Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2006

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 91

Full-Text Articles in Computer Law

Front Matter Dec 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman Dec 2006

Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman

Federal Communications Law Journal

This Article calls for mandated "network neutrality," which would require broadband service providers to treat all nondestructive data equitably. The Author argues that neutral networks are preferable because they better foster online innovation and provide a more equitable distribution of the power to communicate. Without mandated network neutrality, providers in highly concentrated regional broadband markets will likely begin charging content providers for the right to send data to end users at the fastest speeds available. The Author demonstrates that regional broadband competition and forthcoming transmission technologies are unlikely to prevent broadband discrimination, ad hoc regulation under current statutory authority is …


The Five Indicia Of Virtual Property, Charles Blazer Dec 2006

The Five Indicia Of Virtual Property, Charles Blazer

The University of New Hampshire Law Review

[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.

“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …


Front Matter Sep 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer Aug 2006

The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer

Canadian Journal of Law and Technology

This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.


Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds Aug 2006

Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds

Canadian Journal of Law and Technology

This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …


Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland Aug 2006

Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland

Canadian Journal of Law and Technology

This article examines podcasting and its specific characteristics to see, first, where it fits within Canada’s copyright law, and second, how the licensing regime for musical works in Canada applies to podcasting. The discussion next turns to whether or not the current licensing regime for podcasting is desirable in light of the purpose of copyright in Canada, and with a view to the various interests at stake: those of artists, in being paid, and those of society, in enabling podcasters to access material in order to produce their work. An examination of the current and proposed licensing regime and its …


Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald Aug 2006

Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald

Canadian Journal of Law and Technology

This paper argues that Canadian courts can, and should, adopt electronic trespass as a viable cause of action for the protection of property rights on the Internet. Of course, this conclusion presupposes that property rights in fact exist on the Internet. While American courts have accepted the existence of property rights on the Internet without any real controversy, a significant body of criticism has developed around American jurisprudence. Part III examines the critiques levelled against the assumption of property rights inherent in electronic trespass, and argues that there are property rights that need to be protected on the Internet. Part …


Masthead Jun 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Jun 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff Apr 2006

The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff

Washington Journal of Law, Technology & Arts

The question of how to stymie the proliferation of spyware on computers has been a recurring topic of debate in Congress and in the technology industry. With the passage of the SPY ACT (H.R. 29) a high probability, this article highlights its prohibitions, with particular emphasis on how they change current legal regimes. Most federal computer statutes—insofar as they address actions victimizing private citizens—require damage to the computer. In addition, one of the elements of common law trespass to chattel is damage. Whether intended or not, the SPY ACT subtly introduces a strict liability component into federal computer and Internet …


Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille Apr 2006

Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille

Canadian Journal of Law and Technology

The following discussion will examine the utility requirement for patentability in the context of EST patents. Part I will provide background information regarding the utility requirement under patent law and will explain why it has been difficult to apply to ESTs. Part II will briefly examine how other jurisdictions, in particular the United States, have addressed the difficul- ties associated with applying the current utility require- ment to biological materials, in particular ESTs. Part III will look at how Canadian courts have interpreted and applied the utility requirement for patentability, and will suggest that ESTs have sufficient value to the …


E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory Apr 2006

E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory

Canadian Journal of Law and Technology

This hefty volume is a useful compendium of the basic source materials for the law of electronic commerce in Canada. It offers the text of all the general-purpose legislation that removes legal barriers to the use of electronic communications, for all jurisdictions in the country. It then takes a dozen related areas of law, from domain names to taxation, from competition law to consumer protection, from security to standards, and offers a quick overview and the key documents applicable to each. In each case the commentary is in English then in French, and where the texts are available in both …


It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle Apr 2006

It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle

Canadian Journal of Law and Technology

The volume, composition and management of solid waste generated by households, governments, the commercial sector, and industry have all changed dramatically over the past century. Household waste contained mainly organic material a hundred years ago. Today, both residential and commercial waste is a complex mix of organics, plastics, paper products, metals and a variety of toxic material. Historically, individual households looked after their own waste, through efforts such as composting and burning. Over the past century, with significant increases in volume of waste generated, municipalities have taken over primary responsibility for solid waste management, initially mainly for aesthetic and sanitary …


Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus Apr 2006

Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus

Canadian Journal of Law and Technology

Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …


Producers And Consumers In Eu E-Commerce Law, Banu Sit Apr 2006

Producers And Consumers In Eu E-Commerce Law, Banu Sit

Canadian Journal of Law and Technology

Rapid growth of technology in the last decades has given rise to electronic commerce (e-commerce) as a new mode of commerce. This new commerce environment has many characteristics that affect commercial relationships and parties. Of these characteristics, global and borderless commercial activity and the intangible nature of communication can be singled out.

From a legal perspective, e-commerce has developed new modes, of contract formation, performance of contracts for intangible goods, as well as payment. In this new borderless and transient sphere, certain interests of parties involved in commercial activities as buyers or sellers are in need of protection. In particular, …


Front Matter Mar 2006

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2006

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Mar 2006

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka Jan 2006

Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka

Journal of Digital Forensics, Security and Law

This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …


Beyond Content: The Emergence Of Video Games And Their Diverse Effects On Legal Normativity As Seen Through The Lens Of Jean Baudrillard, Stephen Orr Jan 2006

Beyond Content: The Emergence Of Video Games And Their Diverse Effects On Legal Normativity As Seen Through The Lens Of Jean Baudrillard, Stephen Orr

Canadian Journal of Law and Technology

Current legal discourse about video games focuses primarily on freedom of speech issues relating to the content of games. Using the work of Jean Baudrillard (and to a small extent Marshall McLuhan) this article reconsiders how we should conceptualize the regulation of video games. Baudrillard's theories are particularly interesting to explore as his pessimistic reflections about technology challenge us to contemplate how profoundly the form of new communicative technologies, such as video games, shape human interactions. Appealing to both theorists' belief that "the medium is the message", this article argues that we should be wary of focusing legal energy exclusively …


Intellectual Property Rights In The Internet Era: The New Frontier, 5 J. Marshall Rev. Intell. Prop. L. 589 (2006), Lulin Gao Jan 2006

Intellectual Property Rights In The Internet Era: The New Frontier, 5 J. Marshall Rev. Intell. Prop. L. 589 (2006), Lulin Gao

UIC Review of Intellectual Property Law

With the rapid development of information and Internet technologies, how to protect intellectual property (IP) rights in the Internet era became a new frontier for IP practitioners and scholars internationally. This article highlights some important IP protection issues related to copyright, patent, trademark, and domain names, as well as the impact of technological advances on IP protection in the Internet era. The author believes that in order to solve these new emerging issues, the most important principle is keeping the balance between different sides with stakes in the IP right. Finally, international cooperation must be enhanced with more technical assistance …


Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers Jan 2006

Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers

UIC John Marshall Journal of Information Technology & Privacy Law

This article argues that President Bush’s domestic electronic surveillance program is unconstitutional. The program allows the President to order the NSA to conduct surveillance of electronic communications, including communications involving United States citizens, without court order. The authors conclude that the President lacked the statutory or constitutional power to authorize such a program and that the program runs afoul to the letter and the spirit of the constitutional protection against unreasonable searches and seizures embraced by the Fourth Amendment of the United States Constitution. Congress and the President share overlapping constitutional authority in matters of foreign affairs and national security. …