Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Internet Law

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 323

Full-Text Articles in Law

An Elegy For Greg Ham: Copyright Law, The Kookaburra Case, And Remix Culture, Matthew Rimmer Dec 2012

An Elegy For Greg Ham: Copyright Law, The Kookaburra Case, And Remix Culture, Matthew Rimmer

Matthew Rimmer

The ‘Kookaburra’ case was a tragic and controversial copyright dispute, highlighting the need for copyright law reform by the Australian Parliament. In the Kookaburra case, a copyright action was brought by Larrikin Records against Men at Work’s song ‘Down Under’, alleging copyright infringement of the ‘Kookaburra’ song composed by Marion Sinclair. The dispute raised a host of doctrinal matters. There was disquiet over the length of the copyright term. There were fierce contests as to the copyright ownership of the ‘Kookaburra’ song. The litigation raised questions about copyright infringement and substantiality – particularly in relation to musical works. The ‘Kookaburra’ …


Cyber Deterrence, Eric Talbot Jensen Dec 2012

Cyber Deterrence, Eric Talbot Jensen

Faculty Scholarship

Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …


23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer Dec 2012

23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer

Matthew Rimmer

The venture, 23andMe Inc., raises a host of issues in respect of patent law, policy, and practice in respect of lifestyle genetics and personalised medicine. The company observes: ‘We recognize that the availability of personal genetic information raises important issues at the nexus of ethics, law, and public policy’. 23andMe Inc. has tested the boundaries of patent law, with its patent applications, which cut across information technology, medicine, and biotechnology. The company’s research raises fundamental issues about patentability, especially in light of the litigation in Bilski v. Kappos, Mayo Collaborative Services v. Prometheus Laboratories Inc. and Association for Molecular Pathology …


La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq. Dec 2012

La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.

Rodolfo C. Rivas

The authors provide a brief overview of what could be called the 3.0 version of the book industry. Under the 3.0 book industry, the author’s role in exploiting their creations has to embrace new and creative business models, which may often come into conflict with publisher’s old business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others. ///////////////////////////////////////////////////////////////////////////////////////////////////// Los autores proporcionan una breve descripción de lo que podría llamarse la versión 3.0 de la industria del libro. En la industria del libro 3.0, …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Virtual Parentalism, Joshua A.T. Fairfield Dec 2012

Virtual Parentalism, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


The Destruction Of An Empire: Will Viacom End Youtube's Reign?, Adam Shatzkes Dec 2012

The Destruction Of An Empire: Will Viacom End Youtube's Reign?, Adam Shatzkes

Touro Law Review

In a pre-Napster world Congress sought to promote theadvancement and development of the Internet. To facilitate this expansion, Congress enacted the Digital Millennium Copyright Act ("DMCA"), which protects internet service providers from copyright infringement liability. Due, in part, to the DMCA, the Internet has expanded beyond Congress' expectations. With the growth of the Internet, however, inequities have been created. YouTube epitomizes these inequities and Viacom's suit highlights the injustices that have been created. The ease with which copyrighted materials are published on the Internet has made it impossible for copyright owners to adequately protect their works. It is time for …


Do Students Turn Over Their Rights When They Turn In Their Papers? A Case Study Of Turnitin.Com, Stephen Sharon Dec 2012

Do Students Turn Over Their Rights When They Turn In Their Papers? A Case Study Of Turnitin.Com, Stephen Sharon

Touro Law Review

Turnitin is a rapidly growing online anti-plagiarism service subscribed to by thousands of schools in the United States. Though the pursuit of honesty and integrity are at the heart of our academic institutions and the Turnitin anti-plagiarism service, there is a fatal flaw in its execution. This comment examines the copyright and fair use arguments presented by four Virginia students asserting that Turnitin violated their intellectual property rights. This comment goes beyond the facts of the four Virginia students to explore the root issues of a service that collects and distributes the copyrighted works submitted to it by hundreds of …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons Nov 2012

The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons

Daniel Lyons

No abstract provided.


Podcast, Usage-Based Pricing In Broadband, Daniel Lyons Nov 2012

Podcast, Usage-Based Pricing In Broadband, Daniel Lyons

Daniel Lyons

No abstract provided.


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Cambio De Perspectiva: El Nuevo Papel De Los Creadores En El Entorno Digital, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq. Nov 2012

Cambio De Perspectiva: El Nuevo Papel De Los Creadores En El Entorno Digital, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.

Rodolfo C. Rivas

The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …


Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq. Nov 2012

Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.

Rodolfo C. Rivas

The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …


Copyright Developments In 2012 (Version 1.1), Laura Quilter Nov 2012

Copyright Developments In 2012 (Version 1.1), Laura Quilter

Laura Quilter

No abstract provided.


Possession Of Child Pornography: Should You Be Convicted When The Computer Cache Does The Saving For You?, Giannina Marin Nov 2012

Possession Of Child Pornography: Should You Be Convicted When The Computer Cache Does The Saving For You?, Giannina Marin

Florida Law Review

“For years, defense lawyers have argued the ‘young and stupid’ semidefense for their youthful clients. Now, we can have the ‘I didn’t know it was on the hard drive’ objection for the unsophisticated computer user in child pornography cases—or at least they can in the 9th Circuit.” This quote, appearing on the website of an East Texas criminal defense law firm, refers to the outcome of United States v. Kuchinski. In Kuchinski, the defendant’s computer contained, in various forms, more than 15,000 images of child pornography. There was no question that Kuchinski’s volitional viewing of the images on the Internet …


Clicking Away Confidentiality: Workplace Waiver Of Attorney-Client Privilege, Adam C. Losey Nov 2012

Clicking Away Confidentiality: Workplace Waiver Of Attorney-Client Privilege, Adam C. Losey

Florida Law Review

Barbara Hall, an administrative assistant, often arrives at work an hour and a half early solely to check her personal e-mails on her employer’s computer. Afterwards, “[i]n the grand tradition of Chekhov, or perhaps ‘Days of Our Lives,’ Barbara Hall carries on a dialogue throughout the workday with her two daughters, both of whom work at an event-planning company in Cleveland and use its e-mail system for such exchanges.” When she gets home from work, Barbara continues to use her workplace e-mail account to send personal e-mails. Barbara Hall and her daughters are not alone. The average employee is estimated …


Student Speech Rights In The Digital Age, Mary-Rose Papandrea Nov 2012

Student Speech Rights In The Digital Age, Mary-Rose Papandrea

Florida Law Review

For several decades courts have struggled to determine when, if ever, public schools should have the power to restrict student expression that does not occur on school grounds during school hours. In the last several years, courts have struggled with this same question in a new context—the digital media. The dramatic increase in the number of student speech cases involving the Internet, mobile phones, and video cameras begs for a closer examination of the scope of school officials’ authority to censor the expression of minors as well as the scope of juvenile speech rights generally. This Article takes a close …


Playing The Mysterious Game Of Online Love: Examining An Emerging Trend Of Limiting § 230 Immunity Of The Communications Decency Act And The Effects On E-Dating Websites, Matthew Altenberg Nov 2012

Playing The Mysterious Game Of Online Love: Examining An Emerging Trend Of Limiting § 230 Immunity Of The Communications Decency Act And The Effects On E-Dating Websites, Matthew Altenberg

Pace Law Review

No abstract provided.


Catch Me If You Can: An Analysis Of New Enforcement Measures And Proposed Legislation To Combat The Sale Of Counterfeit Products On The Internet, Jeffrey A. Lindenbaum, David Ewen Nov 2012

Catch Me If You Can: An Analysis Of New Enforcement Measures And Proposed Legislation To Combat The Sale Of Counterfeit Products On The Internet, Jeffrey A. Lindenbaum, David Ewen

Pace Law Review

No abstract provided.


Cybercrime And The Law: Challenges, Issues, And Outcomes, Susan W. Brenner Nov 2012

Cybercrime And The Law: Challenges, Issues, And Outcomes, Susan W. Brenner

School of Law Faculty Publications

The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Remix Culture, Matthew Rimmer Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Remix Culture, Matthew Rimmer

Matthew Rimmer

RECOMMENDATIONSIn its issues paper, the Australian Law Reform Commission asks a number of inter-connected questions about transformative use, fair dealing, and fair use:Transformative useQuestion 14. How are copyright materials being used in transformative and collaborative ways—for example, in ‘sampling’, ‘remixes’ and ‘mashups’. For what purposes—for example, commercial purposes, in creating cultural works or as individual self-expression?Question 15. Should the use of copyright materials in transformative uses be more freely permitted? Should the Copyright Act 1968 (Cth) be amended to provide that transformative use does not constitute an infringement of copyright? If so, how should such an exception be framed?Question 16. …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: 3d Printing, Matthew Rimmer Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: 3d Printing, Matthew Rimmer

Matthew Rimmer

RECOMMENDATIONSThe Australian Law Reform Commission poses a number of questions on the defence of fair use in Copyright and the Digital Economy.Question 52. Should the Copyright Act 1968 (Cth) be amended to include a broad, flexible exception? If so, how should this exception be framed? For example, should such an exception be based on ‘fairness’, ‘reasonableness’ or something else? Question 53. Should such a new exception replace all or some existing exceptions or should it be in addition to existing exceptions?The case study of 3D printing highlights how Australia would benefit from a defence of fair use.Recommendation 1 The narrow, …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Disability Rights, Matthew Rimmer Dr Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Disability Rights, Matthew Rimmer Dr

Matthew Rimmer

RECOMMENDATIONS

Recommendation 1 The Australian Government should take legislative action to implement Article 30 (3) of the United Nations Convention on the Rights of Persons with Disabilities 2006, which provides that ‘States Parties shall take all appropriate steps, in accordance with international law, to ensure that laws protecting intellectual property rights do not constitute an unreasonable or discriminatory barrier to access by persons with disabilities to cultural materials’. This will involve revising the Copyright Act 1968 (Cth) – and addressing any direct or indirect disability discrimination.

Recommendation 2 The Australian Law Reform Commission should consider revising the Copyright Act 1968 …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr

Matthew Rimmer

The Australian Law Reform Commission poses a question in respect of international law in the issues paper on Copyright and the Digital Economy.Question 1. The ALRC is interested in evidence of how Australia’s copyright law is affecting participation in the digital economy. For example, is there evidence about how copyright law: a. affects the ability of creators to earn a living, including through access to new revenue streams and new digital goods and services; b. affects the introduction of new or innovative business models; c. imposes unnecessary costs or inefficiencies on creators or those wanting to access or make use …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Consumer Rights, Matthew Rimmer Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Consumer Rights, Matthew Rimmer

Matthew Rimmer

RECOMMENDATIONSThe Australian Law Reform Commission poses a number of inter-related questions about copyright law, personal use, consumer rights, and cloud computing:Cloud computingQuestion 5. Is Australian copyright law impeding the development or delivery of cloud computing services?Question 6. Should exceptions in the Copyright Act 1968 (Cth) be amended, or new exceptions created, to account for new cloud computing services, and if so, how?Copying for private useQuestion 7. Should the copying of legally acquired copyright material, including broadcast material, for private and domestic use be more freely permitted?Question 8. The format shifting exceptions in the Copyright Act 1968 (Cth) allow users to …