Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet

2004

Discipline
Institution
Publication

Articles 1 - 18 of 18

Full-Text Articles in Law

Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


6th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2004, Department Of Attorney General, State Of Rhode Island Aug 2004

6th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2004, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Communicating Entitlements: Property And The Internet, William Hubbard Apr 2004

Communicating Entitlements: Property And The Internet, William Hubbard

All Faculty Scholarship

No abstract provided.


Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll Jan 2004

Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Many participants in the music industry consider unauthorized transmissions of music files over the Internet to be theft of their property. Many Internet users who exchange music files reject this characterization. Prompted by the dispute over unauthorized music distribution, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing music making in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some …


Fire, Metaphor, And Constitutional Myth-Making, Robert Tsai Jan 2004

Fire, Metaphor, And Constitutional Myth-Making, Robert Tsai

Articles in Law Reviews & Other Academic Journals

From the standpoint of traditional legal thought, metaphor is at best a dash of poetry adorning lawyerly analysis, and at worst an unjustifiable distraction from what is actually at stake in a legal contest. By contrast, in the eyes of those who view law as a close relative of ordinary language, metaphor is a basic building block of human understanding. This article accepts that metaphor helps us to comprehend a court's decision. At the same time, it argues that metaphor plays a special role in the realm of constitutional discourse. Metaphor in constitutional law not only reinforces doctrinal categories, but …


Taxing The New Intellectual Property Right, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2004

Taxing The New Intellectual Property Right, Xuan-Thao Nguyen, Jeffrey A. Maine

Articles

Current, albeit arbitrary, rules exist governing the tax treatment of traditional forms of intellectual property, such as patents, trade secrets, copyrights, trademarks, and trade names. While tax principles exist for these traditional intellectual property and intangible rights, specific tax rules do not exist for new intellectual property rights, such as domain names, that are emerging with the arrival of global electronic commerce transactions on the Internet. This article explores the proper tax treatment of domain name registration and acquisition costs, addressing these parallel questions? Are domain names merely variations of traditional forms of intellectual property and other intangible rights to …


Introduction: A Regulatory Regime For The Internet Age, Philip J. Weiser Jan 2004

Introduction: A Regulatory Regime For The Internet Age, Philip J. Weiser

Publications

No abstract provided.


The Hegemony Of The Copyright Treatise, Ann Bartow Jan 2004

The Hegemony Of The Copyright Treatise, Ann Bartow

Law Faculty Scholarship

This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.

Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …


New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers Jan 2004

New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This article addresses the general principles of attempt liability, including a description of the doctrines of factual and legal impossibility and the rationale behind the historical treatment of these defenses. Part III describes recent Internet attempt cases, and Part IV analyzes issues raised by such cases. This article suggests that the new Internet cases provide further rationale for rejecting a distinction between factual and legal impossibility that would allow the latter to be a defense. This article also discusses issues surrounding the appropriate mens rea for attempt, and its applicability to Internet cases, where the defendants claim ignorance or indifference …


Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia Jan 2004

Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia

Journal Articles

The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.

This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …


Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue Jan 2004

Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue

Law Faculty Publications

The international community has been struggling with questions of who should regulate the Internet and how, but little consensus has emerged. For the United States, consideration of the pros and cons of the alternative jurisdictional approaches to e-commerce and cyberspace is complicated by an overlay of constitutional law. While the rest of the world considers the policy implications of a country of origin versus a country of destination approach, the United States is wrestling with what constitutes "purposeful availment" under the Due Process Clause.

The Supreme Court has never squarely considered what limits the Fifth Amendment imposes on assertions of …


The Narratives Of Cyberspace Law (Or, Learning From Casablanca), Michael J. Madison Jan 2004

The Narratives Of Cyberspace Law (Or, Learning From Casablanca), Michael J. Madison

Articles

Cyberspace scholars have wrestled extensively with the question of the "right" metaphorical approach to the Internet, in order to guide legal and policy decisions. Literary theorists have wrestled with the perception that cyberspace undermines conventional ideas about narrative. This Essay suggests that each group could learn from the other. Cyberspace tells a better story than literary scholars believe, and the lawyers should pay more attention to the narrative attributes of cyberspace. To illustrate the argument, the Essay proposes a specific story framework for cyberspace: the film Casablanca.


Wings For Talons: The Case For Extraterritorial Jurisdiction Over Sexual Exploitation Of Children Through Cyberspace, Christopher L. Blakesley Jan 2004

Wings For Talons: The Case For Extraterritorial Jurisdiction Over Sexual Exploitation Of Children Through Cyberspace, Christopher L. Blakesley

Scholarly Works

To cope more effectively with the changed landscape of child exploitation, it is necessary for laws to expand their extraterritorial reach. Some statutes in the “child exploitation arena” have already been ruled to apply extraterritorially. The prime example of this is 18 U.S.C. § 2252 (2004) (certain activities relating to the material involving the sexual exploitation of minors). Two of the more useful statutes in combating online pedophiles are 18 U.S.C. § 1470 (2003) (transfer of obscene materials to minors) and 18 U.S.C. § 2422 (2003) (coercion and enticement). These latter statutes, however, have yet to receive significant or …


Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield Jan 2004

Cracks In The Foundation: The New Internet Legislation's Hidden Threat To Privacy And Commerce, Joshua Fairfield

Articles by Maurer Faculty

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations.

A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


Toward A Constitutional Regulation Of Minors' Access To Harmful Internet Speech, Dawn C. Nunziato Jan 2004

Toward A Constitutional Regulation Of Minors' Access To Harmful Internet Speech, Dawn C. Nunziato

GW Law Faculty Publications & Other Works

In this article, I scrutinize Congress's recent efforts to regulate access to sexually-themed Internet speech. The first such effort, embodied in the Communications Decency Act, failed to take into account the Supreme Court's carefully-honed obscenity and obscenity-for-minors jurisprudence. The second, embodied in the Child Online Protection Act, attended carefully to Supreme Court precedent, but failed to account for the geographic variability in definitions of obscene speech. Finally, the recently-enacted Children's Internet Protection Act apparently remedies the constitutional deficiencies identified in these two prior legislative efforts, but runs the risk of being implemented in a manner that fails to protect either …


Copyright Non–Compliance (Or Why We Can’T “Just Say Yes” To Licensing)., Jessica D. Litman Jan 2004

Copyright Non–Compliance (Or Why We Can’T “Just Say Yes” To Licensing)., Jessica D. Litman

Book Chapters

I have complained more than once over the past few years that the copyright law is complicated, arcane, and counterintuitive; and that the upshot of that is that people don't believe that the copyright law says what it does say. People do seem to buy into copyright norms, but they don't translate those norms into the rules that the copyright statute does; they find it very hard to believe that there's really a law out there that says the stuff the copyright law says.


Fire, Metaphor, And Constitutional Myth-Making, Robert L. Tsai Jan 2004

Fire, Metaphor, And Constitutional Myth-Making, Robert L. Tsai

Faculty Scholarship

From the standpoint of traditional legal thought, metaphor is at best a dash of poetry adorning lawyerly analysis, and at worst an unjustifiable distraction from what is actually at stake in a legal contest. By contrast, in the eyes of those who view law as a close relative of ordinary language, metaphor is a basic building block of human understanding. This article accepts that metaphor helps us to comprehend a court's decision. At the same time, it argues that metaphor plays a special role in the realm of constitutional discourse. Metaphor in constitutional law not only reinforces doctrinal categories, but …


The International Privacy Regime, Tim Wu Jan 2004

The International Privacy Regime, Tim Wu

Faculty Scholarship

Privacy has joined one of many areas of law understandable only by reference to the results of overlapping and conflicting national agendas. What has emerged as the de facto international regime is complex. Yet based on a few simplifying principles, we can nonetheless do much to understand it and predict its operation.

First, the idea that self-regulation by the internet community will be the driving force in privacy protection must be laid to rest. The experience of the last decade shows that nation-states, powerful nation-states in particular, drive the system of international privacy. The final mix of privacy protection that …