Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

2004

Science and Technology

Articles 1 - 2 of 2

Full-Text Articles in Computer Law

Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons May 2004

Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons

ExpressO

Unlike Dr. Bowdler, who republished the works of Shakespeare with the naughty bits removed, the modern digital Bowdlerizer deletes offensive content from digital works in a variety of ways. This Essay will analyze the technologies used by the modern Bowdlerizer to determine when, if, and which technologies make copies in violation of the copyright owner’s § 106(1) right to control reproduction or make derivative copies of a preexisting work that may infringe the copyright owner’s 17 U.S.C. § 106(2) right to authorize the creation of derivative works. These technologies not only support militant prudery, but they also may add new …


The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig Feb 2004

The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig

ExpressO

After years of legal maneuvering and courtroom skirmishes, the lines in the war between copyright holders and online copyright infringers have been clearly drawn. This conflict, which is poised to erupt in courts across the country, began decades ago with the birth of the Internet, which gave rise to a previously unparalleled opportunity for the dissemination, sharing, and enjoyment of every conceivable form of human expression. In addition to the benefits it has provided, the Internet also has given rise to copyright infringement on a global scale through the unauthorized posting and sharing of digital files. After years of unsuccessfully …