Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (48)
- Science and Technology Law (33)
- Computer Sciences (31)
- Information Security (31)
- Physical Sciences and Mathematics (31)
-
- Privacy Law (30)
- Intellectual Property Law (27)
- Computer Engineering (20)
- Engineering (20)
- Social and Behavioral Sciences (20)
- Electrical and Computer Engineering (19)
- Forensic Science and Technology (19)
- Legal Studies (19)
- Health Law and Policy (4)
- Communications Law (3)
- Comparative and Foreign Law (3)
- Evidence (3)
- Legal Writing and Research (3)
- Antitrust and Trade Regulation (2)
- Consumer Protection Law (2)
- Legislation (2)
- Marketing Law (2)
- Administrative Law (1)
- Business Organizations Law (1)
- Civil Procedure (1)
- Communication (1)
- Communication Technology and New Media (1)
- Contracts (1)
- Institution
- Keyword
-
- Internet (6)
- Book reviews (3)
- Computer forensics (3)
- E-commerce (3)
- Propertization (3)
-
- Computers & privacy (2)
- Cybercrime (2)
- Electronic documents (2)
- Federal Rules of Civil Procedure (2)
- Forensic computing (2)
- Fraud (2)
- Intellectual Property (2)
- Intellectual property (2)
- Medical records (2)
- Property (2)
- Right of privacy (2)
- Telecommunications (2)
- AOL (1)
- Abuse Act (1)
- Accounting curriculum development (1)
- Administration publique (1)
- Anti-Phishing Act of 2005 (1)
- Audit (1)
- Auditors (1)
- Bargaining power (1)
- Barrett (1)
- Baudrillard (1)
- Biopiracy (1)
- Broadband Competition (1)
- Broadcasting legislation (1)
Articles 1 - 30 of 91
Full-Text Articles in Computer Law
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Federal Communications Law Journal
This Article calls for mandated "network neutrality," which would require broadband service providers to treat all nondestructive data equitably. The Author argues that neutral networks are preferable because they better foster online innovation and provide a more equitable distribution of the power to communicate. Without mandated network neutrality, providers in highly concentrated regional broadband markets will likely begin charging content providers for the right to send data to end users at the fastest speeds available. The Author demonstrates that regional broadband competition and forthcoming transmission technologies are unlikely to prevent broadband discrimination, ad hoc regulation under current statutory authority is …
The Five Indicia Of Virtual Property, Charles Blazer
The Five Indicia Of Virtual Property, Charles Blazer
The University of New Hampshire Law Review
[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.
“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
The University of New Hampshire Law Review
Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
Canadian Journal of Law and Technology
This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Canadian Journal of Law and Technology
This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …
Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland
Licenced To Thrive? Podcasting And Copyright Law In Canada, Keith Sutherland
Canadian Journal of Law and Technology
This article examines podcasting and its specific characteristics to see, first, where it fits within Canada’s copyright law, and second, how the licensing regime for musical works in Canada applies to podcasting. The discussion next turns to whether or not the current licensing regime for podcasting is desirable in light of the purpose of copyright in Canada, and with a view to the various interests at stake: those of artists, in being paid, and those of society, in enabling podcasters to access material in order to produce their work. An examination of the current and proposed licensing regime and its …
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Canadian Journal of Law and Technology
This paper argues that Canadian courts can, and should, adopt electronic trespass as a viable cause of action for the protection of property rights on the Internet. Of course, this conclusion presupposes that property rights in fact exist on the Internet. While American courts have accepted the existence of property rights on the Internet without any real controversy, a significant body of criticism has developed around American jurisprudence. Part III examines the critiques levelled against the assumption of property rights inherent in electronic trespass, and argues that there are property rights that need to be protected on the Internet. Part …
The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff
The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff
Washington Journal of Law, Technology & Arts
The question of how to stymie the proliferation of spyware on computers has been a recurring topic of debate in Congress and in the technology industry. With the passage of the SPY ACT (H.R. 29) a high probability, this article highlights its prohibitions, with particular emphasis on how they change current legal regimes. Most federal computer statutes—insofar as they address actions victimizing private citizens—require damage to the computer. In addition, one of the elements of common law trespass to chattel is damage. Whether intended or not, the SPY ACT subtly introduces a strict liability component into federal computer and Internet …
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Canadian Journal of Law and Technology
The following discussion will examine the utility requirement for patentability in the context of EST patents. Part I will provide background information regarding the utility requirement under patent law and will explain why it has been difficult to apply to ESTs. Part II will briefly examine how other jurisdictions, in particular the United States, have addressed the difficul- ties associated with applying the current utility require- ment to biological materials, in particular ESTs. Part III will look at how Canadian courts have interpreted and applied the utility requirement for patentability, and will suggest that ESTs have sufficient value to the …
E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory
Canadian Journal of Law and Technology
This hefty volume is a useful compendium of the basic source materials for the law of electronic commerce in Canada. It offers the text of all the general-purpose legislation that removes legal barriers to the use of electronic communications, for all jurisdictions in the country. It then takes a dozen related areas of law, from domain names to taxation, from competition law to consumer protection, from security to standards, and offers a quick overview and the key documents applicable to each. In each case the commentary is in English then in French, and where the texts are available in both …
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
Canadian Journal of Law and Technology
The volume, composition and management of solid waste generated by households, governments, the commercial sector, and industry have all changed dramatically over the past century. Household waste contained mainly organic material a hundred years ago. Today, both residential and commercial waste is a complex mix of organics, plastics, paper products, metals and a variety of toxic material. Historically, individual households looked after their own waste, through efforts such as composting and burning. Over the past century, with significant increases in volume of waste generated, municipalities have taken over primary responsibility for solid waste management, initially mainly for aesthetic and sanitary …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Canadian Journal of Law and Technology
Rapid growth of technology in the last decades has given rise to electronic commerce (e-commerce) as a new mode of commerce. This new commerce environment has many characteristics that affect commercial relationships and parties. Of these characteristics, global and borderless commercial activity and the intangible nature of communication can be singled out.
From a legal perspective, e-commerce has developed new modes, of contract formation, performance of contracts for intangible goods, as well as payment. In this new borderless and transient sphere, certain interests of parties involved in commercial activities as buyers or sellers are in need of protection. In particular, …
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Journal of Digital Forensics, Security and Law
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …
Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Journal of Digital Forensics, Security and Law
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …
Beyond Content: The Emergence Of Video Games And Their Diverse Effects On Legal Normativity As Seen Through The Lens Of Jean Baudrillard, Stephen Orr
Canadian Journal of Law and Technology
Current legal discourse about video games focuses primarily on freedom of speech issues relating to the content of games. Using the work of Jean Baudrillard (and to a small extent Marshall McLuhan) this article reconsiders how we should conceptualize the regulation of video games. Baudrillard's theories are particularly interesting to explore as his pessimistic reflections about technology challenge us to contemplate how profoundly the form of new communicative technologies, such as video games, shape human interactions. Appealing to both theorists' belief that "the medium is the message", this article argues that we should be wary of focusing legal energy exclusively …
Intellectual Property Rights In The Internet Era: The New Frontier, 5 J. Marshall Rev. Intell. Prop. L. 589 (2006), Lulin Gao
UIC Review of Intellectual Property Law
With the rapid development of information and Internet technologies, how to protect intellectual property (IP) rights in the Internet era became a new frontier for IP practitioners and scholars internationally. This article highlights some important IP protection issues related to copyright, patent, trademark, and domain names, as well as the impact of technological advances on IP protection in the Internet era. The author believes that in order to solve these new emerging issues, the most important principle is keeping the balance between different sides with stakes in the IP right. Finally, international cooperation must be enhanced with more technical assistance …
Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers
Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers
UIC John Marshall Journal of Information Technology & Privacy Law
This article argues that President Bush’s domestic electronic surveillance program is unconstitutional. The program allows the President to order the NSA to conduct surveillance of electronic communications, including communications involving United States citizens, without court order. The authors conclude that the President lacked the statutory or constitutional power to authorize such a program and that the program runs afoul to the letter and the spirit of the constitutional protection against unreasonable searches and seizures embraced by the Fourth Amendment of the United States Constitution. Congress and the President share overlapping constitutional authority in matters of foreign affairs and national security. …