Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2003

Internet Law

Institution
Keyword
Publication

Articles 1 - 27 of 27

Full-Text Articles in Law

Does Your Website Put You At Risk?—Liability Issues In Using Third Party Content: Global Perspectives, James Maxeiner Nov 2003

Does Your Website Put You At Risk?—Liability Issues In Using Third Party Content: Global Perspectives, James Maxeiner

All Faculty Scholarship

This presentation examines some of the new laws that affect the liability risks faced by online service providers that rely in part or in whole on information posted or otherwise provided by third parties, both with respect to issues associated with liability for defamatory information and to infringement issues.

In this presentation we are going to consider first the most important areas of liability for distribution of third party content. These laws pre-date the Internet and continue in force. We will then consider liability for third party content under the most important of those laws. Finally, we will consider how …


Four Common Misconceptions About Copyright Piracy, Peter K. Yu Oct 2003

Four Common Misconceptions About Copyright Piracy, Peter K. Yu

Faculty Scholarship

Copyright piracy is one of the most difficult, yet important, transnational problems in the twenty-first century. Although legal literature has discussed copyright piracy extensively, commentators rarely offer a "grand unified theory" on this global problem. Rather, they give nuanced analyses, discussing the many aspects of the problem-political, social, economic, cultural, and historical.

This nuanced discussion, however, is missing in the current public debate. To capture the readers' emotion and to generate support for proposed legislative and executive actions, the debate often oversimplifies the complicated picture by overexagerrating a particular aspect of the piracy problem or by offering an abbreviated, easy-to-understand, …


A Road To No Warez: The No Electronic Theft Act And Criminal Copyright Infringement, Eric Goldman Jul 2003

A Road To No Warez: The No Electronic Theft Act And Criminal Copyright Infringement, Eric Goldman

Faculty Publications

In the second half of the 1990s, copyright owners repeatedly sought Congress's help addressing the challenges posed by the Internet and other new technologies. Congress responded with a suite of new protections, including restrictions against circumvention, longer copyright terms, increased statutory damages, and criminalization of willful non-commercial infringement.

This Article examines the latter of those changes, effectuated through the No Electronic Theft Act (the "Act" or the "NET Act"). The Act represents a significant change to copyright law be cause it subtly shifts the paradigm underlying criminal copyright infringement.

Part I of this Article discusses the Act's development, from the …


A Solution To The Yahoo! Problem? The Ec E-Commerce Directive As A Model For International Cooperation On Internet Choice Of Law, Mark F. Kightlinger Apr 2003

A Solution To The Yahoo! Problem? The Ec E-Commerce Directive As A Model For International Cooperation On Internet Choice Of Law, Mark F. Kightlinger

Law Faculty Scholarly Articles

In May 2000, a French court decided that a French law banning the display of Nazi materials for sale applies to an auction website hosted by the California-based company Yahoo! Inc. The following year, at the request of Yahoo! Inc., a U.S. District Court declared that the French judgment was unenforceable in the United States because enforcing it would violate an important public policy-the First Amendment. These two cases have attracted considerable attention because they crystallize a difficult problem. The Internet is global. Every website potentially reaches every home on the planet. Thus, website content or activity that may be …


Cyberplace: Defining A Right To Internet Access Through Public Accommodation Law, Colin Crawford Jan 2003

Cyberplace: Defining A Right To Internet Access Through Public Accommodation Law, Colin Crawford

Publications

Following the introduction, Part II makes the case that public accommodation law is an appropriate legal vehicle to establish a right of Internet access. Part III begins with a brief review of the current state of public accommodation law followed by a consideration, in light of that review, of some of the possible limitations of public accommodation principles for regulating the Internet. I will then identify which aspects of the Internet should be classified as places of public accommodation. In this connection, I will examine debates about the nature and scope of public accommodation principles as they apply to persons …


Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky Jan 2003

Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky

Faculty Scholarship

This paper addresses the collection of "clickstream data," and sets forth a theory about the legal rules that should govern it. At the outset, I propose a typology for categorizing privacy invasions. A given state of informational privacy may be represented by: the observed behavior, the collecting agent, and the searching agent. Using this typology, I identify the specific sources of concern about collection of clickstream data. Then, based on expected levels of utility and expected transaction costs of "flipping" to a different rule, I argue for a particular set of privacy defaults for data mining.


Habermas@Discourse.Net: Toward A Critical Theory Of Cyberspace, A. Michael Froomkin Jan 2003

Habermas@Discourse.Net: Toward A Critical Theory Of Cyberspace, A. Michael Froomkin

Articles

No abstract provided.


Regulatory Challenges And Models Of Regulation, Philip J. Weiser Jan 2003

Regulatory Challenges And Models Of Regulation, Philip J. Weiser

Publications

No abstract provided.


The Right To Receive Information, Susan Nevelow Mart Jan 2003

The Right To Receive Information, Susan Nevelow Mart

Publications

Ms. Mart examines the legal evolution of the right to receive information, particularly focusing on its application to libraries, beginning with the Supreme Court holding in Board of Education v. Pico, and followed by cases that have considered the meaning of Pico in a variety of library-related contexts.


Captive Audiences, Children And The Internet, William D. Araiza Jan 2003

Captive Audiences, Children And The Internet, William D. Araiza

Faculty Scholarship

No abstract provided.


Fragmented Copyright, Fragmented Management: Proposals To Defrag Copyright Management, Daniel J. Gervais, Alana Maurushat Jan 2003

Fragmented Copyright, Fragmented Management: Proposals To Defrag Copyright Management, Daniel J. Gervais, Alana Maurushat

Vanderbilt Law School Faculty Publications

The collective management of copyright in Canada was conceived as a solution to alleviate the problem of inefficiency of individual rights management. Creators could not license, collect and enforce copyright efficiently on an individual basis. Requiring users to obtain permission from individual copyright holders for the use of a work was equally inefficient. Collectives, therefore, emerged to facilitate the clearance of rights between creators and users. Even with the facilitation of collectives in the process, clearing rights remains an inherently difficult and convoluted process. This is especially so in the age of the Internet where clearing rights for multimedia products …


Commentary: Time To Hug A Bureaucrat, A. Michael Froomkin Jan 2003

Commentary: Time To Hug A Bureaucrat, A. Michael Froomkin

Articles

No abstract provided.


Toward A Next Generation Regulatory Strategy, Philip J. Weiser Jan 2003

Toward A Next Generation Regulatory Strategy, Philip J. Weiser

Publications

The FCC is now facing a set of issues that will help shape the future evolution of the Internet and the role of government in its development. In particular, the FCC is in the midst of designing a regulatory regime for broadband platforms. To do so, the FCC must decide both on the appropriate regulatory classification for such platforms and what legal rules (if any) should govern access to such platforms. This Article explains how the FCC, using its "ancillary jurisdiction" authority under Title I of the Communications Act, can develop a reactive regulatory regime that examines allegations of discriminatory …


Modularity, Vertical Integration, And Open Access Policies: Towards A Convergence Of Antitrust And Regulation In The Internet Age, Joseph Farrell, Philip J. Weiser Jan 2003

Modularity, Vertical Integration, And Open Access Policies: Towards A Convergence Of Antitrust And Regulation In The Internet Age, Joseph Farrell, Philip J. Weiser

Publications

Antitrust law and telecommunications regulation have long adopted different stances on whether to mandate open access to information platforms. This article aims to help regulators and commentators incorporate both Chicago School and post-Chicago School arguments in evaluating this basic policy choice, suggesting how they can be integrated in an effective manner. In particular, the authors outline three alternative models that the FCC could adopt to guide its regulation of information platforms and facilitate a true convergence between antitrust and regulatory policy.


The Internet, Innovation, And Intellectual Property Policy, Philip J. Weiser Jan 2003

The Internet, Innovation, And Intellectual Property Policy, Philip J. Weiser

Publications

The Internet continues to transform the information industries and challenge intellectual property law to develop a competition policy strategy to regulate networked products. In particular, inventors of "information platforms" that support the viewing of content-be they instant messaging systems, media players, or Web browsers-face a muddled set of legal doctrines that govern the scope of available intellectual property protection. This uncertainty reflects a fundamental debate about what conditions will best facilitate innovation in the information industries--a debate most often played out at the conceptual extremes between the "commons" and "proprietary control" approaches to the Internet and intellectual property policy.

This …


Does The Children’S Internet Protection Act Induce Public Libraries To Violate The First Amendment?, Susanna Frederick Fischer Jan 2003

Does The Children’S Internet Protection Act Induce Public Libraries To Violate The First Amendment?, Susanna Frederick Fischer

Scholarly Articles

The Children's Internet Protection Act contains filtering provisions for public libraries that condition the receipt of federal assistance for Internet access and related services on libraries' operation of technologi­cal measures that block all patrons' access to obscene and pornographic materials and also block minor patrons' access to material that is "harmful to minors." Now the Supreme Court has agreed to review a trial court's decision that enjoined the government from enforcing these filtering provisions on the basis that they are facially invalid under the First Amendment.


Rights Of Access And The Shape Of The Internet, Michael J. Madison Jan 2003

Rights Of Access And The Shape Of The Internet, Michael J. Madison

Articles

This Article reviews recent developments in the law of access to information, that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …


States And Internet Enforcement, Joel R. Reidenberg Jan 2003

States And Internet Enforcement, Joel R. Reidenberg

Faculty Scholarship

This essay addresses the enforcement of decisions through internet instruments. The starting point is a brief justification of internet enforcement as the obligation of democratic states. Next, the essay argues that the movement to re-engineer the internet infrastructure by public and private actions also facilitates state enforcement of legal and policy decisions. The essay maintains that states will increasingly try to use network intermediaries such as payment systems and Internet Service Providers as enforcement instruments. Finally, and most importantly, the essay focuses on ways that states may harness the power of technological instruments such as worms, filters and packet interceptors …


Reconstructing The Software License, Michael J. Madison Jan 2003

Reconstructing The Software License, Michael J. Madison

Articles

This article analyzes the legitimacy of the software license as a institution of governance for computer programs. The question of the open source license is used as a starting point. Having conducted a broader inquiry into the several possible bases for the legitimacy of software licensing in general, the article argues that none of the grounds on which software licensing in general rests are sound. With respect to open source software in particular, the article concludes that achieving a legitimate institutional form for the goals that open source proponents have set for themselves may require looking beyond licensing as such.


Designing Deliberative Democracy In Cyberspace: The Role Of The Cyber-Lawyer, Beth Simone Noveck Jan 2003

Designing Deliberative Democracy In Cyberspace: The Role Of The Cyber-Lawyer, Beth Simone Noveck

Articles & Chapters

No abstract provided.


Icann And Antitrust, A. Michael Froomkin Jan 2003

Icann And Antitrust, A. Michael Froomkin

Articles

National identification ("ID") cards appear increasingly inevitable. National ID cards have the potential to be repressive and privacy destroying, but it is also possible to design a system that captures more benefits than costs. Because the United States currently lacks a single, reliable credential, private businesses have trouble authenticating their customers and matching data among distributed databases. This Article argues that the desire for reliable ID creates a window of opportunity for the federal government to strike a bargain: offer private businesses the use of a reliable credential in the form of a national ID card, on the condition that …


Digital Architecture As Crime Control, Neal K. Katyal Jan 2003

Digital Architecture As Crime Control, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House's recent proposals on cybersecurity.

The paper begins by introducing four concepts of …


Network Neutrality, Broadband Discrimination, Tim Wu Jan 2003

Network Neutrality, Broadband Discrimination, Tim Wu

Faculty Scholarship

Communications regulators over the next decade will spend increasing time on conflicts between the private interests of broadband providers and the public's interest in a competitive innovation environment centered on the Internet. As the policy questions this conflict raises are basic to communications policy, they are likely to reappear in many different forms. So far, the first major appearance has come in the "open access" (or "multiple access") debate, over the desirability of allowing vertical integration between Internet Service Providers and cable operators. Proponents of open access see it as a structural remedy to guard against an erosion of the …


New Models Of Regulation And Interagency Governance, Christopher S. Yoo Jan 2003

New Models Of Regulation And Interagency Governance, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo Jan 2003

Access To Networks: Economic And Constitutional Connections, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

A fundamental transformation is taking place in the basic approach to regulating network industries. Policy makers are in the process of abandoning their century-old commitment to rate regulation in favor of a new regulatory approach known as access regulation. Rather than controlling the price of outputs, the new approach focuses on compelling access to and mandating the price of inputs. Unfortunately, this shift in regulatory policy has not been met with an accompanying shift in the manner in which regulatory authorities regulate prices. Specifically, policy makers have continued to base rates on either historical or replacement cost. We argue that …


On The Macroeconomic Effects Of Establishing Tradability In Weak Property Rights, Gunnar Eliasson, Clas Wihlborg Jan 2003

On The Macroeconomic Effects Of Establishing Tradability In Weak Property Rights, Gunnar Eliasson, Clas Wihlborg

Business Faculty Articles and Research

The New Economy is closely associated with computing & communications technology, notably the Internet. We discuss property rights to, and trade in, the difficult-to-define intangible assets increasingly dominating the New Economy, and the possibility of under-investment in these assets. For a realistic analysis we introduce a Schumpeterian market environment (the experimentally organized economy). Weak property rights prevail when the rights to access, use, andtrade in intangible assets cannot be fully exercised. The trade-off between the benefits of open access on the Internet, and the incentive effects of strengthened property rights, depend both on the particular strategy a firm employs to …


When Code Isn't Law, Tim Wu Jan 2003

When Code Isn't Law, Tim Wu

Faculty Scholarship

When the Supreme Court upheld extended copyright terms in Eldred v. Ascroft, many Internet activists called for renewed political action in the form of appeals to Congress or even a campaign to amend the Constitution. But others suggested a very different course: They argued that it would be wiser to forgo institutions controlled by the powers of the past, and to return instead to the keyboard to write the next generation of "lawbusting" code. In the words of one observer, "tech people are probably better off spending their energy writing code than being part of the political process" because …