Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (10)
- University of Maryland Francis King Carey School of Law (5)
- Columbia Law School (4)
- Brooklyn Law School (3)
- University of Pittsburgh School of Law (3)
-
- Boston University School of Law (2)
- Cornell University Law School (2)
- Georgetown University Law Center (2)
- Georgia State University College of Law (2)
- Notre Dame Law School (2)
- Villanova University Charles Widger School of Law (2)
- Florida A&M University College of Law (1)
- Maurer School of Law: Indiana University (1)
- University of Colorado Law School (1)
- University of Dayton (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- Keyword
-
- Adwords (9)
- Google (9)
- Trademark (9)
- Rosetta Stone (6)
- Coalition (4)
-
- Lobby (4)
- Privacy (4)
- Cyberlaw (3)
- First Amendment (3)
- Internet (3)
- Surveillance (3)
- Cybersquatting (2)
- E-mail (2)
- Electronic mail (2)
- Fourth Amendment (2)
- Internet domain name (2)
- Law and Technology (2)
- Policy change (2)
- SSRN (2)
- Search engine (2)
- Access control (1)
- Administrative Law (1)
- Ads quality (1)
- Adsense (1)
- Antitrust law (1)
- Approval (1)
- Broadband (1)
- Business models (1)
- Columbia Law Review (1)
- Common carrier (1)
- Publication
-
- Faculty Scholarship (13)
- Rosetta Stone v. Google (Joint Appendix) (10)
- Articles (4)
- Cornell Law Faculty Publications (2)
- Faculty Publications By Year (2)
-
- Journal Articles (2)
- Working Paper Series (2)
- Articles by Maurer Faculty (1)
- Center for Contract and Economic Organization (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Journal Publications (1)
- Law Librarian Scholarship (1)
- Publications (1)
- School of Law Faculty Publications (1)
- Testimony Before Congress (1)
Articles 1 - 30 of 43
Full-Text Articles in Law
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner
Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner
School of Law Faculty Publications
This article analyzes activity in virtual worlds that would constitute crime if they were committed in the real world. It reviews the evolution of virtual worlds like Second Life and notes research which indicates that more and more of our lives will move into this realm. The article then analyzes the criminalization of virtual conduct that inflicts “harm” in the real world and virtual conduct that only inflicts “harm” in the virtual world. It explains that the first category qualifies as cybercrime and can be prosecuted under existing law. Finally, it analyzes the necessity and propriety of criminalizing the second …
Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha
Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha
Faculty Scholarship
No abstract provided.
In Search Of Disappearing Information: Strategies For Preserving Access To Federal Documents On The Web, Meg Butler
In Search Of Disappearing Information: Strategies For Preserving Access To Federal Documents On The Web, Meg Butler
Faculty Publications By Year
No abstract provided.
Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Accidental Privacy Spills, James Grimmelmann
Accidental Privacy Spills, James Grimmelmann
Cornell Law Faculty Publications
The realm of privacy law has more crimes than criminals, more wrongs than wrongdoers. Some invasions of privacy are neither intentional nor negligent; it's easy to recognize the harm, but hard to pin the blame.
Laurie Garrett attended the World Economic Forum as a journalist and wrote a private email to a few close friends, only to see that email end up on a widely-read weblog.
This essay tells the story of that inevitable accident: an "accident" in that it needn't have happened, but "inevitable" in that there's no principled way to prevent similar misunderstandings from recurring, again and again …
Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Passport Files: Privacy Protection Needed For All Americans: Hearing Before The S. Comm. On The Judiciary, 110th Cong., July 10, 2008 (Statement Of Marc Rotenberg, Adjunct Prof. Of Law, Geo. U. L. Center), Marc Rotenberg
Testimony Before Congress
No abstract provided.
Peasants, Tanners, And Psychiatrists: Using Films To Teach Comparative Law, Joseph W. Dellapenna
Peasants, Tanners, And Psychiatrists: Using Films To Teach Comparative Law, Joseph W. Dellapenna
Working Paper Series
Films have proven to be a useful teaching tool for a course on Comparative Law. The films serve to introduce the class to the look and feel of legal proceedings from selected foreign legal systems and to illustrate particular aspects of how these legal proceedings differ from our own. The article summarizes the results of more than 10 years of experience in using films. It will be of interest to others who teach Comparative Law and also to lawyers, judges, and students who want a video means of oriented themselves to foreign legal traditions. The article discusses the limitations of …
Vol. Ix, Tab 41 - Ex 23 - Email From John Ramsey (Rosetta Stone Corporate Counsel), John Ramsey
Vol. Ix, Tab 41 - Ex 23 - Email From John Ramsey (Rosetta Stone Corporate Counsel), John Ramsey
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 31 - Email From John Ramsey (Rosetta Corporate Counsel), John Ramsey
Vol. Ix, Tab 46 - Ex. 31 - Email From John Ramsey (Rosetta Corporate Counsel), John Ramsey
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vii, Tab 38 - Ex. 62 - Hagan Deposition (Former Google Managing Counsel - Trademarks, Jewelry Maker), Rose Hagan
Vol. Vii, Tab 38 - Ex. 62 - Hagan Deposition (Former Google Managing Counsel - Trademarks, Jewelry Maker), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vii, Tab 38 - Ex. 64 - Holden Deposition (Google Pm Director), Richard T. Holden
Vol. Vii, Tab 38 - Ex. 64 - Holden Deposition (Google Pm Director), Richard T. Holden
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 18 - Email From Gina Reinhold (Adwords Associate), Gina Reinhold
Vol. Ix, Tab 46 - Ex. 18 - Email From Gina Reinhold (Adwords Associate), Gina Reinhold
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vi, Tab 38 - Ex. 36 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 36 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Substantive Media Regulation In Three Dimenstions, Gregory P. Magarian
Substantive Media Regulation In Three Dimenstions, Gregory P. Magarian
Working Paper Series
Changes in the political and regulatory climates are prompting calls to revive substantive government regulation of the broadcast media, specifically the now-defunct fairness doctrine. In this article, Professor Magarian attempts to sharpen the present debate over substantive regulation by closely examining earlier defenses and criticisms of the fairness doctrine. The article assesses how supporters and opponents of the fairness doctrine have characterized three issues essential for assessing the doctrine’s wisdom and constitutionality: who is regulating; who is being regulated; and the goal of the regulatory scheme. As to the first issue, who is regulating, fairness doctrine supporters emphasize the democratic …
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Faculty Scholarship
No abstract provided.
Vol. Ix, Tab 41 - Ex. 4 - Google Ad Partners All-Hands Q1 2008, Google
Vol. Ix, Tab 41 - Ex. 4 - Google Ad Partners All-Hands Q1 2008, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Information Policy For The Library Of Babel, James Grimmelmann
Information Policy For The Library Of Babel, James Grimmelmann
Cornell Law Faculty Publications
The image of Borges's Library of Babel, which contains all possible books, is haunting and suggestive. This essay asks what we would do if we were advising a Federal Library Commission on how to deal with the Library's vast holdings and overwhelming disorganization. This thought exercise provides a set of sensible principles for information policy in an age of extreme informational abundance.
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Faculty Scholarship
Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.
After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Faculty Scholarship
Unaccountable power at any layer of online life can stifle innovation elsewhere. Dominant search engines rightly worry that carriers will use their control of the physical layer of internet infrastructure to pick winners among content and application providers. Though they advocate net neutrality, they have been much less quick to recognize the threat to openness and fair play their own practices may pose.
Just as dominant search engines fear an unfairly tiered online world, they should be required to provide access to their archives and indices in a nondiscriminatory manner. If dominant search engines want carriers to disclose their traffic …
The Google Dilemma, James Grimmelmann
Accidental Privacy Spills, James Grimmelmann
Accidental Privacy Spills, James Grimmelmann
Faculty Scholarship
No abstract provided.
The Next Frontier For Network Neutrality, Philip J. Weiser
The Next Frontier For Network Neutrality, Philip J. Weiser
Publications
The challenge for policymakers evaluating calls to institute some form of network neutrality regulation is to bring reasoned analysis to bear on a topic that continues to generate more heat than light and that many telecommunications companies appear to believe will just fade away. Over the fall of 2007, the hopes of broadband providers that broadband networks could escape any form of regulatory oversight were dealt a blow when it was revealed that Comcast had degraded the experience of some users of Bittorent (a peer-to-peer application) and engaged in an undisclosed form of network management. This incident, as well as …
Network Neutrality And The False Promise Of Zero-Price Regulation, C. Scott Hemphill
Network Neutrality And The False Promise Of Zero-Price Regulation, C. Scott Hemphill
Center for Contract and Economic Organization
This Article examines zero-price regulation, the major distinguishing feature of many modern "network neutrality" proposals. A zero-price rule prohibits a broadband Internet access provider from charging an application or content provider (collectively, "content provider") to send information to consumers. The Article differentiates two access provider strategies thought to justify a zero-price rule. Exclusion is anticompetitive behavior that harms a content provider to favor its rival. Extraction is a toll imposed upon content providers to raise revenue. Neither strategy raises policy concerns that justify implementation of a broad zero-price rule. First, there is no economic exclusion argument that justifies the zero-price …
A Guide To Searching Cyberspace Law Online, Jennifer L. Selby
A Guide To Searching Cyberspace Law Online, Jennifer L. Selby
Law Librarian Scholarship
Cyberspace law is an umbrella term that touches on and encompasses many different areas of the law, including Internet, intellectual property, cybercrime, e-commerce, and privacy, among others. Cyberspace law includes aspects of United States law, in addition to foreign, comparative, and international law.1 Today, legal researchers in cyberspace law can enhance their search capabilities with web-based resources, including primary and secondary materials. Many of the resources discussed here are available freely on the Internet. For those resources that are licensed and networked, researchers may access them only at subscribing law libraries, and not remotely.2
The Memory Gap In Surveillance Law, Patricia L. Bellia
The Memory Gap In Surveillance Law, Patricia L. Bellia
Journal Articles
U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …
Open Code Governance, Danielle K. Citron
Open Code Governance, Danielle K. Citron
Faculty Scholarship
Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person's eligibility for public benefits. Computer systems store sensitive personal information. These systems' closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program's source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …
Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison
Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison
Articles
This essay, prepared as part of a Symposium on intellectual property law and business models, suggests the re-examination of the role of intellectual property law in the persistence of cultural forms of all sorts, including (but not limited to) business models. Some argue that the absence of intellectual property law inhibits the emergence of durable or persistent cultural forms; copyright and patent regimes are justified precisely because they supply foundations for durability. The essay tests that proposition via brief reviews of three persistent but very different cultural models, each of which represents a distinct form of American culture: The Rocky …