Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

2005

Institution
Keyword
Publication

Articles 1 - 30 of 37

Full-Text Articles in Law

Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik Nov 2005

Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik

Research Collection Yong Pung How School Of Law

There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …


Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman Oct 2005

Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman

All Faculty Scholarship

While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …


Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik Sep 2005

Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik

Research Collection Yong Pung How School Of Law

Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …


Turning Gold Into Epg: Lessons From Low-Tech Democratic Experimentalism For Electronic Rulemaking And Other Ventures In Cyberdemocracy , Peter M. Shane May 2005

Turning Gold Into Epg: Lessons From Low-Tech Democratic Experimentalism For Electronic Rulemaking And Other Ventures In Cyberdemocracy , Peter M. Shane

The Ohio State University Moritz College of Law Working Paper Series

Empowered Participatory Governance, or EPG, is a model of governance developed by Archon Fung and Erik Olin Wright that seeks to connect a set of normative commitments for strengthening democracy with a set of institutional design prescriptions intended to meet that objective. It is derived partly from democratic theory and partly from the study of real-world attempts to institutionalize transformative strategies for democratizing social and political decision making. This paper reviews Fung and Wright's recent volume, Deepening Democracy: Institutional Innovations in Empowered Participatory Governance, and considers the relevance of the authors' and other contributors' insights for the future of a …


Vol. Ix, Tab 41 - Ex. 24 - Fax From Allstate Insurance Company, Allstate Insurance Company May 2005

Vol. Ix, Tab 41 - Ex. 24 - Fax From Allstate Insurance Company, Allstate Insurance Company

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler Feb 2005

Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler

George Mason University School of Law Working Papers Series

The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …


Vol. Ix, Tab 47 - Ex. 12 - Email From Adwords Support - "Your Google Adwords Approval Status", Google Jan 2005

Vol. Ix, Tab 47 - Ex. 12 - Email From Adwords Support - "Your Google Adwords Approval Status", Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Making A Mark In The Internet Economy: A Trademark Analysis Of Search Engine Advertising, Mark Bartholomew Jan 2005

Making A Mark In The Internet Economy: A Trademark Analysis Of Search Engine Advertising, Mark Bartholomew

Journal Articles

No abstract provided.


Yours For Keeps: Mgm V. Grokster, Max Oppenheimer Jan 2005

Yours For Keeps: Mgm V. Grokster, Max Oppenheimer

All Faculty Scholarship

In MGM v. Grokster, now pending before the U.S. Supreme Court, all parties have made the assumption that most P2P file transfers infringe copyrights. Two theories contradict that assumption: a significant number of individuals who transfer files over P2P networks may have a license to do so, and the Copyright Act itself may exempt the transfer of certain categories of entertainment files over P2P networks from the definition of infringement.


Introduction: The State Of Play, Beth Simone Noveck Jan 2005

Introduction: The State Of Play, Beth Simone Noveck

Articles & Chapters

No abstract provided.


Society’S Software, Beth Simone Noveck, David R. Johnson Jan 2005

Society’S Software, Beth Simone Noveck, David R. Johnson

Articles & Chapters

No abstract provided.


Thwarting Ethical Violations With Web Site Disclaimers, Walter Effross Jan 2005

Thwarting Ethical Violations With Web Site Disclaimers, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello Jan 2005

Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This article reviews recent developments in the United States and the European Union involving Internet transactions. It describes those developments and analyzes both from a normative and practical perspective.


Virtual Worlds In Asia: Business Models And Legal Issues. Paper Presented At Digra, Ian Macinnes Jan 2005

Virtual Worlds In Asia: Business Models And Legal Issues. Paper Presented At Digra, Ian Macinnes

School of Information Studies - Faculty Scholarship

This paper uses two Asian case studies to illustrate the issues that developers of virtual worlds should address as they mature. The Korean case emphasizes the phenomenon of item trading. This involves emergent markets linking real world currency to items existing on company servers. The practice has resulted in controversial and unresolved legal issues. Companies such as ItemBay have grown to take advantage of these opportunities. The Chinese case emphasizes the transformation of business models over time as well as community control. The paper discusses feedback effects between broadband adoption and online games as well as issues such as Waigua, …


Electronic Commerce Fraud: Towards An Understanding Of The Phenomenon, Ian Macinnes, Damani Musgrave, Jason Laska Jan 2005

Electronic Commerce Fraud: Towards An Understanding Of The Phenomenon, Ian Macinnes, Damani Musgrave, Jason Laska

School of Information Studies - Faculty Scholarship

No abstract provided.


Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For Online Identity, Beth Simone Noveck Jan 2005

Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For Online Identity, Beth Simone Noveck

Articles & Chapters

Trust is the foundation of society for without trust, we cannot

cooperate. Trust, in turn, depends upon secure, reliable, and persistent

identity. Cyberspace is thought to challenge our ability to build trust

because the medium undermines the connection between online

pseudonym and offline identity. We have no assurances of who stands

behind an online avatar; it may be one person, it may be more, it may be a

computer. The legal debate to date has focused exclusively on the question

of how to maintain real world identity in cyberspace. But new "social

software" technology that enables communities from eBay to …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …


Solving The Digital Piracy Puzzle: Disaggregating Fair Use From The Dmca's Anti-Device Provisions, Jacqueline D. Lipton Jan 2005

Solving The Digital Piracy Puzzle: Disaggregating Fair Use From The Dmca's Anti-Device Provisions, Jacqueline D. Lipton

Articles

Copyright law has always involved balancing creative pursuits against innovations in copying, distribution and, more recently, encryption technologies. A significant problem for copyright law is that many such technologies can be utilized for both socially useful and socially harmful purposes. It is difficult to regulate such technologies in a way that prevents social harms while at the same time facilitating social benefits. The most recent example of this dynamic is evident in the 2005 United States Supreme Court decision in MGM v Grokster - dealing with digital file-sharing technologies. This article draws from the file sharing debate in considering another …


Speech Showdowns At The Virtual Corral, Eric Goldman Jan 2005

Speech Showdowns At The Virtual Corral, Eric Goldman

Faculty Publications

INTRODUCTION

This article considers the tension between free speech rights and private property/contract rights. Neither free speech rights nor private property and contract rights are absolute. Where they intersect in the physical world, confusing legal doctrines usually emerge, such as the U.S. Supreme Court cases addressing private speech at privately owned company towns and shopping centers. Though a bright-line rule has emerged-the First Amendment pertains only to stateactors-the rule provides little prospective guidance because private actors can be characterized as state actors in some circumstances.

In the online world, the speech/rights dichotomy also raises complex issues. Online private actors routinely …


Deregulating Relevancy In Internet Trademark Law, Eric Goldman Jan 2005

Deregulating Relevancy In Internet Trademark Law, Eric Goldman

Faculty Publications

Emerging trademark law doctrines have allowed trademark owners to excise socially beneficial content and to take unprecedented control over their channels of distribution. Without limits, trademark law has the capacity to counterproductively destroy the Internet's utility for everyone.

Part I of the Article provides a brief overview of the Internet search process. Parts II-IV consider Internet search from three perspectives. Part II considers Internet search from the searcher's perspective, concluding that one cannot infer searchers' objectives from the keywords they choose. Part II considers Internet search from the web publisher's perspective. Part IV considers Internet search from the search provider's …


Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck Jan 2005

Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck

Articles & Chapters

Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable, and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an online avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new "social software" technology that enables communities from eBay to …


Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow Jan 2005

Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow

Law Faculty Scholarship

This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are "gendered" in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem …


Rewriting The Telecom Act: An Introduction, Philip J. Weiser Jan 2005

Rewriting The Telecom Act: An Introduction, Philip J. Weiser

Publications

No abstract provided.


The Business Fallout From The Rapid Obsolescence And Plannedobsolescence Of High-Tech Products: Downsizing Of Noncompetition Agreements, Ann C. Hodges, Porcher L. Taylor Iii Jan 2005

The Business Fallout From The Rapid Obsolescence And Plannedobsolescence Of High-Tech Products: Downsizing Of Noncompetition Agreements, Ann C. Hodges, Porcher L. Taylor Iii

Law Faculty Publications

The recent rapid pace of technological change has made human capital more important, yet it has rendered the employee’s knowledge base obsolete more quickly. Employers use covenants not to compete, restricting employees from switching to work for competitors, in order to retain knowledgeable personnel. Currently, the lack of predictability in interpreting noncompete agreements allows employers to draft overly-lengthy noncompetes, encourages enforcement litigation, and curtails employees from changing jobs because of the fear of litigation. Employees should not be prevented from working for competitors for longer than is necessary to protect the employer’s legitimate interest. Use of obsolescence as a guide …


P2p And The Future Of Private Copying, Peter K. Yu Jan 2005

P2p And The Future Of Private Copying, Peter K. Yu

Faculty Scholarship

Since the beginning of the P2P file-sharing controversy, commentators have discussed the radical expansion of copyright law, the industry's controversial enforcement tactics, the need for new legislative and business models, the changing social norms, and the evolving interplay of politics and market conditions. Although these discussions have delved into the many aspects of the controversy, none of them presents a big picture of the issues or explains how they fit within the larger file-sharing debate.

Using a holistic approach, this Article brings together existing scholarship while offering some thoughts on the future of private copying. The Article does not seek …


The Ghost Of Telecommunications Past, Philip J. Weiser Jan 2005

The Ghost Of Telecommunications Past, Philip J. Weiser

Publications

Paul Starr's The Creation of the Media presents modern policymakers with an important opportunity to consider the historical lessons of the telecommunications industry. This Book Review underscores how Starr's book richly explains some key components of U.S. information policy - such as relying on an integrated strategy of intellectual property, antitrust law, and telecommunications policy - and that some historical lessons are misplaced as to today's environment - such as a categorical skepticism of vertical integration. Moreover, Starr's account of telecommunications history explains that the U.S.'s success in promoting innovation in the information industries reflects our reluctance to manage key …


Policing The Spectrum Commons, Philip J. Weiser, Dale N. Hatfield Jan 2005

Policing The Spectrum Commons, Philip J. Weiser, Dale N. Hatfield

Publications

One of the most contested questions in spectrum policy is whether bands of spectrum left as unlicensed will fall victim to the tragedy of the commons. Advocates of increased unlicensed spectrum often downplay what enforcement measures are necessary to minimize interference and to prevent the tragedy of the commons problem. Even imposing spectrum etiquette requirements in addition to the FCC's equipment certification program will fail to address this concern effectively, as the development of such measures - e.g., the requirement that devices listen before they talk - does not ensure that they will be followed. Indeed, if there are incentives …


The Purpose Of Copyright Law In Canada, Daniel J. Gervais Jan 2005

The Purpose Of Copyright Law In Canada, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

IN THREE RECENT CASES, the Supreme Court of Canada provided several pieces of the Canadian copyright policy puzzle. We now know that the economic purpose of copyright law is instrumentalist in nature, namely, to ensure the orderly production and distribution of, and access to, works of art and intellect. The Court added that copyright can not enter carelessly into the private sphere of individual users. By targeting end-users in recent lawsuits, copyright holders have also found out that it is difficult to enforce a right that has not been properly internalized. After reviewing the Supreme Court trilogy of cases, the …


Reconsidering The Dmca, R. Polk Wagner Jan 2005

Reconsidering The Dmca, R. Polk Wagner

All Faculty Scholarship

patents, Law and economics, prosecution history estoppel, doctrine of equivalents, ex ante, ex post, default rules, PTO, Federal Circuit, patent prosecution, patent litigation, intellectual property, patent reform, patent administration, patent office


Beyond Network Neutrality, Christopher S. Yoo Jan 2005

Beyond Network Neutrality, Christopher S. Yoo

All Faculty Scholarship

In this Article, Professor Yoo takes issue with the emerging scholarly consensus in favor of ""network neutrality,"" which would prohibit network owners from employing proprietary protocols or entering into exclusivity agreements with content providers that would reduce the transparency of the Internet. Economic theory suggests that network neutrality advocates are focusing on the wrong policy problem. Rather than directing attention on the market for Internet content and applications, the segments of the industry that are the most competitive and the most likely to remain that way, communications policy would be better served if the focus were placed on the segment …