Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

2008

Institution
Keyword
Publication
File Type

Articles 1 - 30 of 43

Full-Text Articles in Law

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Nov 2008

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner Oct 2008

Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner

School of Law Faculty Publications

This article analyzes activity in virtual worlds that would constitute crime if they were committed in the real world. It reviews the evolution of virtual worlds like Second Life and notes research which indicates that more and more of our lives will move into this realm. The article then analyzes the criminalization of virtual conduct that inflicts “harm” in the real world and virtual conduct that only inflicts “harm” in the virtual world. It explains that the first category qualifies as cybercrime and can be prosecuted under existing law. Finally, it analyzes the necessity and propriety of criminalizing the second …


Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha Sep 2008

Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha

Faculty Scholarship

No abstract provided.


In Search Of Disappearing Information: Strategies For Preserving Access To Federal Documents On The Web, Meg Butler Sep 2008

In Search Of Disappearing Information: Strategies For Preserving Access To Federal Documents On The Web, Meg Butler

Faculty Publications By Year

No abstract provided.


Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu Jul 2008

Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Accidental Privacy Spills, James Grimmelmann Jul 2008

Accidental Privacy Spills, James Grimmelmann

Cornell Law Faculty Publications

The realm of privacy law has more crimes than criminals, more wrongs than wrongdoers. Some invasions of privacy are neither intentional nor negligent; it's easy to recognize the harm, but hard to pin the blame.

Laurie Garrett attended the World Economic Forum as a journalist and wrote a private email to a few close friends, only to see that email end up on a widely-read weblog.

This essay tells the story of that inevitable accident: an "accident" in that it needn't have happened, but "inevitable" in that there's no principled way to prevent similar misunderstandings from recurring, again and again …


Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu Jun 2008

Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu Jun 2008

Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Passport Files: Privacy Protection Needed For All Americans: Hearing Before The S. Comm. On The Judiciary, 110th Cong., July 10, 2008 (Statement Of Marc Rotenberg, Adjunct Prof. Of Law, Geo. U. L. Center), Marc Rotenberg Jun 2008

Passport Files: Privacy Protection Needed For All Americans: Hearing Before The S. Comm. On The Judiciary, 110th Cong., July 10, 2008 (Statement Of Marc Rotenberg, Adjunct Prof. Of Law, Geo. U. L. Center), Marc Rotenberg

Testimony Before Congress

No abstract provided.


Peasants, Tanners, And Psychiatrists: Using Films To Teach Comparative Law, Joseph W. Dellapenna May 2008

Peasants, Tanners, And Psychiatrists: Using Films To Teach Comparative Law, Joseph W. Dellapenna

Working Paper Series

Films have proven to be a useful teaching tool for a course on Comparative Law. The films serve to introduce the class to the look and feel of legal proceedings from selected foreign legal systems and to illustrate particular aspects of how these legal proceedings differ from our own. The article summarizes the results of more than 10 years of experience in using films. It will be of interest to others who teach Comparative Law and also to lawyers, judges, and students who want a video means of oriented themselves to foreign legal traditions. The article discusses the limitations of …


Vol. Ix, Tab 41 - Ex 23 - Email From John Ramsey (Rosetta Stone Corporate Counsel), John Ramsey Apr 2008

Vol. Ix, Tab 41 - Ex 23 - Email From John Ramsey (Rosetta Stone Corporate Counsel), John Ramsey

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 31 - Email From John Ramsey (Rosetta Corporate Counsel), John Ramsey Apr 2008

Vol. Ix, Tab 46 - Ex. 31 - Email From John Ramsey (Rosetta Corporate Counsel), John Ramsey

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vii, Tab 38 - Ex. 62 - Hagan Deposition (Former Google Managing Counsel - Trademarks, Jewelry Maker), Rose Hagan Mar 2008

Vol. Vii, Tab 38 - Ex. 62 - Hagan Deposition (Former Google Managing Counsel - Trademarks, Jewelry Maker), Rose Hagan

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vii, Tab 38 - Ex. 64 - Holden Deposition (Google Pm Director), Richard T. Holden Mar 2008

Vol. Vii, Tab 38 - Ex. 64 - Holden Deposition (Google Pm Director), Richard T. Holden

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 18 - Email From Gina Reinhold (Adwords Associate), Gina Reinhold Mar 2008

Vol. Ix, Tab 46 - Ex. 18 - Email From Gina Reinhold (Adwords Associate), Gina Reinhold

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 36 - Email From Michael Wu, Michael Wu Feb 2008

Vol. Vi, Tab 38 - Ex. 36 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Substantive Media Regulation In Three Dimenstions, Gregory P. Magarian Feb 2008

Substantive Media Regulation In Three Dimenstions, Gregory P. Magarian

Working Paper Series

Changes in the political and regulatory climates are prompting calls to revive substantive government regulation of the broadcast media, specifically the now-defunct fairness doctrine. In this article, Professor Magarian attempts to sharpen the present debate over substantive regulation by closely examining earlier defenses and criticisms of the fairness doctrine. The article assesses how supporters and opponents of the fairness doctrine have characterized three issues essential for assessing the doctrine’s wisdom and constitutionality: who is regulating; who is being regulated; and the goal of the regulatory scheme. As to the first issue, who is regulating, fairness doctrine supporters emphasize the democratic …


Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale Jan 2008

Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale

Faculty Scholarship

No abstract provided.


Vol. Ix, Tab 41 - Ex. 4 - Google Ad Partners All-Hands Q1 2008, Google Jan 2008

Vol. Ix, Tab 41 - Ex. 4 - Google Ad Partners All-Hands Q1 2008, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Information Policy For The Library Of Babel, James Grimmelmann Jan 2008

Information Policy For The Library Of Babel, James Grimmelmann

Cornell Law Faculty Publications

The image of Borges's Library of Babel, which contains all possible books, is haunting and suggestive. This essay asks what we would do if we were advising a Federal Library Commission on how to deal with the Library's vast holdings and overwhelming disorganization. This thought exercise provides a set of sensible principles for information policy in an age of extreme informational abundance.


Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale Jan 2008

Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale

Faculty Scholarship

Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.

After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …


Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale Jan 2008

Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale

Faculty Scholarship

Unaccountable power at any layer of online life can stifle innovation elsewhere. Dominant search engines rightly worry that carriers will use their control of the physical layer of internet infrastructure to pick winners among content and application providers. Though they advocate net neutrality, they have been much less quick to recognize the threat to openness and fair play their own practices may pose.

Just as dominant search engines fear an unfairly tiered online world, they should be required to provide access to their archives and indices in a nondiscriminatory manner. If dominant search engines want carriers to disclose their traffic …


The Google Dilemma, James Grimmelmann Jan 2008

The Google Dilemma, James Grimmelmann

Faculty Scholarship

No abstract provided.


Accidental Privacy Spills, James Grimmelmann Jan 2008

Accidental Privacy Spills, James Grimmelmann

Faculty Scholarship

No abstract provided.


The Next Frontier For Network Neutrality, Philip J. Weiser Jan 2008

The Next Frontier For Network Neutrality, Philip J. Weiser

Publications

The challenge for policymakers evaluating calls to institute some form of network neutrality regulation is to bring reasoned analysis to bear on a topic that continues to generate more heat than light and that many telecommunications companies appear to believe will just fade away. Over the fall of 2007, the hopes of broadband providers that broadband networks could escape any form of regulatory oversight were dealt a blow when it was revealed that Comcast had degraded the experience of some users of Bittorent (a peer-to-peer application) and engaged in an undisclosed form of network management. This incident, as well as …


Network Neutrality And The False Promise Of Zero-Price Regulation, C. Scott Hemphill Jan 2008

Network Neutrality And The False Promise Of Zero-Price Regulation, C. Scott Hemphill

Center for Contract and Economic Organization

This Article examines zero-price regulation, the major distinguishing feature of many modern "network neutrality" proposals. A zero-price rule prohibits a broadband Internet access provider from charging an application or content provider (collectively, "content provider") to send information to consumers. The Article differentiates two access provider strategies thought to justify a zero-price rule. Exclusion is anticompetitive behavior that harms a content provider to favor its rival. Extraction is a toll imposed upon content providers to raise revenue. Neither strategy raises policy concerns that justify implementation of a broad zero-price rule. First, there is no economic exclusion argument that justifies the zero-price …


A Guide To Searching Cyberspace Law Online, Jennifer L. Selby Jan 2008

A Guide To Searching Cyberspace Law Online, Jennifer L. Selby

Law Librarian Scholarship

Cyberspace law is an umbrella term that touches on and encompasses many different areas of the law, including Internet, intellectual property, cybercrime, e-commerce, and privacy, among others. Cyberspace law includes aspects of United States law, in addition to foreign, comparative, and international law.1 Today, legal researchers in cyberspace law can enhance their search capabilities with web-based resources, including primary and secondary materials. Many of the resources discussed here are available freely on the Internet. For those resources that are licensed and networked, researchers may access them only at subscribing law libraries, and not remotely.2


The Memory Gap In Surveillance Law, Patricia L. Bellia Jan 2008

The Memory Gap In Surveillance Law, Patricia L. Bellia

Journal Articles

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Open Code Governance, Danielle K. Citron Jan 2008

Open Code Governance, Danielle K. Citron

Faculty Scholarship

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person's eligibility for public benefits. Computer systems store sensitive personal information. These systems' closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program's source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …


Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison Jan 2008

Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison

Articles

This essay, prepared as part of a Symposium on intellectual property law and business models, suggests the re-examination of the role of intellectual property law in the persistence of cultural forms of all sorts, including (but not limited to) business models. Some argue that the absence of intellectual property law inhibits the emergence of durable or persistent cultural forms; copyright and patent regimes are justified precisely because they supply foundations for durability. The essay tests that proposition via brief reviews of three persistent but very different cultural models, each of which represents a distinct form of American culture: The Rocky …