Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

6,063 Full-Text Articles 5,002 Authors 5,302,517 Downloads 156 Institutions

All Articles in Internet Law

Faceted Search

6,063 full-text articles. Page 174 of 188.

Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V 2010 Indiana University Maurer School of Law

Derailed By The D.C. Circuit: Getting Network Management Regulation Back On Track, Edward B. Mulligan V

Federal Communications Law Journal

As the Internet continues to play a more central role in the daily lives of Americans, concerns about how Internet service providers manage their networks have arisen. Responding to these concerns and recognizing the importance of maintaining the open and competitive nature of the Internet, the FCC has taken incremental steps to regulate network management practices. Perhaps the most significant of these steps was its August 2008 Memorandum Decision and Order in which the FCC condemned Comcast Corporation's network management practices as "discriminatory and arbitrary." In that Order, the FCC required that Comcast (1) adopt new practices that complied with …


Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves 2010 Schulich School of Law, Dalhousie University

Inadequate: The Apec Privacy Framework & Article 25 Of The European Data Protection Directive, Stuart Hargreaves

Canadian Journal of Law and Technology

The EU and APEC approaches represent two different ways of thinking about the purpose of privacy rights in personal information (a.k.a. “informational privacy” or “data privacy”). The European approach sees integrity and control over information about oneself as inherent to human dignity; informational privacy is treated as a fundamental right subject only to limited restrictions. In contrast, the approach evinced by APEC is a market-oriented cost/benefit calculus; control over personal information is seen as a beneficial policy goal when it can increase consumer confi- dence and promote economic growth — the implication being that it can also more easily give …


La Cyberintimidation: Analyse Juridique, Karen D. Levin 2010 Schulich School of Law, Dalhousie University

La Cyberintimidation: Analyse Juridique, Karen D. Levin

Canadian Journal of Law and Technology

Dans ce mémoire va être traitée une analyse juridique de la cyberintimidation. Dans une première partie, nous tenterons de définir le terme « cyberintimidation » et les enjeux qui s’y rattachent. En deuxième lieu, nous examinerons la motivation qui mène à la cyberintimidation, ainsi que la manière dans laquelle l’acte se produit. Troisièmement, nous évaluerons les provisions du droit criminel fédéral, des droits de la personne, et du droit des délits civils afin de déterminer l’efficacité de notre système juridique à détourner la cyberintimidation. Finalement, nous trancherons la question de réforme qui se propose au Canada, la comparant aux réformes …


Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost 2010 Schulich School of Law, Dalhousie University

Canada's Current Position With Respect To Sound Marks Registration: A Need For Change?, Marie-Jeanne Provost

Canadian Journal of Law and Technology

This paper analyses and criticizes Canada’s position on sound marks registration in order to recommend the ways in which Canadian policy-makers could further act in order to advance this area of law. The first part of this paper exposes the fundamental concepts of trade-marks as they are necessary to the comprehension of the problems surrounding the registration of sound marks. In the second part, legal considerations associated with the registration of sound marks are discussed. More specifically, the visual requirement, the issue of “use,” the concept of distinctiveness and the question of overlap with copyright are assessed. In the third …


Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie 2010 Schulich School of Law, Dalhousie University

Canadian Personal Data Protection Legislation And Electronic Health Records: Transfers Of Personal Health Information In It Outsourcing Agreements, Dara Lambie

Canadian Journal of Law and Technology

Personal data protection and privacy of personal health information in the electronic era is a broad topic that includes consent, security measures and access considerations. The focus of this article is on one component of the larger picture: data transfers of personal health information that occur in the context of informa- tion technology (“IT”) outsourcing. If the societal good envisioned by an inter-jurisdictional EHR is to be fully realized, then the necessity of outsourcing is a reality that must be addressed.


Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam 2010 Dalhousie University

Book Review - Intellectual Property Rights And The Life Science Industries: Past, Present, And Future, Chidi Oguamanam

Canadian Journal of Law and Technology

Our so-called post-industrial society is one whose axial feature is the interac- tion between computer-driven digital and life science-driven bio-technologies. The primary legal mechanism that undergirds the allocation of rights in this new infor- mation-centred epoch is intellectual property. Perhaps only a few industrial sectors have benefitted more from the dynamics of that interaction than the pharmaceutical industry. Perhaps also, only a few industrial sectors have fully appreciated and opti- mally exploited the power of intellectual property than that sector. How did that happen? How has it continued to unfold, and what does the future hold for the continued co-evolution …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron 2010 Boston University School of Law

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas 2010 University of Macedonia, Greece

New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

On 25 November 2009, the European Parliament and Council adopted a new legislation to revise the regulatory framework for the electronic communications sector. This new “package” of Directives includes Directive 2009/136/EC, which amends earlier Directive 2002/58/EC in the fields of 1. mandatory notification of personal data security breaches 2. consent requirements for cookies and 3. anti-spamming measures by ISPs. The scope of the Directive is to enhance the protection of consumers privacy and personal data in the electronic communications sector, through strengthened security-related provisions and improved enforcement mechanisms by the NRAs. In particular Τhe provisions of the new directive require …


The World Of Bits, Andrew D. Murray 2010 London School of Economics and Political Science

The World Of Bits, Andrew D. Murray

Professor Andrew D Murray

This is Chapter One of my forthcoming book Information Technology Law: The Law and Society to be published by Oxford University Press in May 2010. It is made available as a limited preview.


Interactive Computer Service Liability For User-Generated Content After Roommates.Com, Bradley M. Smyer 2010 University of Michigan Law School

Interactive Computer Service Liability For User-Generated Content After Roommates.Com, Bradley M. Smyer

University of Michigan Journal of Law Reform

This Note explores the future of interactive computer service provider (ICSP) liability for user-generated content under the Communications Decency Act (CDA) after Roommates.com II. Roommates.com II held that a housing website was not entitled to immunity under § 230 of the CDA from federal Fair Housing Act claims, in part because providing preselected answers to a mandatory questionnaire rendered the site an "information content provider" at least partially responsible for creation or development of answers. After examining the historical and legislative origins of ICSP immunity for user-generated content under 47 U.S. C. § 230, this Note argues that courts …


The Internet Is A Semicommons, James Grimmelmann 2010 Cornell Law School

The Internet Is A Semicommons, James Grimmelmann

Cornell Law Faculty Publications

The Internet is a semicommons. Private property in servers and network links coexists with a shared communications platform. This distinctive combination both explains the Internet's enormous success and illustrates some of its recurring problems.

Building on Henry Smith's theory of the semicommons in the medieval open-field system, this essay explains how the dynamic interplay between private and common uses on the Internet enables it to facilitate worldwide sharing and collaboration without collapsing under the strain of misuse. It shows that key technical features of the Internet, such as its layering of protocols and the Web's division into distinct "sites," respond …


Prosecute The Cheerleader, Save The World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through "Sexting", Isaac A. McBeth 2010 University of Richmond School of Law

Prosecute The Cheerleader, Save The World?: Asserting Federal Jurisdiction Over Child Pornography Crimes Committed Through "Sexting", Isaac A. Mcbeth

University of Richmond Law Review

No abstract provided.


Elawyering And The Future Of Legal Work, Richard Granat, Blair Janis, Stephanie Kimbro, Marc Lauritsen 2010 MyLawyer.com

Elawyering And The Future Of Legal Work, Richard Granat, Blair Janis, Stephanie Kimbro, Marc Lauritsen

Continuing Legal Education (CLE) Lecture Series

eLawyering is doing legal work – not just marketing it – over the Web. Pioneering practitioners have found dramatic new ways to communicate and collaborate with clients and other lawyers, produce documents, settle disputes, interact with courts, and manage legal knowledge. There are exciting initiatives underway now that deserve attention by all lawyers – present and future. The legal profession is being disrupted from without and from within. To be successful in the coming era, lawyers will need to know how to practice over the Web, manage client relationships in cyberspace, and offer “unbundled” services. This program discusses the knowledge …


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez 2010 ITESM Campus Puebla

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


Vol. Xxi, Tab 58 - Declaration Of Jennifer L. Spaziano In Support Of Rosetta Stone's Response To Google's Objections To Evidence And Motion To Strike, Jennifer Spaziano 2010 Rosetta Stone

Vol. Xxi, Tab 58 - Declaration Of Jennifer L. Spaziano In Support Of Rosetta Stone's Response To Google's Objections To Evidence And Motion To Strike, Jennifer Spaziano

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xx, Tab 57 - Declaration Of Jennifer L. Spaziano In Support Of Rosetta Stone's Motion For Sanctions, Jennifer Spaziano 2010 Rosetta Stone

Vol. Xx, Tab 57 - Declaration Of Jennifer L. Spaziano In Support Of Rosetta Stone's Motion For Sanctions, Jennifer Spaziano

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Convergence And Incongruence: Trademark Law And Icann’S Introduction Of New Generic Top-Level Domains, Christine Haight Farley 2010 American University Washington College of Law

Convergence And Incongruence: Trademark Law And Icann’S Introduction Of New Generic Top-Level Domains, Christine Haight Farley

Christine Haight Farley

This paper demonstrates how problematic convergences between Internet technology, the demands of a burgeoning e-market and trademark laws have created myriad issues in international governance of domain names. The Internet Corporation for Assigned Names and Numbers (ICANN), the body that governs internet's infrastructure, recently approved a new policy that would allow it to accept applications for additional generic top-level domains (gTLDs). What ICANN contemplates is a uniform system to approve generic top level domains that is expected to have profound implications. Under this new plan anyone can apply for a new gTLD at any time and it could be literally …


Vol. Xv, Tab 52 - Rosetta Stone's Reply Brief In Support Of Its Motion For Partial Summary Judgment As To Liability, Rosetta Stone 2010 Santa Clara Law

Vol. Xv, Tab 52 - Rosetta Stone's Reply Brief In Support Of Its Motion For Partial Summary Judgment As To Liability, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xvi, Tab 53 - Declaration Of Henry Lien In Support Of Google's Reply Memorandum (Counsel For Google), Henry Lien 2010 Google

Vol. Xvi, Tab 53 - Declaration Of Henry Lien In Support Of Google's Reply Memorandum (Counsel For Google), Henry Lien

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Xix, Tab 56 - Rosetta Stone's Reply Brief In Support Of Its Motion For Partial Summary Judgment As To Liability, Rosetta Stone 2010 Santa Clara Law

Vol. Xix, Tab 56 - Rosetta Stone's Reply Brief In Support Of Its Motion For Partial Summary Judgment As To Liability, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Digital Commons powered by bepress