Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Computer Law

2011

Institution
Keyword
Publication

Articles 1 - 21 of 21

Full-Text Articles in Law

Ombuds In Cloud Of Exabytes--Understanding The Ombuds' Digital Trail, Craig Mousin Nov 2011

Ombuds In Cloud Of Exabytes--Understanding The Ombuds' Digital Trail, Craig Mousin

Mission and Ministry Publications

This article examines Ombuds Standards of Practice as Ombuds increasingly rely upon electronic communication. It first explores the expansion of electronically stored information (ESI) due to the many different electronic devices Ombuds rely upon or interact with including computers, smartphones, and printers. It then reviews how novel legal issues caused by e-discovery--the search for relevant digital documents in litigation--will impact Ombuds. Finally, it offers Ombuds suggestions on managing and controlling ESI while raising the question of whether the International Ombudsman Association must review its Standards of Practice in light of these ESI developments.


The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation -- A Presentation, Marketa Trimble Aug 2011

The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation -- A Presentation, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble presented these materials at the Def Con 19 Conference in Las Vegas, Nevada on August 7, 2011. The presentation discussed what the law has (or does not have) to say about evasion of geolocation or "cybertravel" -- acts by which a user makes geolocation tools believe that he is physically located somewhere other than where he is located.


Prevention Of Identity Theft: A Review Of The Literature, Portland State University. Criminology And Criminal Justice Senior Capstone Jul 2011

Prevention Of Identity Theft: A Review Of The Literature, Portland State University. Criminology And Criminal Justice Senior Capstone

Criminology and Criminal Justice Senior Capstone Project

With advances in technology and increases in impersonal electronic transactions, identity theft IT) is becoming a major problem in today’s society. One may ask why IT is growing in America. The answer is simple, as a review of literature reveals: IT is extremely hard to detect, prevent, and prosecute.

There are many ways people can protect themselves, their identities and secure their personal information; many do not concern themselves with this knowledge, however, until they become victims of this crime, themselves. With advances in technology, offenders are often turning to new methods to access information and use it for financial …


As Antitrust Case Ends, Microsoft Is Victorious In Defeat, Norman Hawker, Robert H. Lande May 2011

As Antitrust Case Ends, Microsoft Is Victorious In Defeat, Norman Hawker, Robert H. Lande

All Faculty Scholarship

As the final judgment in the celebrated Microsoft case ends, this piece very briefly assesses the impact of its remedy. When evaluated in terms of its most important goals, the remedy has proven to be a failure. Microsoft's monopoly power in the PC operating systems market is now as great as it was when the case was brought in 1998 or the remedy was ordered in 2002. The article also very briefly discusses the implications of this remedy for Google and AT&T.


First-Class Objects, James Grimmelmann Apr 2011

First-Class Objects, James Grimmelmann

Cornell Law Faculty Publications

What is the difference between "James Grimmelmann" and "@grimmelm" and why should we care? Some computer systems, like Facebook and credit reporting agencies, are inherently "about" people. Others are not. This essay argues that the key technical difference is whether they use unique identifiers to refer to people in their databases. From this single distinction, a host of social and humanistic consequences follow. The essay taxonomizes them and teases out some of their implications for privacy law.


Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa Apr 2011

Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa

Cornell Law School Inter-University Graduate Student Conference Papers

In the past decade or so, internet libel has become one of the hot topics in internet law. Internationally, courts have dealt with an enormous amount of cases brought by both the suppliers and consumers of the internet services. Although the advent of the World Wide Web has come with many legal problems; this paper will only focus at the problems that are being faced by the victims of defamatory speech on the internet in trying to seek compensation through the courts. These problems include, inter alia, the reluctance of the courts in unmasking the identity of the authors of …


Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries Apr 2011

Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew King-Ries

Faculty Law Review Articles

The American criminal justice system, (therefore), is facing a future domestic violence crisis. Unfortunately, authorities-both parents and law enforcement-tend to minimize the seriousness of violence within adolescent relationships and to minimize the seriousness of stalking. In addition, given the prevalence and embrace of technology by teenagers, criminalizing "normal" teenage behavior seems counter-productive. While an effective criminal justice system response to this problem has yet to be developed, the first step will be for parents and law enforcement to recognize the risk and take it seriously. The second step will be to "renorm" unhealthy teenage relationship norms. It is possible that …


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers Jan 2011

To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers

LLM Theses and Essays

This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.


Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan Jan 2011

Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan

All Faculty Scholarship

Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a key. Software currently contains an unacceptable number of vulnerabilities. The standard solution notes that the typical software business strategy is to keep costs down and be the first to market even if that means the software has significant vulnerabilities. Many endorse the following remedy: make software developers liable for negligent or defective design. This remedy is unworkable. We offer an alternative based on an appeal to product-risk norms. Product-risk norms are social norms that govern the sale of products. A key feature of such norms …


Defending Disclosure In Software Licensing, Robert A. Hillman, Maureen O'Rourke Jan 2011

Defending Disclosure In Software Licensing, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Publications

This Article surveys prominent kinds of disclosures in contract law-of facts, contract terms, and performance intentions. We show why the disclosure tool, although subject to substantial criticism, promotes important social values and goals, including efficiency, autonomy, corrective justice, fairness, and the legitimacy of the contract process. Further, proposals to replace disclosure with other alternatives are unrealistic because they are too expensive or complex. Our working example is the American Law Institute's Principles of the Law of Software Contracts.


Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long Jan 2011

Rebooting Trademarks For The Twenty-First Century, 49 U. Louisville L. Rev. 517 (2011), Doris E. Long

UIC Law Open Access Faculty Scholarship

Trademarks have long suffered from an "ugly stepsister" status in the realm of intellectual property. Quasi-market regulation tool, quasi-investment property; trademark's historical role as both consumer-information signifier and producer-investment asset has led to increasingly confusing dichotomous treatment under the Lanham Act. The potentially borderless markets of cyberspace, with their new marketing techniques and new competitive spaces, have only heightened this confusion. Stumbling attempts to extend protection for marks under the Lanham Act beyond traditional notions of trademark use and consumer confusion to encompass the investment protection side of trademarks, such as the development of federal dilution and anti-cybersquatting acts, only …


Supervising Managed Services, James B. Speta Jan 2011

Supervising Managed Services, James B. Speta

Faculty Working Papers

Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …


Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown Jan 2011

Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown

Law Librarian Scholarship

CiteGenie works primarily for caselaw and Internet resource research but is experimenting with the ability to add citations for statutes and regulations. CiteGenie provides a number of formatting options and allows you to choose citation rules for a particular state, use parallel citations, remove star-pagination marks from quoted texts, and personalize abbreviations. This tool is easy to use; when researching in Firefox, select CiteGenie from the right-click menu and a pop-up displays the copied text and citation to be pasted.


Enforcement Of Open Source Software Licenses: The Mdy Trio's Inconvenient Compliations, Robert W. Gomulkiewicz Jan 2011

Enforcement Of Open Source Software Licenses: The Mdy Trio's Inconvenient Compliations, Robert W. Gomulkiewicz

Articles

The Federal Circuit’s ruling in Jacobsen v. Katzer [535 F.3d 1373 (Fed. Cir. 2008)] finally settled the question of whether open source licenses are enforceable. Unfortunately, three recent cases from the Ninth Circuit have complicated matters. I call this trio of cases the “MDY Trio” in honor of the Ninth Circuit’s prior trio of licensing cases known as the “MAI Trio.”

On the surface, the MDY Trio provides a boost for the enforceability of software licenses, but the MDY Trio also creates two significant complications for open source licenses. First, the MDY Trio’s test for distinguishing between licenses and copyright …


The Variable Determinacy Thesis, Harry Surden Jan 2011

The Variable Determinacy Thesis, Harry Surden

Publications

This Article proposes a novel technique for characterizing the relative determinacy of legal decision-making. I begin with the observation that the determinacy of legal outcomes varies from context to context within the law. To augment this intuition, I develop a theoretical model of determinate legal decision-making. This model aims to capture the essential features that are typically associated with the concept of legal determinacy. I then argue that we can use such an idealized model as a standard for expressing the relative determinacy or indeterminacy of decision-making in actual, observed legal contexts. From a legal theory standpoint, this approach - …


Open Robotics, M. Ryan Calo Jan 2011

Open Robotics, M. Ryan Calo

Articles

Robotics is poised to be the next transformative technology. Robots are widely used in manufacturing, warfare, and disaster response, and the market for personal robotics is exploding. Worldwide sales of home robots—such as iRobot’s popular robotic vacuum cleaner—are in the millions. In fact, Honda has predicted that by the year 2020, it will sell as many robots as it does cars. Microsoft founder Bill Gates believes that the robotics industry is in the same place today as the personal computer (“PC”) business was in the 1970s, a belief that is significant given that there are now well over one billion …


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo Jan 2011

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

All Faculty Scholarship

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …