an act as innocuous as sending an e-mail (an act that occurs thirty-one billion times a day7) creates a digital paper trail that is subject to discovery. Delete a client 's e-mails - or close …


Internet Contracting And Standard Terms In The Global Electronic Age: Perspectives For Japan, James Maxeiner Jan 2004

Internet Contracting And Standard Terms In The Global Electronic Age: Perspectives For Japan, James Maxeiner

All Faculty Scholarship

This piece is intended to show Japanese law students how their own everyday experiences raise significant domestic and international legal questions. It shows that a seemingly technical matter need not be boring, but can provide an example of practical application of law internationally and of the benefits that knowledge of foreign law can bring in assisting in understanding and improving domestic law. It discusses standard terms in licenses of information and software.


Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik Jan 2004

Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik

Faculty Publications

The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to address hacking and the growing problem of computer crime. Recently, however, in an attempt to control competition and maintain market share, a number of companies have sought to prevent entities they deem unwelcome from obtaining data on their websites. Utilizing the civil action provisions of the CFAA, these companies have surprisingly succeeded in convincing federal courts that hacking includes accessing and using the factual information a company has chosen to post on a publicly available website. Despite the fact that many of the …


Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh Jan 2004

Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh

All Faculty Scholarship

Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …


Capturing The Dialectic Between Principles And Cases, Kevin D. Ashley Jan 2004

Capturing The Dialectic Between Principles And Cases, Kevin D. Ashley

Articles

Theorists in ethics and law posit a dialectical relationship between principles and cases; abstract principles both inform and are informed by the decisions of specific cases. Until recently, however, it has not been possible to investigate or confirm this relationship empirically. This work involves a systematic study of a set of ethics cases written by a professional association's board of ethical review. Like judges, the board explains its decisions in opinions. It applies normative standards, namely principles from a code of ethics, and cites past cases. We hypothesized that the board's explanations of its decisions elaborated upon the meaning and …


Entrepreneurial Open Source Software Hackers: Mysql And Its Dual Licensing, Robert W. Gomulkiewicz Jan 2004

Entrepreneurial Open Source Software Hackers: Mysql And Its Dual Licensing, Robert W. Gomulkiewicz

Articles

Hackers often quibble about commercializing software, yet most willreadily sell their programming services. Richard Stallman, the father of free software, has always recognized that hackers have a right to make money. Aside from selling programming services, however, Stallman's disciples seem to frown upon commercializing software. Other hackers, labeling themselves "open source" developers, have warmed to the possibility that free software may be profitable.

This article describes one of the most promising business models for hackers, called "dual licensing." In this model, hackers offer the same code under two different licenses: a commercial license and an open source license. Licensees who …


Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield Jan 2004

Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield

Articles by Maurer Faculty

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Getting Serious About User-Friendly Mass Market Licensing For Software, Robert W. Gomulkiewicz Jan 2004

Getting Serious About User-Friendly Mass Market Licensing For Software, Robert W. Gomulkiewicz

Articles

Software publishers use standard form end user licenses (“EULAs”) in mass market transactions on a regular basis. Most software users find EULAs perplexing and generally ignore them. Scholars, however, have focused on them intently. In the past twenty years over a hundred scholarly articles have been written on the subject. Most of these articles criticize EULAs and argue that courts should not enforce them. In their critique of EULAs, some scholars examine the adequacy of the offer, acceptance, and consideration. Others discuss EULAs as part of the troublesome issue of standard form contracting, and whether standard forms, on balance, harm …


Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen Jan 2004

Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen

Faculty Scholarship

The subject matter we are going to talk about is variously named and thewords have some resonances of importance. I am going to use the phrase "Free Software" to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.

My purpose this …