Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,587 Full-Text Articles 4,393 Authors 3,320,199 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,587 full-text articles. Page 131 of 144.

Software Wars: The Patent Menace, Andrew Nieh 2011 New York Law School Class of 2010

Software Wars: The Patent Menace, Andrew Nieh

NYLS Law Review

No abstract provided.


Hacking Into Federal Court: Employee "Authorization" Under The Computer Fraud And Abuse Act, Thomas E. Booms 2011 Vanderbilt University Law School

Hacking Into Federal Court: Employee "Authorization" Under The Computer Fraud And Abuse Act, Thomas E. Booms

Vanderbilt Journal of Entertainment & Technology Law

Few would disagree that computers play an important role in modern United States society. However, many would be surprised to discover the modest amount of legislation governing computer use. Congress began addressing computer crime in 1984 by enacting the Computer Fraud and Abuse Act (CFAA). The CFAA represented the first piece of federal legislation governing computer crimes and has undergone eight amendments to date, making it one of the most expansive criminal laws in the United States. In 1994, Congress added a civil provision opening the door for application of the statute in novel situations. Initially enacted to target crimes …


Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan 2011 Vanderbilt University Law School

Cloudy Privacy Protections: Why The Stored Communications Act Fails To Protect The Privacy Of Communications Stored In The Cloud, Ilana R. Kattan

Vanderbilt Journal of Entertainment & Technology Law

The advent of new communications technologies has generated debate over the applicability of the Fourth Amendment's warrant requirement to communications sent through, and stored in, technologies not anticipated by the Framers. In 1986, Congress responded to perceived gaps in the protections of the warrant requirement as applied to newer technologies, such as email, by passing the Stored Communications Act (SCA). As originally enacted, the SCA attempted to balance the interests of law enforcement against individual privacy rights by dictating the mechanisms by which the government could compel a particular service provider to disclose communications stored on behalf of its customers. …


Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown 2011 University of Michigan Law School

Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown

Law Librarian Scholarship

CiteGenie works primarily for caselaw and Internet resource research but is experimenting with the ability to add citations for statutes and regulations. CiteGenie provides a number of formatting options and allows you to choose citation rules for a particular state, use parallel citations, remove star-pagination marks from quoted texts, and personalize abbreviations. This tool is easy to use; when researching in Firefox, select CiteGenie from the right-click menu and a pop-up displays the copied text and citation to be pasted.


Enforcement Of Open Source Software Licenses: The Mdy Trio's Inconvenient Compliations, Robert W. Gomulkiewicz 2011 University of Washington School of Law

Enforcement Of Open Source Software Licenses: The Mdy Trio's Inconvenient Compliations, Robert W. Gomulkiewicz

Articles

The Federal Circuit’s ruling in Jacobsen v. Katzer [535 F.3d 1373 (Fed. Cir. 2008)] finally settled the question of whether open source licenses are enforceable. Unfortunately, three recent cases from the Ninth Circuit have complicated matters. I call this trio of cases the “MDY Trio” in honor of the Ninth Circuit’s prior trio of licensing cases known as the “MAI Trio.”

On the surface, the MDY Trio provides a boost for the enforceability of software licenses, but the MDY Trio also creates two significant complications for open source licenses. First, the MDY Trio’s test for distinguishing between licenses and copyright …


The Variable Determinacy Thesis, Harry Surden 2011 University of Colorado Law School

The Variable Determinacy Thesis, Harry Surden

Publications

This Article proposes a novel technique for characterizing the relative determinacy of legal decision-making. I begin with the observation that the determinacy of legal outcomes varies from context to context within the law. To augment this intuition, I develop a theoretical model of determinate legal decision-making. This model aims to capture the essential features that are typically associated with the concept of legal determinacy. I then argue that we can use such an idealized model as a standard for expressing the relative determinacy or indeterminacy of decision-making in actual, observed legal contexts. From a legal theory standpoint, this approach - …


Internet Contracting And E-Commerce Disputes: International And U. S. Personal Jurisdiction , Anne McCafferty 2011 Cleveland State University

Internet Contracting And E-Commerce Disputes: International And U. S. Personal Jurisdiction , Anne Mccafferty

Global Business Law Review

In cases involving international defendants, a variety of bases have been deemed appropriate for a U.S. court to assert personal jurisdiction, including nationality, domicile, “purposeful availment,” and a number of federal statutes. With the explosion of the Internet and the resulting expansion of international business transactions via the Web, courts have struggled to adapt traditional modes of adjudication consistent with established common, statutory and international law. Internet transactions—now known as e-commerce—involve the “practice of buying and selling goods and services through online consumer services on the Internet.” In a sphere of commerce apparently limitless in its reach, this article explores …


Workplace Privacy And Monitoring: The Quest For Balanced Interests , Ariana R. Levinson 2011 University of Louisville

Workplace Privacy And Monitoring: The Quest For Balanced Interests , Ariana R. Levinson

Cleveland State Law Review

We can see in 2001 that 77 percent of employers were engaged in monitoring. This may have increased slightly or decreased slightly, but whatever has happened, we know that this is a significant amount of employers--much greater than a majority--that are engaging in monitoring of their employees. We can also see the great rise in monitoring of computers and electronic files in a ten-year period between 1997 and 2007. Finally, we can see some of the newer technologies. In 2007, twelve percent of the reporting employers were monitoring the blogosphere, eight percent were monitoring GPS vehicle tracking, and ten percent …


Novel Neutrality Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny , Jeffrey Jarosch 2011 Cleveland State University

Novel Neutrality Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny , Jeffrey Jarosch

Cleveland State Law Review

This Article examines a recent trend in which the Federal Trade Commission and other enforcement agencies investigate Internet platforms for behavior that is insufficiently “neutral” towards users or third parties that interact with the platform. For example, Google faces a formal FTC investigation based on allegations that it has tinkered with search results rather than presenting users with a “neutral” result. Twitter faces a formal investigation after the social media service restricted the ways in which third party developers could interact with Twitter through its application programming interface (“API”). These investigations represent a new attempt to shift the network neutrality …


Open Robotics, M. Ryan Calo 2011 University of Washington School of Law

Open Robotics, M. Ryan Calo

Articles

Robotics is poised to be the next transformative technology. Robots are widely used in manufacturing, warfare, and disaster response, and the market for personal robotics is exploding. Worldwide sales of home robots—such as iRobot’s popular robotic vacuum cleaner—are in the millions. In fact, Honda has predicted that by the year 2020, it will sell as many robots as it does cars. Microsoft founder Bill Gates believes that the robotics industry is in the same place today as the personal computer (“PC”) business was in the 1970s, a belief that is significant given that there are now well over one billion …


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong 2011 University of Pittsburgh School of Law

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …


School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes 2011 UIC School of Law

School Discipline Of Cyber-Bullies: A Proposed Threshold That Respects Constitutional Rights, 45 J. Marshall L. Rev. 85 (2011), Laura Pavlik Raatjes

UIC Law Review

No abstract provided.


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo 2011 University of Pennsylvania

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

All Faculty Scholarship

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman 2011 Columbia Law School

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


Editor-In-Chief Of The Journal Of The Copyright Society Of The U.S.A. For 2011-15, Joseph Liu 2010 Boston College Law School

Editor-In-Chief Of The Journal Of The Copyright Society Of The U.S.A. For 2011-15, Joseph Liu

Joseph P. Liu

Appointed Editor-in-Chief of peer-reviewed academic journal focusing on copyright law.


Requirements Of A Valid Islamic Marriage Vis-À-Vis Requirements Of A Valid Customary Marriage In Nigeria, olanike sekinat odewale mrs 2010 Lead City University, Ibadan

Requirements Of A Valid Islamic Marriage Vis-À-Vis Requirements Of A Valid Customary Marriage In Nigeria, Olanike Sekinat Odewale Mrs

Olanike Sekinat Adelakun

Marriage is a universal institution which is recognized and respected all over the world. As a social institution, marriage is founded on and governed by the social and religious norms of the society. Consequently, the sanctity of marriage is a well accepted principle in the world community .
Marriage could either be monogamous or polygamous in nature. A monogamous marriage has bee described as ‘…the voluntary union for life of one man and one woman to the exclusion of all others’ . A polygamous marriage on the other hand can be defined as a voluntary union for life of one …


The Problem With Intellectual Property Rights: Subject Matter Expansion, Andrew Beckerman Rodau 2010 Suffolk University Law School

The Problem With Intellectual Property Rights: Subject Matter Expansion, Andrew Beckerman Rodau

Andrew Beckerman Rodau

This article examines the expansion of the subject matter that can be protected under intellectual property law. Intellectual property law has developed legal rules that carefully balance competing interests. The goal has long been to provide enough legal protection to maximize incentives to engage in creative and innovative activities while also providing rules and doctrines that minimize the effect on the commercial marketplace and minimize interference with the free flow of ideas generally. The expansive view of subject matter protectable via intellectual property law has erased the clear delineation between patent, copyright, and trademark law. This has led to overprotection …


The Virtual Construction Of Legality: 'Griefing' & Normative Order In Second Life, Eric M. Fink 2010 Elon University School of Law

The Virtual Construction Of Legality: 'Griefing' & Normative Order In Second Life, Eric M. Fink

Eric M Fink

This article examines the construction of legality in a virtual world, seeking to under-stand how informal social order emerges as residents construct meaning around interpersonal conflicts and interact on the basis of such meaning. ‘Griefing’, a form of disruptive behavior common to virtual worlds, provides a lens through which to investigate emergent social norms and boundaries in the virtual world of Second Life. Identifying and distinguishing rhetorical frames in Second Life residents’ understandings of and responses to griefing, the study aims to elucidate the social meaning of griefing and its place in the construction and maintenance of social order.


The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson 2010 University of Oklahoma College of Law

The Timely Demise Of The Fourth Amendment Third Party Doctrine, Stephen E. Henderson

Stephen E Henderson

In what may be a slightly premature obituary, in this response to a forthcoming paper by Matthew Tokson I argue that the Fourth Amendment third party doctrine "has at least taken ill, and it can be hoped it is an illness from which it will never recover." It is increasingly unpopular as a matter of state constitutional law, has long been assailed in scholarship but now thoughtful alternatives are percolating, and it cannot – or at least should not – withstand the pressures which technology and social norms are placing upon it. Even the Supreme Court seems loath to defend …


Candados Negociales En El Modelo De Franquicia, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq. 2010 Selected Works

Candados Negociales En El Modelo De Franquicia, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.

Rodolfo C. Rivas

The authors discuss different legal mechanisms to franchise your business successfully while minimizing legal risks.//////////////////////////////////////Los autores analizan los diferentes mecanismos legales para desarrollar una franquicia con éxito y reducir al mínimo los riesgos legales.


Digital Commons powered by bepress