Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (5)
- New York Law School (4)
- Santa Clara Law (4)
- University of Colorado Law School (3)
- University of Pittsburgh School of Law (3)
-
- BLR (2)
- Singapore Management University (2)
- Syracuse University (2)
- American University Washington College of Law (1)
- Columbia Law School (1)
- Georgetown University Law Center (1)
- Notre Dame Law School (1)
- Texas A&M University School of Law (1)
- University at Buffalo School of Law (1)
- University of Baltimore Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- University of Richmond (1)
- University of South Carolina (1)
- Vanderbilt University Law School (1)
- Keyword
-
- Internet (7)
- Copyright (6)
- Cyberspace (4)
- Fair use (4)
- Trademark (4)
-
- Intellectual property (3)
- Cyberlaw (2)
- Cybersquatting (2)
- DMCA (2)
- File sharing (2)
- First Amendment (2)
- First amendment (2)
- Law and Technology (2)
- Peer-to-peer (2)
- Science and Technology (2)
- Telecommunications regulation (2)
- Trademark law (2)
- Trademarks (2)
- Virtual communities (2)
- 1996 (1)
- ACPA (1)
- Act (1)
- Administrative Law (1)
- Administrative law (1)
- Advertising (1)
- Adwords (1)
- Allstate Insurance (1)
- Anticircumvention (1)
- Antitrust (1)
- Archaic gifts (1)
- Publication
-
- All Faculty Scholarship (6)
- Articles & Chapters (4)
- Articles (3)
- Faculty Publications (3)
- Faculty Scholarship (3)
-
- Publications (3)
- Journal Articles (2)
- Research Collection Yong Pung How School Of Law (2)
- Rosetta Stone v. Google (Joint Appendix) (2)
- School of Information Studies - Faculty Scholarship (2)
- Articles in Law Reviews & Other Academic Journals (1)
- George Mason University School of Law Working Papers Series (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Law Faculty Publications (1)
- Law Faculty Scholarship (1)
- The Ohio State University Moritz College of Law Working Paper Series (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 1 - 30 of 37
Full-Text Articles in Law
Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik
Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik
Research Collection Yong Pung How School Of Law
There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …
Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman
Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman
All Faculty Scholarship
While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …
Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik
Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik
Research Collection Yong Pung How School Of Law
Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …
Turning Gold Into Epg: Lessons From Low-Tech Democratic Experimentalism For Electronic Rulemaking And Other Ventures In Cyberdemocracy , Peter M. Shane
Turning Gold Into Epg: Lessons From Low-Tech Democratic Experimentalism For Electronic Rulemaking And Other Ventures In Cyberdemocracy , Peter M. Shane
The Ohio State University Moritz College of Law Working Paper Series
Empowered Participatory Governance, or EPG, is a model of governance developed by Archon Fung and Erik Olin Wright that seeks to connect a set of normative commitments for strengthening democracy with a set of institutional design prescriptions intended to meet that objective. It is derived partly from democratic theory and partly from the study of real-world attempts to institutionalize transformative strategies for democratizing social and political decision making. This paper reviews Fung and Wright's recent volume, Deepening Democracy: Institutional Innovations in Empowered Participatory Governance, and considers the relevance of the authors' and other contributors' insights for the future of a …
Vol. Ix, Tab 41 - Ex. 24 - Fax From Allstate Insurance Company, Allstate Insurance Company
Vol. Ix, Tab 41 - Ex. 24 - Fax From Allstate Insurance Company, Allstate Insurance Company
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler
Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler
George Mason University School of Law Working Papers Series
The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …
Vol. Ix, Tab 47 - Ex. 12 - Email From Adwords Support - "Your Google Adwords Approval Status", Google
Vol. Ix, Tab 47 - Ex. 12 - Email From Adwords Support - "Your Google Adwords Approval Status", Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Making A Mark In The Internet Economy: A Trademark Analysis Of Search Engine Advertising, Mark Bartholomew
Making A Mark In The Internet Economy: A Trademark Analysis Of Search Engine Advertising, Mark Bartholomew
Journal Articles
No abstract provided.
Yours For Keeps: Mgm V. Grokster, Max Oppenheimer
Yours For Keeps: Mgm V. Grokster, Max Oppenheimer
All Faculty Scholarship
In MGM v. Grokster, now pending before the U.S. Supreme Court, all parties have made the assumption that most P2P file transfers infringe copyrights. Two theories contradict that assumption: a significant number of individuals who transfer files over P2P networks may have a license to do so, and the Copyright Act itself may exempt the transfer of certain categories of entertainment files over P2P networks from the definition of infringement.
Introduction: The State Of Play, Beth Simone Noveck
Introduction: The State Of Play, Beth Simone Noveck
Articles & Chapters
No abstract provided.
Society’S Software, Beth Simone Noveck, David R. Johnson
Society’S Software, Beth Simone Noveck, David R. Johnson
Articles & Chapters
No abstract provided.
Thwarting Ethical Violations With Web Site Disclaimers, Walter Effross
Thwarting Ethical Violations With Web Site Disclaimers, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello
Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello
Faculty Scholarship
This article reviews recent developments in the United States and the European Union involving Internet transactions. It describes those developments and analyzes both from a normative and practical perspective.
Virtual Worlds In Asia: Business Models And Legal Issues. Paper Presented At Digra, Ian Macinnes
Virtual Worlds In Asia: Business Models And Legal Issues. Paper Presented At Digra, Ian Macinnes
School of Information Studies - Faculty Scholarship
This paper uses two Asian case studies to illustrate the issues that developers of virtual worlds should address as they mature. The Korean case emphasizes the phenomenon of item trading. This involves emergent markets linking real world currency to items existing on company servers. The practice has resulted in controversial and unresolved legal issues. Companies such as ItemBay have grown to take advantage of these opportunities. The Chinese case emphasizes the transformation of business models over time as well as community control. The paper discusses feedback effects between broadband adoption and online games as well as issues such as Waigua, …
Electronic Commerce Fraud: Towards An Understanding Of The Phenomenon, Ian Macinnes, Damani Musgrave, Jason Laska
Electronic Commerce Fraud: Towards An Understanding Of The Phenomenon, Ian Macinnes, Damani Musgrave, Jason Laska
School of Information Studies - Faculty Scholarship
No abstract provided.
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For Online Identity, Beth Simone Noveck
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For Online Identity, Beth Simone Noveck
Articles & Chapters
Trust is the foundation of society for without trust, we cannot
cooperate. Trust, in turn, depends upon secure, reliable, and persistent
identity. Cyberspace is thought to challenge our ability to build trust
because the medium undermines the connection between online
pseudonym and offline identity. We have no assurances of who stands
behind an online avatar; it may be one person, it may be more, it may be a
computer. The legal debate to date has focused exclusively on the question
of how to maintain real world identity in cyberspace. But new "social
software" technology that enables communities from eBay to …
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
Faculty Publications
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …
Solving The Digital Piracy Puzzle: Disaggregating Fair Use From The Dmca's Anti-Device Provisions, Jacqueline D. Lipton
Solving The Digital Piracy Puzzle: Disaggregating Fair Use From The Dmca's Anti-Device Provisions, Jacqueline D. Lipton
Articles
Copyright law has always involved balancing creative pursuits against innovations in copying, distribution and, more recently, encryption technologies. A significant problem for copyright law is that many such technologies can be utilized for both socially useful and socially harmful purposes. It is difficult to regulate such technologies in a way that prevents social harms while at the same time facilitating social benefits. The most recent example of this dynamic is evident in the 2005 United States Supreme Court decision in MGM v Grokster - dealing with digital file-sharing technologies. This article draws from the file sharing debate in considering another …
Speech Showdowns At The Virtual Corral, Eric Goldman
Speech Showdowns At The Virtual Corral, Eric Goldman
Faculty Publications
INTRODUCTION
This article considers the tension between free speech rights and private property/contract rights. Neither free speech rights nor private property and contract rights are absolute. Where they intersect in the physical world, confusing legal doctrines usually emerge, such as the U.S. Supreme Court cases addressing private speech at privately owned company towns and shopping centers. Though a bright-line rule has emerged-the First Amendment pertains only to stateactors-the rule provides little prospective guidance because private actors can be characterized as state actors in some circumstances.
In the online world, the speech/rights dichotomy also raises complex issues. Online private actors routinely …
Deregulating Relevancy In Internet Trademark Law, Eric Goldman
Deregulating Relevancy In Internet Trademark Law, Eric Goldman
Faculty Publications
Emerging trademark law doctrines have allowed trademark owners to excise socially beneficial content and to take unprecedented control over their channels of distribution. Without limits, trademark law has the capacity to counterproductively destroy the Internet's utility for everyone.
Part I of the Article provides a brief overview of the Internet search process. Parts II-IV consider Internet search from three perspectives. Part II considers Internet search from the searcher's perspective, concluding that one cannot infer searchers' objectives from the keywords they choose. Part II considers Internet search from the web publisher's perspective. Part IV considers Internet search from the search provider's …
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck
Articles & Chapters
Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable, and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an online avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new "social software" technology that enables communities from eBay to …
Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow
Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow
Law Faculty Scholarship
This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are "gendered" in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem …
Rewriting The Telecom Act: An Introduction, Philip J. Weiser
Rewriting The Telecom Act: An Introduction, Philip J. Weiser
Publications
No abstract provided.
The Business Fallout From The Rapid Obsolescence And Plannedobsolescence Of High-Tech Products: Downsizing Of Noncompetition Agreements, Ann C. Hodges, Porcher L. Taylor Iii
The Business Fallout From The Rapid Obsolescence And Plannedobsolescence Of High-Tech Products: Downsizing Of Noncompetition Agreements, Ann C. Hodges, Porcher L. Taylor Iii
Law Faculty Publications
The recent rapid pace of technological change has made human capital more important, yet it has rendered the employee’s knowledge base obsolete more quickly. Employers use covenants not to compete, restricting employees from switching to work for competitors, in order to retain knowledgeable personnel. Currently, the lack of predictability in interpreting noncompete agreements allows employers to draft overly-lengthy noncompetes, encourages enforcement litigation, and curtails employees from changing jobs because of the fear of litigation. Employees should not be prevented from working for competitors for longer than is necessary to protect the employer’s legitimate interest. Use of obsolescence as a guide …
P2p And The Future Of Private Copying, Peter K. Yu
P2p And The Future Of Private Copying, Peter K. Yu
Faculty Scholarship
Since the beginning of the P2P file-sharing controversy, commentators have discussed the radical expansion of copyright law, the industry's controversial enforcement tactics, the need for new legislative and business models, the changing social norms, and the evolving interplay of politics and market conditions. Although these discussions have delved into the many aspects of the controversy, none of them presents a big picture of the issues or explains how they fit within the larger file-sharing debate.
Using a holistic approach, this Article brings together existing scholarship while offering some thoughts on the future of private copying. The Article does not seek …
The Ghost Of Telecommunications Past, Philip J. Weiser
The Ghost Of Telecommunications Past, Philip J. Weiser
Publications
Paul Starr's The Creation of the Media presents modern policymakers with an important opportunity to consider the historical lessons of the telecommunications industry. This Book Review underscores how Starr's book richly explains some key components of U.S. information policy - such as relying on an integrated strategy of intellectual property, antitrust law, and telecommunications policy - and that some historical lessons are misplaced as to today's environment - such as a categorical skepticism of vertical integration. Moreover, Starr's account of telecommunications history explains that the U.S.'s success in promoting innovation in the information industries reflects our reluctance to manage key …
Policing The Spectrum Commons, Philip J. Weiser, Dale N. Hatfield
Policing The Spectrum Commons, Philip J. Weiser, Dale N. Hatfield
Publications
One of the most contested questions in spectrum policy is whether bands of spectrum left as unlicensed will fall victim to the tragedy of the commons. Advocates of increased unlicensed spectrum often downplay what enforcement measures are necessary to minimize interference and to prevent the tragedy of the commons problem. Even imposing spectrum etiquette requirements in addition to the FCC's equipment certification program will fail to address this concern effectively, as the development of such measures - e.g., the requirement that devices listen before they talk - does not ensure that they will be followed. Indeed, if there are incentives …
The Purpose Of Copyright Law In Canada, Daniel J. Gervais
The Purpose Of Copyright Law In Canada, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
IN THREE RECENT CASES, the Supreme Court of Canada provided several pieces of the Canadian copyright policy puzzle. We now know that the economic purpose of copyright law is instrumentalist in nature, namely, to ensure the orderly production and distribution of, and access to, works of art and intellect. The Court added that copyright can not enter carelessly into the private sphere of individual users. By targeting end-users in recent lawsuits, copyright holders have also found out that it is difficult to enforce a right that has not been properly internalized. After reviewing the Supreme Court trilogy of cases, the …
Reconsidering The Dmca, R. Polk Wagner
Reconsidering The Dmca, R. Polk Wagner
All Faculty Scholarship
patents, Law and economics, prosecution history estoppel, doctrine of equivalents, ex ante, ex post, default rules, PTO, Federal Circuit, patent prosecution, patent litigation, intellectual property, patent reform, patent administration, patent office
Beyond Network Neutrality, Christopher S. Yoo
Beyond Network Neutrality, Christopher S. Yoo
All Faculty Scholarship
In this Article, Professor Yoo takes issue with the emerging scholarly consensus in favor of ""network neutrality,"" which would prohibit network owners from employing proprietary protocols or entering into exclusivity agreements with content providers that would reduce the transparency of the Internet. Economic theory suggests that network neutrality advocates are focusing on the wrong policy problem. Rather than directing attention on the market for Internet content and applications, the segments of the industry that are the most competitive and the most likely to remain that way, communications policy would be better served if the focus were placed on the segment …