Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Sony, Tort Doctrines, And The Puzzle Of Peer-To-Peer, Alfred C. Yen Feb 2005

Sony, Tort Doctrines, And The Puzzle Of Peer-To-Peer, Alfred C. Yen

Boston College Law School Faculty Papers

This Article analyzes and reconstructs the law of third party copyright liability as it applies to providers of peer-to-peer technology. By doing so, the Article accomplishes three things. First, it identifies doctrinal tension between broad third party copyright liability endorsed by lower courts and the Supreme Court’s skepticism of such liability as expressed in Sony Corporation of America v. Universal City Studios. Second, it describes how existing interpretations of the law fail to direct judicial attention to important considerations that ought to influence the third party copyright liability of peer-to-peer providers. Third, it uses concepts borrowed from common law ...


Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford Jan 2005

Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford

Law Faculty Scholarship

Unsolicited bulk commercial email is an increasing problem, and though many states have passed laws aimed at curbing its use and abuse, for several years the federal government took no action. In 2003 that changed when Congress passed the CAN-SPAM Act. Though the law contains many different restrictions on spam messages, including some restriction of nearly every type that states had adopted, the Act was widely criticized as weak. Many of the CAN-SPAM Act's provisions are weaker than corresponding provisions of state law, and the Act preempts most state spam laws that would go farther, including two state laws ...


Rewriting The Telecom Act: An Introduction, Philip J. Weiser Jan 2005

Rewriting The Telecom Act: An Introduction, Philip J. Weiser

Articles

No abstract provided.


Playing Hide And Seek: How To Protect Virtual Pornographers And Actual Children On The Internet, Audrey Rogers Jan 2005

Playing Hide And Seek: How To Protect Virtual Pornographers And Actual Children On The Internet, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article considers the Supreme Court's suggestion and recommends a mechanism to regulate the virtual pornography market in a manner that balances the rights of virtual pornographers with the prosecution of actual child pornographers. Part II traces the events leading up to the Free Speech decision, commencing with the enactment of the Child Pornography Prevention Act of 1996 (CPPA). Part III discusses the Free Speech opinion and the post-Free Speech cases. Part IV examines the PROTECT Act--the legislative response to the Supreme Court's decision. Part V concludes that regulation of the virtual pornography industry is the most effective ...


The Promise Of Internet Intermediary Liability, Ronald J. Mann, Seth R. Belzley Jan 2005

The Promise Of Internet Intermediary Liability, Ronald J. Mann, Seth R. Belzley

Faculty Scholarship

The Internet has transformed the economics of communication, creating a spirited debate about the proper role of federal, state, and international governments in regulating conduct related to the Internet. Many argue that Internet communications should be entirely self-regulated because such communications cannot or should not be the subject of government regulation. The advocates of that approach would prefer a no-regulation zone around Internet communications, based largely on the unexamined view that Internet activity is fundamentally different in a way that justifies broad regulatory exemption. At the same time, some kinds of activity that the Internet facilitates undisputedly violate widely shared ...