Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (5)
- Pepperdine University (4)
- BLR (3)
- Duke Law (3)
- University of Florida Levin College of Law (3)
-
- American University Washington College of Law (2)
- Maurer School of Law: Indiana University (2)
- SelectedWorks (2)
- University of Baltimore Law (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- Boston University School of Law (1)
- Brooklyn Law School (1)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Mitchell Hamline School of Law (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Penn State Dickinson Law (1)
- Schulich School of Law, Dalhousie University (1)
- Seattle University School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Pennsylvania Carey Law School (1)
- University of Richmond (1)
- University of San Diego (1)
- University of Washington School of Law (1)
- Villanova University Charles Widger School of Law (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (3)
- Duke Law & Technology Review (3)
- Elizabeth A Rowe (3)
- ExpressO (3)
- Pepperdine Law Review (3)
-
- UF Law Faculty Publications (3)
- Articles in Law Reviews & Other Academic Journals (2)
- Faculty Scholarship (2)
- Articles (1)
- Articles by Maurer Faculty (1)
- Books (1)
- Boyd Briefs / Road Scholars (1)
- Brooklyn Journal of International Law (1)
- Canadian Journal of Law and Technology (1)
- Chicago-Kent Law Review (1)
- Deborah Brightman Morse (1)
- Dickinson Law Review (2017-Present) (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Gregory M Dickinson (1)
- Indiana Journal of Global Legal Studies (1)
- Law Faculty Publications (1)
- Northwestern Journal of International Law & Business (1)
- Pepperdine Dispute Resolution Law Journal (1)
- Publications and Research (1)
- Reuven Ashtar (1)
- Rodolfo C. Rivas (1)
- San Diego International Law Journal (1)
- Scholarly Works (1)
- Seattle University Law Review (1)
- University of Miami Business Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 45
Full-Text Articles in Computer Law
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Duke Law & Technology Review
No abstract provided.
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow
The Past And Future Of The Internet: A Symposium For John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Articles in Law Reviews & Other Academic Journals
You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.
Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
San Diego International Law Journal
This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.
Circumvention Of Geoblocking, Marketa Trimble
Circumvention Of Geoblocking, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble gave her presentation Circumvention of Geoblocking at the "Law, Borders, and Speech" conference, held at Stanford Law School on Oct. 24, 2016.
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Brooklyn Journal of International Law
In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
Scholarly Works
From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.
This Article posits that …
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth Rowe
Elizabeth A Rowe
This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Elizabeth A Rowe
This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Elizabeth A Rowe
When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Faculty Scholarship
This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.
Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer
Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer
Pepperdine Law Review
No abstract provided.
Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones
Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones
Pepperdine Law Review
No abstract provided.
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Pepperdine Law Review
No abstract provided.
Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero
Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero
Pepperdine Dispute Resolution Law Journal
Music is becoming increasingly synonymous with big business and corporate influence. The advent of Internet radio and streaming webcasts are simply one example of this shift. Organizations such as the Radio Industry Association of America ("RIAA") have discovered a new way to receive royalties from the performance of musical works, and have fought vigorously to obtain favorable rates to achieve the maximum profit. On the other hand, small webcasters have fought equally hard to avoid these large rates. Although arguments for each side are equally persuasive, neither is persuasive enough to force a compromise. In attempting to solve these disputes, …
Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh
Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh
Faculty Scholarship
Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Reuven Ashtar
This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …
An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson
An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson
Gregory M Dickinson
Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.
This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
UF Law Faculty Publications
This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.
Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse
Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse
Deborah Brightman Morse
Never has the dissonance between copyright and innovation been so extreme. The Internet provides enormous economic growth due to the strength of e-commerce, and affords an avenue for creativity and the wide dissemination of information. Nevertheless, the Internet has become a plague on copyright law. The advent of the digital medium has made the unlawful reproduction, distribution, and display of copyrighted works essentially effortless. The law has been unable to keep pace with the rapid advance of technology. For the past decade, Congress has been actively attempting to draft comprehensible legislation in an effort to afford copyright owners more protection …
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
UF Law Faculty Publications
This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
UF Law Faculty Publications
When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
All Faculty Scholarship
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …