Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

PDF

Computer Law

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 215

Full-Text Articles in Law

Masthead Dec 2014

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2014

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


How Not To Criminalize Cyberbullying, Lyrissa Barnett Lidsky, Andrea Garcia Dec 2014

How Not To Criminalize Cyberbullying, Lyrissa Barnett Lidsky, Andrea Garcia

Lyrissa Barnett Lidsky

This essay provides a sustained constitutional critique of the growing body of laws criminalizing cyberbullying. These laws typically proceed by either modernizing existing harassment and stalking laws or crafting new criminal offenses. Both paths are beset with First Amendment perils, which this essay illustrates through 'case studies' of selected legislative efforts. Though sympathetic to the aims of these new laws, this essay contends that reflexive criminalization in response to tragic cyberbullying incidents has led law-makers to conflate cyberbullying as a social problem with cyberbullying as a criminal problem, creating pernicious consequences. The legislative zeal to eradicate cyberbullying potentially produces disproportionate …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Dec 2014

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

Elizabeth A Rowe

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Dec 2014

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

Elizabeth A Rowe

When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Toward A Patent Exhaustion Regime For Sustainable Development, 32 Berkeley J. Int'l Law. 330 (2014), Benjamin Liu Dec 2014

Toward A Patent Exhaustion Regime For Sustainable Development, 32 Berkeley J. Int'l Law. 330 (2014), Benjamin Liu

UIC Law Open Access Faculty Scholarship

This Article argues that the current exhaustion doctrine, when applied to the refurbishing industry, fails to balance its mandate of promoting technological progress with the broader program of sustainable development and is therefore unsuitable for countries on the modernization path. First, what constitutes an infringing “making” remains underdetermined. Second, the evidentiary hurdle for proving legal refurbishment is too onerous for the low margin and under-resourced refurbishing industry. Finally, the all-or-nothing approach to judging infringement fails to account for the nuanced cost-benefit nexus that exists between patentees, refurbishers, and society at large and discourages private ordering. To recalibrate the balance between …


Bargaining In The Shadow Of The European Microsoft Decision: The Microsoft-Samba Protocol License, William H. Page, Seldon J. Childers Nov 2014

Bargaining In The Shadow Of The European Microsoft Decision: The Microsoft-Samba Protocol License, William H. Page, Seldon J. Childers

William H. Page

The Microsoft-Samba agreement is by far the most important tangible outcome of the European Microsoft case. The EC’s other remedial order in the case, which required Microsoft to create a version of Windows without Windows Media Player, was an embarrassing failure. The Samba agreement, however, is significant because it requires Microsoft to provide, to its most important rival in the server market, detailed documentation of its communications protocols, under terms that allow use of the information in open source development and distribution. There is good reason to believe that Samba will be able to use the information to compete more …


Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers Nov 2014

Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers

William H. Page

An important provision in each of the final judgments in the government's Microsoft antitrust case requires Microsoft to "make available" to software developers the communications protocols that Windows client operating systems use to interoperate "natively" (that is, without adding software) with Microsoft server operating systems in corporate networks or over the Internet. The short-term goal of the provision is to allow developers, as licensees of the protocols, to write applications for non-Microsoft server operating systems that interoperate with Windows client computers in the same ways that applications written for Microsoft's server operating systems interoperate with Windows clients. The long-term goal …


Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page Nov 2014

Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page

William H. Page

The goal of telecommunications policy has shifted from the control of natural monopoly to the promotion of competition. But the question remains how extensive and persistent the government's regulatory role should be in the operation of communications markets. One might think that regulators could find the answer to this question in antitrust law. But antitrust has itself been torn between interventionist and laissez-faire tendencies. Over the past two decades, the dominant Chicago School approach to antitrust has focused on economic efficiency, a standard that has led to the abandonment or contraction of some categories of liability. More recently, however, post-Chicago …


Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun Nov 2014

Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun

Maurer Theses and Dissertations

This dissertation focuses on the issues of copyright enforcement and management. Especially, the research looks into how the digital technology reshapes the general perceptions and landscape of the copyright system in terms of online enforcement and management. Stepping into the digital age, the interaction between copyright holders and other parties, including online users and the ISPs, establishes two coexisting models—the right-holder-centric model and the cooperative model. Therefore, the dissertation analyzes which model is more appropriate and efficient with respect to online copyright enforcement and management.

As a matter of fact, the coexistences of two models provides copyright holders and other …


E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk Oct 2014

E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk

Seattle University Law Review

Amazon’s main rival, Apple, went to great lengths and took major risks to enter the e-book market. Why did Apple simply choose not to compete on the merits of its product and brand equity (the iPad and iBookstore) as it does with its other products? Why did Apple decide not to continue to rely on its earlier success of situating its products differently in the market than other electronics and working hard to be different and cutting-edge with its e-book delivery? This Note argues that the combination of Amazon’s 90% market share, network externalities, and an innovative technology market creates …


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Front Matter Sep 2014

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2014

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek Sep 2014

International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn Sep 2014

Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn

Georgia Journal of International & Comparative Law

No abstract provided.


Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders Sep 2014

Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders

Georgia Journal of International & Comparative Law

No abstract provided.


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas Sep 2014

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …


The Software Licensing Dilemma, Nancy S. Kim Aug 2014

The Software Licensing Dilemma, Nancy S. Kim

Nancy Kim

No abstract provided.


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Email, Metadata, And Clouds, Oh My! Recent Changes To The Model Rules Of Professional Conduct, Joyce Manna Janto Aug 2014

Email, Metadata, And Clouds, Oh My! Recent Changes To The Model Rules Of Professional Conduct, Joyce Manna Janto

Law Faculty Publications

A discussion of how the 2012 revisions to the Model Rules of Professional Conduct affect the attorney's duties in handling email: encryption, storage, metadata, and confidentiality.


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


The Lab's First Year, University Of Washington School Of Law Jul 2014

The Lab's First Year, University Of Washington School Of Law

Tech Policy Lab

The Tech Policy Lab at the University of Washington is off to an energetic start, thanks to a transformative founding gift from Microsoft and the efforts of our staff, students, and colleagues. We have hosted important policy conversations, carefully put into place the methods of procedure for true interdisciplinary research, and completed or initiated a variety of important projects around emerging technology policy.


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


From The Editor-In-Chief, Ibrahim A. Baggili Jun 2014

From The Editor-In-Chief, Ibrahim A. Baggili

Journal of Digital Forensics, Security and Law

We are proud to share with you this special edition issue of the JDFSL. This year, JDFSL partnered with both the 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C) and Systematic Approaches to Digital Forensic Engineering (SADFE)–two prominent conferences in our field that were co-hosted. Fifty-three papers were submitted, and the Technical Program Committee accepted only 17 after a rigorous review process.


Back Matter Jun 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.