Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2009

Internet Law

Institution
Keyword
Publication

Articles 1 - 30 of 61

Full-Text Articles in Law

Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen Dec 2009

Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen

Faculty Scholarship

Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated networks. Additionally, the government relies almost completely on civilian providers for computer software and hardware products, services, and maintenance. This near-complete intermixing of civilian and military computer infrastructure makes many of those civilian objects and providers legitimate targets under the law of armed conflict. Other civilian networks, services, and communications may suffer collateral damage from legitimate attacks on government targets. To protect those civilian objects and providers from the effects of attacks, the law of armed conflict requires a state to segregate its military assets from the civilian population and …


Vol. Xxiv, Tab 61 - Ex. 2 - Rosetta Stone's Answers To Google's First Set Of Interrogatories, Rosetta Stone Dec 2009

Vol. Xxiv, Tab 61 - Ex. 2 - Rosetta Stone's Answers To Google's First Set Of Interrogatories, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 37 - Expert Report Of Dr. Kent D. Van Liere, Kent Van Liere Dec 2009

Vol. Ix, Tab 46 - Ex. 37 - Expert Report Of Dr. Kent D. Van Liere, Kent Van Liere

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Comments On Expanding Civic Participation In Voting By Expanded Use Of The Internet, Candice Hoke Dec 2009

Comments On Expanding Civic Participation In Voting By Expanded Use Of The Internet, Candice Hoke

Law Faculty Presentations and Testimony

Hoke's comments to the FCC on expanding civic participation in voting by expanded use of the Internet. Hoke recommends that the FCC not become involved in election regulatory issues concerning the Internet, but will support a different federal regulatory agency with national security and technical-cybersecurity expertise receiving primary jurisdiction over election cybersecurity.


The Evolution Of Copyright Law In The Arts, Kevin Liftig Dec 2009

The Evolution Of Copyright Law In The Arts, Kevin Liftig

Honors Scholar Theses

As digital storage of intellectual goods such as literature and music has become widespread, the duplication and unlicensed distribution of these goods has become a frequent source of legal contention. When technology for production and replication of intellectual goods advanced, there were disputes concerning the rights to produce and duplicate these works. As new technologies have made copies of intellectual goods more accessible, legal institutions have largely moved to protect the rights of ownership of ideas through copyright laws. This paper will examine key changes in the technology that affect intellectual property, and the responses that legal institutions have made …


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle K. Citron Dec 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle K. Citron

Faculty Scholarship

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …


The Effectiveness Of Acceptances Communicated By Electronic Means, Or – Does The Postal Acceptance Rule Apply To Email, Eliza Mik Nov 2009

The Effectiveness Of Acceptances Communicated By Electronic Means, Or – Does The Postal Acceptance Rule Apply To Email, Eliza Mik

Research Collection Yong Pung How School Of Law

The ‘traditional’ classi?cation into ‘instantaneous’ and ‘non-instantaneous’ methods of communication must be abandoned. As all Internet transmissions are instantaneous, the choice between the principle of receipt and the postal exception must be based on other criteria. The focus must be shifted from communication devices to the characteristics of the communication process. The latter resembles either dealings face-to-face or dealings at a distance. This simple division should remain the basis for all analyses. Instantaneity and control are two of many characteristics of face-to-face dealings and are not the only factors to be taken into account when making the choice between the …


Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler Oct 2009

Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview


Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler Oct 2009

Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview


Vol. Ix, Tab 46 - Ex. 45 - Email From Jason Calhoun (Rosetta Enforcement Manager), Jason Calhoun Oct 2009

Vol. Ix, Tab 46 - Ex. 45 - Email From Jason Calhoun (Rosetta Enforcement Manager), Jason Calhoun

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 41 - Ex. 18 - Email From Baris Gultekin And Trademark Report (Google Product Manager Director), Baris Gultekin Sep 2009

Vol. Ix, Tab 41 - Ex. 18 - Email From Baris Gultekin And Trademark Report (Google Product Manager Director), Baris Gultekin

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 42 - Ex. 1 - Reporter's Transcript, Motions Hearing, September 18, 2009, United States District Court For The Eastern District Of Virginia Sep 2009

Vol. Ix, Tab 42 - Ex. 1 - Reporter's Transcript, Motions Hearing, September 18, 2009, United States District Court For The Eastern District Of Virginia

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang Sep 2009

The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang

Research Collection Yong Pung How School Of Law

This paper is intended to be a contribution to the literature on claims of the democratising effect of the Internet. The paper begins by setting out the arguments and also critiques of claims of the democratising power of the Internet. In order to test the validity of these arguments, the author will undertake a comparative study of the impact of the Internet on recent general elections in Malaysia and Singapore. The study will demonstrate that in the case of Singapore, the Internet has merely exerted some pressure on the pre-existing laws and state-imposed norms governing free speech; in contrast, in …


Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin May 2009

Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Saving Facebook, James Grimmelmann May 2009

Saving Facebook, James Grimmelmann

Cornell Law Faculty Publications

This Article provides the first comprehensive analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It explains how Facebook users socialize on the site, why they misunderstand the risks involved, and how their privacy suffers as a result. Facebook offers a socially compelling platform that also facilitates peer-to-peer privacy violations: users harming each others' privacy interests. These two facts are inextricably linked; people use Facebook with the goal of sharing some information about themselves. Policymakers cannot make Facebook completely safe, but they can help people use it safely.

The Article makes …


The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann Apr 2009

The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann

Faculty Scholarship

For the past four years, Google has been systematically making digital copies of books in the collections of many major university libraries. It made the digital copies searchable through its web site--you couldn't read the books, but you could at least find out where the phrase you're looking for appears within them. This outraged copyright owners, who filed a class action lawsuit to make Google stop. Then, last fall, the parties to this large class action announced an even larger settlement: one that would give Google a license not only to scan books, but also to sell them.

The settlement …


Vol. Viii, Tab 39 - Ex. 4 - Naso News, Google Apr 2009

Vol. Viii, Tab 39 - Ex. 4 - Naso News, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 43 - Google Memorandum In Support Of Its Motion To Exclude Expert Report And Opinion Of Dr. Kent Van Liere, Google Apr 2009

Vol. Ix, Tab 43 - Google Memorandum In Support Of Its Motion To Exclude Expert Report And Opinion Of Dr. Kent Van Liere, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


How To Fix The Google Book Search Settlement, James Grimmelmann Apr 2009

How To Fix The Google Book Search Settlement, James Grimmelmann

Faculty Scholarship

The proposed settlement in the Google Book Search case should be approved with strings attached. The project will be immensely good for society, and the proposed deal is a fair one for Google, for authors, and for publishers. The public interest demands, however, that the settlement be modified first. It creates two new entities—the Books Rights Registry Leviathan and the Google Book Search Behemoth—with dangerously concentrated power over the publishing industry. Left unchecked, they could trample on consumers in any number of ways. We the public have a right to demand that those entities be subject to healthy, pro-competitive oversight, …


The Ginsburg Group: Technology: How To Stay Out Of Court, Jennifer Ballard, Lee Maglinger, Alisha Orosz, Mandy Skinner, Kevin Thomas Apr 2009

The Ginsburg Group: Technology: How To Stay Out Of Court, Jennifer Ballard, Lee Maglinger, Alisha Orosz, Mandy Skinner, Kevin Thomas

Parameters of Law in Student Affairs and Higher Education (CNS 670)

For professionals in higher education, it is our responsibility to stay on top of the ever changing landscape of technology at our colleges and universities. In order to provide the best and most convenient services, it is our objective to continue to expand the walls of higher education into the global boundaries of technology. For the purpose of this paper, the Ginsburg Group has focused on five different areas regarding the use of technology. In these areas, the information provided is our thoughts and best advice in how institutions of higher learning can avoid the courtroom. The following pages will …


Breathing New Life Into Old Technological Infrastructure: Broadband Internet As A Means Of Jump-Starting The Economy And Connecting The Country, Elizabeth Chernow Apr 2009

Breathing New Life Into Old Technological Infrastructure: Broadband Internet As A Means Of Jump-Starting The Economy And Connecting The Country, Elizabeth Chernow

Articles in Law Reviews & Journals

This paper examines the current structure of universal service and the FCC’s Universal Service Fund, recent pushes to expand the definition of and funding for universal service to include broadband access, and how broadband internet can contribute to saving the ailing economy. The paper concludes by calling for the inclusion of broadband internet in the Universal Service Fund.

Current financial support for the Universal Service Fund is problematic in that only telecommunications carriers providing interstate services are required to contribute to the fund. The author maintains that the contribution base should be expanded to include companies providing broadband internet access. …


Cyber Civil Rights, Danielle K. Citron Feb 2009

Cyber Civil Rights, Danielle K. Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Cyberthreats: The Emerging Fault Lines Of The Nation State, Susan W. Brenner Jan 2009

Cyberthreats: The Emerging Fault Lines Of The Nation State, Susan W. Brenner

School of Law Faculty Publications

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace have allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions. Who should respond, and how? How should nation-states effectively deal with a cyber-attack? Will the United States and other nation-states be able to survive in a world where virtual boundaries are …


Now You See It Now You Don't: Addressing The Issue Of Websites Which Are "Lost In Space", Patricia A. Broussard Jan 2009

Now You See It Now You Don't: Addressing The Issue Of Websites Which Are "Lost In Space", Patricia A. Broussard

Journal Publications

This article asks the following question: should the average law professor, who works mightily to churn out a large journal article every two years or so, be penalized for relying heavily on Internet citations provided full and accurate credit is given to all sources? I believe that in order to attempt to answer this question, it is important to first examine the roots of scholarship in academia and revisit its original purpose and second, to discuss the rise of technology and the impact it has had on the academy. This article will eventually set out some guidelines for the use …


Is Cyberprostitution Prostitution? New Paradigm, Old Crime, Brooke Campbell Jan 2009

Is Cyberprostitution Prostitution? New Paradigm, Old Crime, Brooke Campbell

Studio for Law and Culture

In any given industry, machines are rapidly replacing workers. Alternately celebrated as the liberation of the worker from the grind and peril of manual labor and lamented as the condemnation of the worker to lowered wages and/or the effeteness of unemployment, so-called “advances” in technology problematically recast the labor-capital relation as a human-machine relation. What does this process look like in the context of a criminalized industry like the sex industry? In this paper, I examine the way in which cyberprostitution — ostensibly, an advance in the technology of communication — places the conceptual terrain of prostitution into question. For …


Vol. Ix, Tab 46 - Ex. 2 "New Us Trademark Policy (Barnowl) Update", Google Jan 2009

Vol. Ix, Tab 46 - Ex. 2 "New Us Trademark Policy (Barnowl) Update", Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 1 "Fair Use Of Trademark Terms In Some Creatives", Google Jan 2009

Vol. Ix, Tab 46 - Ex. 1 "Fair Use Of Trademark Terms In Some Creatives", Google

Rosetta Stone v. Google (Joint Appendix)

No abstract provided.


Vol. Ix, Tab 47 - Ex. 2-9 - Documents "Rosetta Stone Competitive Website Analytics Report", Rosetta Stone Jan 2009

Vol. Ix, Tab 47 - Ex. 2-9 - Documents "Rosetta Stone Competitive Website Analytics Report", Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xiv, Tab 51 - Google's Objection To Evidence And Motion To Strike, Google Jan 2009

Vol. Xiv, Tab 51 - Google's Objection To Evidence And Motion To Strike, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xiii, Tab 50 - Google's Opposition To Rosetta Stone's Motion For Partial Summary Judgment, Google Jan 2009

Vol. Xiii, Tab 50 - Google's Opposition To Rosetta Stone's Motion For Partial Summary Judgment, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?