August 28 Jurisdiction As to Tortious or Criminal Acts on the Internet CYBERLAWThe emergence of global digital networks, such as the Internet, and digital technologies that enhance human abilities to access, store, manipulate, and transmit vast amounts of information has brought with it a host of new legal issues that lawyers preparing to practice in the 21st century will need to understand and address. Although many are trying to "map" existing legal concepts onto problems arising in cyberspace, it is becoming increasingly evident that this strategy sometimes doesn't work. In some cases, it is necessary to go back to first principles to understand how to accomplish the purposes of existing law in digital networked environments. The course will explore specific problems in applying law to cyberspace in areas such as intellectual property, privacy, content control, and the bounds of jurisdiction. Law 276.1 & SIMS 235
Professor Pamela Samuelson
University of California, Berkeley
Fall 2001 Boalt Hall
Tuesdays & Thursdays, 3-4:25 pmStudents with familiarity with the Internet and its resources or with backgrounds in some of the substantive fields explored in this course are especially welcome, but there are no formal prerequisites. (Some students might appreciate a tutorial on Copyright law.) Grades for the course will be based on a take home exam..
E-Mail:pam@sims.berkeley.edu
Office: 434 North Addition or 305B South Hall
Phone: (510) 642-6775
Office Hours: 2:30 - 4:00 Wednesdays (Boalt)
TOPICS TO BE COVERED
August 21 Introduction to Cyberspace and Modes of Regulating It
For those who would like to know more about the Internet and its technical design, one or more of these readings may be useful. Here are some readings for those who would like to know more about the Internet and its technical design:
- · ACLU v. Reno, 929 F. Supp. 824 (E.D. Pa. 1996)(trial court findings of fact only Section II paragraphs 1-48) http://www.aclu.org/court/cdadec.html
- Barry M. Leiner et al., A Brief History of the Internet, http://www.isoc.org/internet/history/brief.html
- Sharon Eisner Gillett & Mitchell D. Kapor, The Self-Governing Internet: Coordination by Design (September 1996), http://ccs.mit.edu/papers/CCSWP197/CCSWP197.html
- A. Michael Froomkin, Habermas@discourse.net: Toward a Critical Theory of Cyberspace, http://www.discourse.net
- Request for Comments (RFC) 1958: Architectural Principles of the Internet, http://www.cis.ohio-state.edu/htbin/rfc/rfc1958.html
- The Internet Standards: Index of RFCs that serve as official Internet community standards. http://www.cis.ohio-state.edu/htbin/std/INDEX.std.html (NB: INDEX must be in all caps.)
For those who'd like a sampling of varying perspectives on regulation of cyberspace, one or more of these readings may be helpful:
- John Perry Barlow, A Declaration of Independence of Cyberspace, http://www.eff.org/~barlow/Declaration-Final.html
- James Boyle, Foucault in Cyberspace: Surveillance, Sovereignty & Hard-Wired Censors, http://www.james-boyle.com/
- Part 1 of Lawrence Lessig, Code and Other Laws of Cyberspace (2000), http://code-is-law.org/toc.html (includes preface and conclusion)
- Robert E. Litan, Law and Policy in the Age of the Internet, 50 Duke Law J. 1045 (2001) http://www.law.duke.edu/journals/dlj/articles/dlj50p1045.htm
- Henry H. Perritt, Jr., The Internet is Changing International Law, 73 Chi.-Kent L. Rev. 997 (1998)
- David G. Post, Anarchy, State and the Internet: An Essay on Law Making in Cyberspace, 1995 J. Online L., art. 3 (Oct. 1998), http://www.temple.edu/lawschool/dpost/Anarchy.html
- Joseph S. Sommer, Against Cyberlaw, 15 Berkeley Tech. L.J. 1145 (2001)
- Cass Sunstein, Republic.com (2001)
- Lawrence Lessig, The Law of the Horse: What Cyberlaw Might Teach, 113 Harv. L.Rev. 501, http://cyber.law.harvard.edu/works/lessig/finalhls.pdf
- Readings on Technorealism, http://technorealism.org/
For a discussion of recent or likely future regulatory initiatives pertaining to cyberspace, one or more of the following readings may be useful:August 23 Jurisdiction Over Commercial Websites
- Developments in the Law-The Law of Cyberspace, 112 Harv. L. Rev. 1574 (1999), Go to http://www.harvardlawreview.org/issues/ then "Browse Volumes": choose 112, scroll down to Issue no. 7.
- Yochai Benkler, Net Regulation: Taking Stock and Looking Forward, 71 Colo. L. Rev. 331(F00), http://papers.ssrn.com/paper.taf?ABSTRACT_ID=223248
- Andy Johnson-Laird, Looking Forward, Legislating Backward?, 4 J. Small & Emerg. Bus. Law 95 (2000)
- Carl S. Kaplan, Rambling Through Legal Websites, N.Y. Times, June 30, 2000, http://www.nytimes.com/library/tech/00/06/cyber/cyberlaw/30law.html (guide to cyberlaw reporter's most recommended sources of information on cyberlaw developments)
Required Readings:
- Cybersell, Inc. v. Cybersell, Inc., 130 F.3d 414 (9th Cir. 1997) (casebook at 775-84). Opinion in full can be found at http://laws.findlaw.com/9th/9617087.html
- Zippo Mfg. Co. v. Zippo Dot Com, Inc., 952 1119 (W.D. Pa. 1997) (casebook at 784-97). Opinion in full can be found at http://cyber.law.harvard.edu/metaschool/fisher/domain/dncases/zippo.htm
- Part III of Michael Geist, Is There a There There? Toward Greater Certainty for Internet Jurisdiction, 16 Berkeley Technology Law Journal 1 (Fall 2001), available at http://aix1.uottawa.ca/~geist/geistjurisdiction-us.pdf (part III only; begins on page 16)
Recommended Readings:
- Dan L. Burk, Jurisdiction in a World Without Borders, 1 Va. J. L. & Tech. 3 (1997), http://vjolt.student.virginia.edu/graphics/vol1/vol1_art3.html
- Jack Goldsmith, Against Cyberanarchy, 65 U. Chi. L. Rev. 1199 (1998)
- David Post, Outline and Summary of Cases, http://www.temple.edu/lawschool/dpost/outline.htm
- David Johnson and David Post, Law and Borders-The Rise of Law in Cyberspace, 48 Stanford Law Review 1367 (1996), http://www.temple.edu/lawschool/dpost/Borders.html
- The American Bar Association's Internet Jurisdiction Project, A Report on Global Jurisdictional Issues Created by the Internet, ABA, 2000
http://www.abanet.org/buslaw/cyber/initiatives/proj-documentation.html
September 11 Legal Ramifications of Filtering TechnologiesRequired Readings:
- Bochan v. LaFontaine, 68 F.Supp.2d 692 (E.D. Va. 1999), available at: http://lw.bna.com/lw/19990622/1749.htm
- Heathmount AE Corp. v. Technodome.com , 106 F. Supp.2d 860 (E.D. Va 2000) (in rem jurisdiction)
- United States v. Kammersell, 196 F.3d 1137 (10th Cir, 1999) (criminal jurisdiction), http://www.kscourts.org/ca10/cases/1999/11/98-4177.htm
Recommended Readings:August 30 Legal Regulation of Harmful Speech in Cyberspace
- Pavlovich v Superior Court of Santa Clara Co. & DVD-CCA (Cal. Ct. App. 2001) http://www.eff.org/Cases/DVDCCA_case/20010807_pavlovich_appelate_ruling.html
- United States v. Thomas, 74 F.3d 701 (6th Cir. 1996). (only sections I, II(B), II(C) of opinion), http://www.law.emory.edu/6circuit/jan96/96a0032p.06.html
- Carl Kaplan, AOL subscribers can be sued in VA, Judge Rules, N.Y. Times, June 11, 1999. www.nytimes.com/library/tech/99/06/cyber/cyberlaw/11law.html
- Thomas Lee, In Rem Jurisdiction in Cyberspace, 75 Wash L. Rev. 97 (2000) http://eon.law.harvard.edu/h2o/property/jurisdiction/lee.html
- Dan Burk, Federalism in Cyberspace, 28 Conn. L. Rev. 1095 (1996)
- Jay Kesan, Personal Jurisdiction in Cyberspace: Brief Summary of Personal Jurisdiction Law, available at
http://www.cyberspacelaw.org/kesan/kesan1.html- PRESS RELEASE: from lawyer of Defendant in the Caesar's World case (in rem jusrisdiction). www.interesting-people.org/200003/0032.html
Required:
- Reno v. ACLU, 117 S.Ct. 2329 (1997) (casebook at 932-53). Full opinion at http://www.ciec.org/SC_appeal/opinion.shtml
- ACLU v. Reno, 217 F.3d 162 (3rd Cir. 2000), cert granted http://www.epic.org/free_speech/copa/3d_cir_opinion.html#opinion
Recommended:September 4 Virtual Sex and Virtual Violence on the Internet
- Lawrence Lessig, The Law of the Horse, 113 Harv. L. Rev. 501 (1999) http://cyber.law.harvard.edu/works/lessig/finalhls.pdf
- American Library Ass'n v. Pataki, 969 F.Supp. 160 (S.D.N.Y. 1997) (striking down state indecency statute on dormant commerce clause grounds), http://www.aclu.org/court/nycdadec.html
- Urofsky v. Gilmore, 216 F.3d 401 (4th Cir. 2000) http://caselaw.findlaw.com/scripts/getcase.pl?court=4th&navby=case&no=981481Pv2&exact=1 (upholding state law forbidding state employees to use state computers to access pornographic materials)
- United States v. Thomas, 74 F.3d 701 (6th Cir. 1996)(casebook at 953-58) also available at http://www.law.emory.edu/6circuit/jan96/96a0032p.06.html
Required:
- Free Speech Coalition v. Reno, 198 F.3d 1083 (9th Cir. 1999), cert granted http://laws.findlaw.com/9th/9716536.html
- Planned Parenthood v. American Coalition of Life Activists, 244 F.3d 1007 (9th Cir. 2000) available at www.portlandporcupine.com/9circuit/
- U.S. v. Alkahbaz 104 F.3d 1492 (6th Cir. 1997) http://www.tomwbell.com/NetLaw/Ch04/Alkhabaz.html
Recommended Reading:September 6 Intermediary Liability for Harful Speech on the Internet
- Julian Dibble, A Rape in Cyberspace, The Village Voice, December 23, 1993, http://www.levity.com/julian/bungle_vv.html (HIGHLY RECOMMENDED)
Required Reading:Recommended Reading:
- Zeran v. America OnLine, Inc., 129 F.3d 327 (4th Cir. 1997) (casebook at 921-28)
- Blumenthal v. Drudge, 992 F. Supp. 44 (D.D.C. 1998) (casebook at 928-32)
- Kathleen R. v. City of Livermore,87 Cal.App. 4th 684, (2001)
www.techlawjournal.com/courts/kathleenr/20010306op.asp
- European Union Council Directive on certain legal aspects of electronic commerce in the Internal market, Articles 12-15 (Section 4)- Liability of intermediary service providers, Document 599PC0427, http://europa.eu.int/eur-lex/en/com/dat/1999/en_599PC0427.html
- Susan Friewald, Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation, Harv. J. L. & Tech. (forthcoming 2001), Click Here to View.
Required:
- Mainstream Loudon v. Loudon County Library, 24 F. Supp. 552 (E.D. Va. 1998), http://lw.bna.com/lw/19980421/972049.htm
- Complaint in Multnomah County Public Library v. United States, http://www.aclu.org/court/multnomah.pdf
Recommended:September 13 Unmasking Anonymous Speech on the Internet
- Mark S. Nadel, The First Amendment's Limitations on the Use of Internet Filtering in Public and School Libraries: What Content Can Librarians Exclude?, 78 Tex. L. Rev. 1117 (2000). Download from: http://papers.ssrn.com/paper.taf?ABSTRACT_ID=230834
- R. Polk Wagner, Filters and the First Amendment, 83 Minn. L. Rev. 755 (1999)
- Jonathan Weinberg, Rating the Net, 19 Hastings Comm. & Ent. L. J. 453 (1997), http://www.law.wayne.edu/weinberg/rating.htm
- Pamela Mendels, Survey Indicates Increased Use of Filters, N.Y. Times, May 12, 1999, http://www.nytimes.com/library/tech/99/05/cyber/education/12education.html
- American Civil Liberties Union, Farenheit 451.2: Is Cyberspace Burning? How Rating and Blocking Proposals May Torch Free Speech on the Internet (1998), http://www.aclu.org/issues/cyber/burning.html
- Junichi P. Semitsu, Burning Cyberbooks in Public Libraries: Internet Filtering Software vs. The First Amendment, 52 Stan. L. Rev. 509 (January 2000).
- Explore http://www.censorware.org/ (this site is no more as of Nov 4, 2000)
- Christopher D. Hunter, Negotiating the Global Internet Rating and Filtering System: Opposing Views of the Bertelsmann Foundation's Self-regulation of Internet Content Proposal, http://www.asc.upenn.edu/usr/chunter/bertelsmann.html
- Bertelsmann Foundation "Memorandum on Self-Regulation," http://www.stiftung.bertelsmann.de/internetcontent/english/content/c2220.htm
- INCORE (Internet Content Rating for Europe) Final Report by the European Commission: Action Plan on promoting safer use of the Internet, Self-labelling and Filtering, April 2000 (Full Report recommended-download from this page), http://www.ispo.cec.be/iap/INCOREexec.html
- IDATE, Review of European third-party filtering and rating software & services (Full Report recommended-download from this page), http://www.ispo.cec.be/iap/IDATEexec.html
- News and Comments about "Rating Issues" related to blocking and filtering of internet content, Center for Democracy and Technology, http://www.cdt.org/speech/
- Global Internet Liberty Campaign Member Statement Submitted to the Internet Content Summit Munich, Germany, September 9-11, 1999, http://www.gilc.org/speech/ratings/gilc-munich.html
- Freedom of Expression on the Internet report on Human Rights Watch website, http://www.hrw.org/wr2k/Issues-04.htm
- Epic, Filters and Freedom 2.0: Free Speech Perspectives on Internet Content Controls (2001)
Required:
Recommended Reading:
September 18 Why Regulating Spam is Difficult
- Dendrite Int'l v. Doe No. 3, 342 N.J.Super. 134, 2001 WL 770406 (N.J. Super. A.D. July 11, 2001)
- McIntyre v. Ohio Elections Commission, 115 S.Ct. 1511 (1995), available at http://legal.web.aol.com/aol/aolpol/mcopinion.html
- Anne Wells Branscomb, Anonymity, Autonomy, and Accountability as Challenges to the First Amendment in Cyberspaces, 104 Yale L. J. 1639, Special Symposium on The First Amendment and the New Media, May 1995.
- A. Michael Froomkin, Flood Control on the Information Ocean: Living with Anonymity, Digital Cash, and Distributed Databases, 15 U. Pa. J. L. & Comm. 395 (1996) available at www.law.miami.edu/~froomkin/articles/ocean.htm (anonymity section only)
- David L. Sobel, The Process That "John Doe" is Due: Addressing the Legal Challenges to Internet Anonymity, 5 Va. J.L. & Tech. 3, 14 (2000).
Required:
- CompuServ, Inc. v. Cyberpromotions, Inc., 962 F. Supp. 1015 (S.D. Ohio 1997) (casebook at 959-70), entire case at http://swissnet.ai.mit.edu/6805/assorted-short-pieces/cs-cp2.html
- State v. Heckel, 24 P.3d 404 (Wash., 2001) available at http://www.courts.wa.gov/opinions/opindisp.cfm?docid=694168MAJ
- David Post, Of Blackholes and Decentralized Lawmaking in Cyberspace, 2 Vand. J. Ent. L. & Prac. 70 (2000), http://www.temple.edu/lawschool/dpost/blackhole.html
- (WEB ONLY) Oscar Cisneros, Yesmail Fights Blacklist, Wired, July 18, 2000, http://www.wired.com/news/politics/0,1283,37621,00.html
- (WEB ONLY) Stephanie Olson, Congress, Critics Wrinkle Noses at Anti-Spam Bills, CNET News (May 21, 2001)
http://news.cnet.com/news/0-1005-200-5976585.htmlRecommended:September 20 Trespass As a Way to Control Unwanted Activities on the Internet
- The Realtime Blackhole List's Rationale, http://mail-abuse.org/rbl/rationale.htmll
- Media3 Technologies v. MAPS and Vixie, 2001 U.S. Dist. Lexis 131 - January 2, 2001 http://pub.bna.com/eclr/00cv12524.htm
- Linx, Best Current Practice for Combating Unsolicited Bulk Email, Version 1.0, May 18, 1999, available at www.linx.org/noncore/bcp/ube-bcp.html
- John Marshall Law School site on regulation of unsolicited email, http://www.jmls.edu/cyber/index/spam.html
- Ferguson v. Friendfinder, No. 307309 (Cal. Superior Ct. 2000), available at
http://www.tomwbell.com/NetLaw/Ch04/Ferguson.html (currently on appeal)(striking down CA state anti-spam law on dormant commerce clause grounds)- Jack L. Goldsmith & Alan O. Sykes, The Internet and the Dormant Commerce Clause, 110 Yale L. J. 785(2001), available at http://papers.ssrn.com/paper.taf?abstract_id=246100
- Ron N. Dreben and Johanna L. Werbach, Senators Versus Governors: State and Federal Regulation of E-Commerce, 17 NO. 6 Computer Law. 3 (June, 2000) (article about the tension between federal and state law on the Internet, dormant commerce clause collision).
- Kenneth C. Amaditz, Canning "Spam" in Virginia: Model Legislation to Control Junk E-Mail, 4 Va. J.L. & Tech. 4 (Spring 1999), http://vjolt.student.virginia.edu/graphics/vol4/home_art4.html
- Carl S. Kaplan, An Argument for 'Netiquette' Holds Up in Court, N.Y. Times, July 16, 1999, http://www.nytimes.com/library/tech/99/07/cyber/cyberlaw/16law.htm
Required:
- Intel Corp. v. Hamidi, 15 I.E.R. Cases (BNA) 464 (Cal. Sup. Ct. 1999). See Tentative Ruling, http://cyber.law.harvard.edu/msvh/hamidi/tentativesjruling.html
- eBay v. Bidder's Edge, 100 F.Supp.2d 1058 (C.D. Cal. 2000), http://pub.bna.com/lw/21200.htm
- Dan L. Burk, The Trouble With Trespass, 4 J. Small & Emerg. Bus. L. 27 (2000). Download from: http://papers.ssrn.com/paper.taf?ABSTRACT_ID=223513
Recommended:September 25 Legal Protection for Personal Data on the Internet
- Register.com v. Verio 126 F. Supp. 2d 238 (S.D.N.Y. 2000) available at http://pub.bna.com/eclr/00cv5747.htm
- Thrifty-Tel, Inc. v. Bezenek, 46 Cal. App. 4th 1559 (1996), http://www.kentlaw.edu/classes/rwarner/legalaspects/thrifty_tel.htm
- Ticketmaster, Inc. v. Tickets, 54 U.S.P.Q.2d 1344 (C.D. Cal. 2000), http://www.ipwatchdog.com/ticketmaster.html
- Amicus Brief in Support of Bidder's Edge by 28 Law Professors, http://www.gseis.ucla.edu/iclp/ebay-ml
- Electronic Frontier Foundation's amicus brief raising First Amendment questions in the appeal of Intel Corp. v. Hamidi, http://www.intelhamidi.com/amicusbrief.htm
- Read official documents (including appeal briefs) plus commentary about Intel v. Hamidi on the Berkman Center for Internet and Society page, http://eon.law.harvard.edu/openlaw/intelvhamidi/documents.html and on Intel vs. Hamidi.com: http://www.intelhamidi.com/
- Explore the FACE (Former And Current Employees of) Intel web site, http://www.faceintel.com/
- Oscar Cisneros, Ebay Fights Spiders on the Web, WIRED News, July 31, 2000, http://www.wired.com/news/politics/0,1283,37643,00.html
Required Reading:September 27 Pros and Cons of Stronger Privacy Rules for CyberspaceRecommended Reading:
- Konop v. Hawaiian Airlines, Inc., 236 F.3d 1035 (9th Cir. 2001), available at http://laws.lp.findlaw.com/9th/9955106.html
- In re DoubleClick, 2001 WL 303744 (S.D.N.Y. 2001), available at http://www.nysd.uscourts.gov/courtweb/pdf/D02NYSC/01-03797.Pdf
- In re GeoCities (casebook at 991-1002)
- City of Kirkland v. Sheehan, No. 01-2-09513-7 SEA(injunction to remove Social Security numbers from web site),
http://www.justicefiles.org/Court%20Oders/Court%20Order%20May%2010th%202001.htm- Judnick v. DoubleClick, Calif. Super. Ct., Marin Cty., No. CIV 000421 (June 6, 2001) (allowing privacy class action to go to trial in California), http://www.eff.org/Legal/Cases/DoubleClick_cases/20010606_marin_ruling.html
- Quintiles v. WebMD, No. 5:01-CV-180-BO(3) (E.D.N.C. 2001)(dormant commerce clause prevents states from regulating Internet transmission of health care information under privacy laws) http://biz.yahoo.com/e/010321/qtrn.html
- Smyth v. Pillsbury, 914 F. Supp. 97 (E.D. Pa. 1996). http://www.Loundy.com/CASES/Smyth_v_Pillsbury.html (workplace privacy not protected)
- Federal Trade Commission, Online Profiling: A Report to Congress, http://www.ftc.gov/os/2000/06/onlineprofilingreportjune2000.pdf
- Federal Trade Commission, Online Profiling: A Report to Congress (Part 2): Recommendations, http://www.ftc.gov/os/2000/07/onlineprofiling.pdf
- Children's Online Privacy Protection Act of 1998 (COPPA), available at http://www.ftc.gov/ogc/coppa1.htm
- FTC Kidzprivacy site, http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/index.html
- Joseph Turow, Privacy Policies on Children's Websites: Do They Play By the Rules? (March 2001), available at http://www.appcpenn.org
- H.R. 4908, Notice of Electronic Monitoring Act (July 20, 2000), available at http://thomas.loc.gov/cgi-bin/query/z?c106:H.R.4908:
- Jerry Kang, Information Privacy in Cyberspace Transactions, 50 Stan. L. Rev. 1193 (1998)[Note: Skip section 2 on the technology if you're familiar with it.], http://www.law.ucla.edu/Faculty/kang/Scholarship/cprivacy.pdf
- Cyberspace Privacy Symposium, 52 Stan. L. Rev. 987 (2000), http://www.law.stanford.edu/lawreview/symposium/index.html (currently not working)
Required Reading:
- Federal Trade Commission, Privacy Online: Fair Information Practices in the Electronic Marketplace, A Report to Congress (May 2000), http://www.ftc.gov/reports/privacy2000/privacy2000text.pdf
- Robert W. Hahn, An Assessment of the Costs of Proposed Online Privacy Legislation (May 7, 2001), available at http://www.actonline.org/pubs/HahnStudy.pdf
Recommended Reading:
- Peter Swire's, response to the Hahn study, "New Study Substantially Overstates Costs of Internet Privacy Protection," http://www.osu.edu/units/law/swire.htm
- Steven A. Hetcher, The FTC as Internet Privacy Norm Entrepreneur, 53 Vand. L. Rev. 2041 (2000), available at http://law.vanderbilt.edu/lawreview/53_6.html
- S. 197, Spyware Control and Privacy Protection Act of 2001, available at http://thomas.loc.gov/cgi-bin/query/z?c107:S.197:
- H.R. 89, Online Privacy Protection Act of 2001, available at
http://thomas.loc.gov/cgi-bin/query/z?c107:H.R.89:- Platform for Privacy Preferences homepage, http://www.w3.org/P3P/
- Electronic Privacy Information Center & Junkbusters, Pretty Poor Privacy: An Assessment of P3P and Internet Privacy (June 2000), http://www.epic.org/reports/prettypoorprivacy.html
- The Web Bug FAQ, by Richard M. Smith (Nov. 11, 1999), http://www.eff.org/pub/Privacy/Profiling_cookies_webbugs/web_bug.html
- Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal L 024, 30/01/1998 p. 0001-0008, http://europa.eu.int/eur-lex/en/lif/dat/1997/en_397L0066.html
- US-EU Safe Harbor Agreement, available at http://www.export.gov/safeharbor/sh_overview.html
- David Banisar and Simon Davies of Privacy International, Global Trends in Privacy Protection: An International Survey Privacy, Data Protection, and Surveillance Laws and Developments, 18 J. Marshall J. Computer & Info. L. 1 (Fall 1999).
- Peter P. Swire & Robert E. Litan, None of Your Business: World Data Flows, Electronic Commerce, and the European Privacy Directive (1999).
October 2 Legal Regulation of Encryption TechnologiesOctober 9th - Antitrust in Cyberspace: US v. MicrosoftRequired:
- Bernstein v. United States, 176 F.3d 1132 (9th Cir. 1999), http://laws.findlaw.com/9th/9716686.html (opinion withdrawn but nevertheless worth looking at) (casebook at 1007-24)
- A. Michael Froomkin, It Came From Planet Clipper: The Battle Over Crytpographic Key Escrow, 1996 U. Chi. L. Forum 15 (1996), http://www.law.miami.edu/~froomkin/articles/planet_clipper.htm
Recommended:October 4 Cybercrimes
- Steven Levy, Did Encryption Power These Terrorists?, Newsweek, Sept. 12, 2001http://msnbc.com/news/627390.asp?cp1=1
- Ann Harrison, Terror Revives Crypto Debate, Security Focus,
http://www.securityfocus.com/news/256- Duncan Campbell, How the Plotters Slipped US Net, The Guardian, http://www.guardian.co.uk/Archive/Article/0,4273,4264719.00.html
- Kenneth Dam and Herbert Lin, eds., National Research Council, Cryptography's Role In Securing the Information Society (1996), available at http://www.nap.edu/books/0309054753/html/index.html
- Junger v. Daley, 209 F.3d 481 (6th Cir. 2000) http://pacer.ca6.uscourts.gov/cgi-bin/getopn.pl?OPINION=00a0117p.06
- Electronic Privacy Information Center, Cryptography and Liberty 2000: An International Survey of Encryption Policy, http://www2.epic.org/reports/crypto2000/
- Tim C. May, The Crypto Anarchist Manifesto, http://www.activism.net/cypherpunk/crypto-anarchy.html
- Anonymous, Introduction to Blacknet, http://www.attrition.org/~wrlwnd/crypto/misc/blacknet.html
- Whitfield Diffie & Susan Landau, Privacy On Line: The Politics of Wiretapping and Encryption (1999)
- Steven Levy, Crypto: How the Code Rebels Beat the Government-Saving Privacy in the Digital Age (2001)
Required:
- United States v. Morris, 928 F.2d 504 (2d Cir. 1991) (casebook at 971-79), http://www.jmls.edu/cyber/cases/morris.txt
- United States v. Riggs, 739 F. Supp. 414 (1990) (casebook at 979-90)
- Report of the President's Working Group on Unlawful Conduct on the Internet, The Electronic Frontier: The Challenge of Unlawful Conduct Involving Use of the Internet, [Note: focus on sections II(A), II(B), II(D)(2), III(B)(2), & III(D)], http://www.usdoj.gov/criminal/cybercrime/unlawful.htm
Recommended Reading
- Karen Kaplan, Securing the Future, L.A. Times,
http://www.latimes.com/technology/la-000075372sep20.story?coll=la%Dheadlines%2Dtechnology
- Lisa Guernsey, Living Under an Electronic Eye, NY Times, Sept 27, 2001
http://www.nytimes.com/2001/09/27/technology/circuits/27PRIV.html?ex=1002962944&ei=1&en=810a63828c2bd859- Carl Kaplan, Concern Over Proposed Changes in Internet Surveillance, NYTimes online
http://www.nytimes.com/2001/09/21/technology/21CYBERLAW.html?ex=1002953639&ei=1&en=82d908d16bc4d74e- Center for Democracy & Technology, The Nature and Scope of Governmental Electronic Surveillance Activity, http://www.cdt.org/wiretap/wiretap_overview.html
- European Commission, Creating a Safer Information Society by Improving The Security of Information Infrastructures & Combating Computer-Related Crime, available at http://europa.eu.int/ISPO/eif/InternetPoliciesSite/Crime
- National Plan for Information Security Protection, http://www.whitehouse.gov/media/pdf/npisp-execsummary-000105.pdf (pages i-iii, the President's Message, are hard to read due to scanning, but the rest is fine)
- Department of Justice's site on Computer Crime and Intellectual Property Section, available at http://www.cybercrime.gov/
- DOJ guidelines on computer searches and seizures, available at http://www.cybercrime.gov/searching.htm
- Concerning Carnivore, the FBI's new email surveillance system:
- Congress Probes F.B.I. E-Mail Snooping Device, N.Y. Times on the web, July 25, 2000, http://search3.nytimes.com/search/daily/bin/fastweb?getdoc+site+site+133285+0+wAAA+Carnivore
- Chris Oakes, Judge to FBI: Move on Carnivore, Wired, Aug. 2, 2000, http://www.wired.com/news/politics/0,1283,37967,00.html
- Steve Bellovin and Matt Blaze, Open Internet Wiretapping, 19 July 2000 (short essay on Carnivore by AT&T researchers who testified in the Carnivore hearings by the House Judiciary Committee's Subcommittee on the Constitution), http://www.crypto.com/papers/openwiretap.html
- Robert O Harrow, Matching Faces With Mugshots, Washington Post, August 1, 200, pg A01 http://www.washingtonpost.com/wp-dyn/articles/A12629-2001Jul31.html
- David J. Lynch, U.K. looks to eavesdrop on Net, USA TODAY, June 28, 2000, (UK's email surveillance system), http://www.usatoday.com/life/cyber/tech/cti161.htm
- Bruno Guissani, European Study Paints a Chilling Portrait of Technology's Uses, N.Y. Times on the Web, Feb. 24, 1998, (article about Echelon) http://www.nytimes.com/library/cyber/euro/022498euro.html
- Bruce Sterling, The Hacker Crackdown (1994), http://lonestar.texas.net/~dub/sterling.html
Required Reading:Recommended Reading
- United States v. Microsoft Corp., 253 F.3d 34(D.C. Cir. 2001) (sections I, II, and IV only)
HTML: http://eon.law.harvard.edu/msdoj/msft_ruling.html
PDF: http://eon.law.harvard.edu/msdoj/0628-decision.pdf- Bill Gates, U.S. v. Microsoft: We're Defending Our Right to Innovate, The Wall Street Journal, (May 20, 1998) http://www.microsoft.com/PressPass/doj/5-20wsjoped.asp
- John R. Wilke and James Bandle, Kodak tangles with Microsoft over Win XP, ZDNet News, July 2, 2001, available at http://www.zdnet.com/zdnn/stories/news/0,4586,2781900,00.html
- United States v. Microsoft Corp., 84 F. Supp.2d 9 (D.D.C. 1999) (findings of fact)[Note: Focus on Findings 1-177 and choose one or two examples of Microsoft's anti-competitive practices in the browser wars (the IEAKs; dealings with AOL, Apple, etc.)], available at http://www.usdoj.gov/atr/cases/f3800/msjudgex.htm,
- United States v. Microsoft Corp., 87 F. Supp.2d 30 (D.D.C. 1999) (conclusions of law), available at http://www.usdoj.gov/atr/cases/f4400/4469.htm
- United States v. Microsoft., 97 F.Supp.2d 59 (D.D.C. 2000)(remedial order), available at http://usvms.gpo.gov/ms-final.html (See especially sections 1-4)
- Gates Memo to Executive Staff: re: "The Internet Tidal Wave", www.usdoj.gov/atr/cases/exhibits/20.pdf
- Ken Auletta, World War 3.0 (2000)
- John Heilemann, The Truth, The Whole Truth and Nothing But the Truth, http://www.wired.com/wired/archives/8.11/microsoft.html
- David S. Evans, Franklin M. Fisher, Daniel L. Rubinfeld, & Richard L. Schmalensee, Did Microsoft Harm Consumers? Two Opposing Views (2000)
- Dennis S. Karjala, Copyright Protection of Operating Software, Copyright Misuse, and Antitrust, 9 Cornell J. Law & Public Policy 161 (1999)
- William Kovacic, Designing Antitrust Remedies for Dominant Firm Misconduct, 31 Conn. L. Rev. 1285 (1999)
- Mark A. Lemley & David McGowan, Could Java Change Everything? The Competitive Propriety of a Proprietary Standard, 43 Antitrust Bull. 715 (Spring 1998), available at http://cyber.law.harvard.edu/msdoj/lemley.html
- Remedies Brief of Amici Curiae Robert E. Litan, Roger G. Noll, William D. Nordhaus, & Frederic M. Scherer, available at http://papers.ssrn.com/paper.taf?abstract_id=241448
October 11th - OPEN SOURCE IN CYBERSPACEOctober 23 More on Antitrust in Cyberspace
Required Reading:
- Robert Gomulkiewicz, How Copyleft Uses License Rights To Succeed in the Open Source Revolution and the Implications for Article 2B, 36 Houston L. Rev. 179 (1999), available at http://www.2bGuide.com/docs/HCUL.doc
- Eben Moglen, Anarchism Triumphant: Free Software and the Death of Copyright http://emoglen.law.columbia.edu/publications/anarchism.html (Cite)
- Craig Mundie speech about open source and GPL http://www.microsoft.com/presspass/exec/craig/05-03sharedsource.asp
- Lawrence Lessig, The Limits in Open Code: Regulatory Standards and the Future of the Net, 14 Berkeley Technology L.J. 759 (1999) http://www.law.berkeley.edu/journals/btlj/articles/14_2/Lessig/html/text.html
Recommended Readings:
- Microsoft's "Halloween" documents, http://www.opensource.org/halloween/
- GNU General Public License, http://www.fsf.org/copyleft/gpl.html
- Eric S. Raymond, The Cathedral and the Bazaar (August 8, 1999), http://www.tuxedo.org/~esr/writings/cathedral-bazaar/cathedral-bazaar.html
- Chris DiBona, Sam Ockman, and Mark Stone, Introduction to Open Sources: Voices from the Open Source Revolution, (O'Reilly 1999), http://www.oreilly.com/catalog/opensources/book/intro.html
- Free Software Foundation, Campaign Against Abusive Shrinkwrap Licenses, http://commons.somewhere.com/rre/1999/RRE.campaign.against.abu.html
- Richard Stallman, Why Software Should Be Free, http://www.fsf.org/philosophy/shouldbefree.html
- Netscape Public License, http://www.mozilla.org/NPL/
- Apache Server License, http://www.apache.org/LICENSE.txt
- Ira Heffan, Copyleft: Licensing Collaborative Works, 49 Stan. L. Rev. 1487 (1997) (comment on whether open source licenses are enforceable)
- David McGowan, Legal Implications of Open Source Software, 2001 U. Ill. L. Rev. 241 (2001), available at http://www.law.umn.edu/FacultyProfiles/articles/OpenSourceFinal.pdf
- Oscar S. Cisneros, Expanding the Universe of Ideas, Wired News (June 17, 1999), http://www.wired.com/news/news/politics/story/20276.html (The Open Publication License)
- Bryan Pfaffenberger, The Coming Software Patent Crisis: Can Linux Survive?, linuxjournal Currents #3, (Aug. 10, 1999) http://linuxjournal.com:82/articles/currents/003.html
Required Reading:
Recommended Reading:
- Mark A. Lemley & Lawrence Lessig, The End of End to End: Preserving the Architecture of theInternet in the Broadband Era, 28 UCLA L. Rev. (2000), available at http://www.bepress.com/cgi/viewpdf.cgi?journal=blewp&article=1029&preview_mode (HIGHLY RECOMMENDED)
- Jerry Berman & Daniel Weitzner, Abundance and User Control: Renewing the Democratic Heart of the First Amendment in the Age of Interactive Media, 104 Yale L.J. 1619 (1995), http://www.suffolk.edu/law/hightech/classes/sp98cyber/wk5art1.htm.
- James B. Speta, Handicapping the Race for the Last Mile? A Critique of Open Access Rules for Broadband Platforms, 17 Yale J. Reg. 39, 76 (2000) available at http://www.northwestern.edu/faculty/fulltime/speta/papers/spetaFINAL.pdf
- Thor Olavsrud, FTC approves AOL/Time Warner Merger with Heavy Restrictions, Internet News, December 14, 2000 http://www.internetnews.com/bus-news/article/0,,3_536161,00.htm
October 25 Copyright in Cyberspace: An Introduction
Required Reading:
- Playboy Enterprises v. Webbworld, 991 F. Supp. 543 (N.D. Tex. 1997) (casebook at 859-72)
- National Research Council, The Digital Dilemma: Intellectual Property Rights in the Information Age, Executive Summary, available at http://books.nap.edu/html/digital_dilemma/exec_summ.html
- Pamela Samuelson, Copyright Grab, 4.01 WIRED 135 (1996), http://www.wired.com/wired/archive/4.01/white.paper.html
Recommended Reading:
- Intellectual Property and the National Information Infrastructure: Report of the Working Group on Intellectual Property Rights (Sept. 1995), available at http://www.uspto.gov/web/offices/com/doc/ipnii/
- WIPO Copyright Treaty, available at www.jus.uio.no/lm/wipo.copyright.treaty.1996/doc.html
- Terry Carroll, Copyright FAQ, http://www.tjc.com/copyright/
- John Perry Barlow, The Economy of Ideas, 2.03 WIRED 84 (1994)
www.wired.com/wired/archive/2.03/economy.ideas.html- Esther Dyson, Intellectual Value, 3.07 WIRED 136 (1995)
www.wired.com/wired/archive/3.07/dyson.html- Paul Edward Geller, From Patchwork to Network: Strategies for International Intellectual Property in Flux, 31 Vand. J. Transn'l L. 553 (1998), available at http://papers.ssrn.com/paper.taf?abstract_id=185868
- Jane C. Ginsburg, Putting Cars on the "Information Superhighway": Authors, Exploiters and Copyright in Cyberspace, 95 Colum. L. Rev. 1466 (1995)
- Bernt Hugenholtz, ed., Copyright and Electronic Commerce: Legal Aspects of Electronic Copyright Management (2000)
- Bernt Hugenholtz, ed., The Future of Copyright in a Digital Environment (1996)
- Peter A. Jaszi, Caught in the Net of Copyright, 75 Oregon L. Rev. 299 (1996)
- Jessica Litman, Digital Copyright (2001)
- Pamela Samuelson, The U.S. Digital Agenda at WIPO, 37 Va. J. Int'l L. 369 (1997)
- Eric Schlachter, The Intellectual Property Renaissance in Cyberspace: Why Copyright Law Could Be Unimportant on the Internet, 12 Berkeley Tech. L. J. 15 (1997)
October 29 Intermediary Liability for Copyright Infringement in Cyberspace
Required Reading:
- Religious Technology Center v. Netcom, 907 F. Supp. 1361 (N.D. Cal. 1995) (casebook at 872-91)
- A& M Records, Inc. v. Napster, Inc., 114 F.Supp.2d 896 (N.D. Cal. 2000) (safe harbor defense ruling), available at http://news.cnet.com/News/Pages/Special/Napster/napster_patel.html
- ALS Scan v. Remarq Communities, Inc., 239 F.3d 619 (4th Cir. 2001), available at http://pub.bna.com/eclr/001351.htm
Recommended Reading:
- Niva Elkin-Koren, Copyright Law and Social Dialogue on the Information Superhighway: The Case Against Copyright Liability for Bulletin Board Operators, 13 Cardozo Arts & Ent. L.J. 345, 403-07 (1995)
- Alfred C. Yen, Internet Service Provider Liability for Subscriber Copyright Infringement, Enterprise Liability and the First Amendment, 88 Geo. L. J. 1833 (2000), available at http://papers.ssrn.com/paper.taf?abstract_id=236478
- Rosa Julia-Barcelo, On-line Intermediary Liability Issues : Comparing E.U. and U.S. Legal Frameworks, 22 Eur. Intell. Prop. Rev. 105 (2000)
- Kamiel J. Koelman and Rosa Julia-Barcelo, Intermediary Liability in the E-Commerce Directive: So Far, So Good, But It's Not Enough, 4 Computer Law & Security Report 231 (2000)
November 1 Digital Music and Copyright in Cyberspace: The Napster Case
Required Reading:
- A& M Records, Inc. v. Napster, Inc, 239F.3d 1004 (9th Cir. 2001)
http://www.nyls.edu/samuels/copyright/beyond/cases/napster.html
Recommended Reading:
- Metallicops-Napster Bad, http://www.campchaos.com/cartoons/napsterbad/napsterbad.html
- Screwmetallica.org, http://www.screwmetallica.org/
- Cuckoo's Egg Project (self-help strategy to undermine online music piracy), http://www.hand-2-mouth.com/cuckooegg/
- Kid Rock Starves to Death: MP3 Piracy Blamed, http://www.theonion.com/onion3618/kid_rock_starves.html
- Shane Ham and Robert D. Atkinson, Napster and Online Piracy: The Need to Revisit the Digital Millennium Copyright Act, Policy Report (May 2000), http://www.dlcppi.org/texts/tech/napster1.htm
- John Markoff, Can Copyright Survive the Net? http://search1.nytimes.com/search/daily/bin/fastweb?getdoc+cyber-lib+cyber-lib+10602+1+wAAA+gnutella%7Efreenet
- Leander Kahney, Alternative Net Protects Pirates, http://www.wired.com/news/technology/0,1282,34768,00.html
- Laura Carr, Stats Speak Kindly of Napster, The Standard, July 21, 2000 (recent data shows that the free song-swapping service actually increases music buying), http://www.thestandard.com/article/display/0,1151,17057,00.html?mail
- Mark Latonero, Survey of MP3 Usage: Report on a University Consumption Community, USC'S Annenberg's Norman Lear Center Study, June 2000, http://www.entertainment.usc.edu/publications/mp3.pdf. For the press release on this study's findings, see http://www.entertainment.usc.edu/indexf.html?/nlc/mp3.html
- Michael Learmonth, Finally, Some Numbers on Napster, The Standard, May 29, 2000 (discussing study showing that record sales are sagging in neighborhoods near college campuses-is Napster the reason?), http://www.thestandard.com/article/display/0,1151,15502,00.html?mail
- Statement made by Gene Kan, creator of Gnutella, a Napster-like service that has no central server, http://www.senate.gov/~judiciary/7112000_gk.htm
- Transcript of preliminary injunction hearing in Napster of July 26, http://riaa.org/PDF/NapsterPatel.pdf
- Proceedings of "Signal or Noise: The Future of Music on the Net," http://cyber.law.harvard.edu/events/netmusic.html
- Courtney Love, Courtney Love Does the Math, June 14, 2000, Salon Magazine, http://www.salon.com/tech/feature/2000/06/14/love/index.html
- Raymond S.R. Ku, The Creative Destruction of Copyright: Napster and the New Economics of Digital Technology, -- Chi. L. Rev. - (forthcoming 2001), available at http://papers.ssrn.com/paper.taf?abstract_id=266964
- John Borland, RIAA Sues Aimster Over File Swapping, CNET News.com, May 25, 2001, http://news.cnet.com/news/0-1005-200-6033575.html
November 6 More on Digital Music and Copyright in Cyberspace
Required Reading:
- RIAA v. Diamond Multimedia Systems, Inc., 180 F.3d 1072 (9th Cir. 1999) (casebook at 903-12), full opinion available at http://caselaw.findlaw.com/cgi-bin/getcase.pl?court=9th&navby=docket&no=9856727
- UMG Recordings, Inc. v. MP3.com, Inc., 92 F.Supp.2d 349 (S.D.N.Y., 2000), edited opinion available at www.tomwbell.com/NetLaw/Ch07/UMG.html
- William Fisher, Digital Music: Problems and Possibilities, http://www.law.harvard.edu/Academic_Affairs/coursepages/tfisher/Music.html
Recommended Reading:
- National Research Council, The Digital Dilemma: Intellectual Property Rights in the Information Age, chapter on digital music, available at http://books.nap.edu/html/digital_dilemma/ch2.html
- Senate Hearings on Digital Music, Online Entertainment: Coming Soon to a Digital Device Near You,
April 3, 2001, available at http://www.senate.gov/~judiciary/hr040301f.htm- MP3 Board v. RIAA Complaint; http://www.techfirm.com/briefs/riaacomp.pdf
- Melville B. Nimmer & David Nimmer, Nimmer on Copyright, vol. 2, § 8B.07 on The Audio Home Recording Act of 1992
- NY Times index of stories about music on the Internet, http://www.nytimes.com/library/tech/reference/index-music.html
- Music Online Competition Act of 2001, HR 2724, 107th Cong. (2001), available at http://thomas.loc.gov/cgi-bin/bdquery/z?d107:h.r.02724: ; Summary available at http://www.house.gov/boucher/docs/moca-summary.htm
November 8 Implications of Digital Rights Management Systems
Required Reading:
- Julie E. Cohen, A Right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace, 28 Conn. L. Rev. 981 (1996), (SKIM SECTION II) www.law.georgetown.edu/faculty/jec/read_anonymously.pdf
Recommended Reading:
- William W. Fisher III, Property and Contract on the Internet, 73 Chi.-Kent L. Rev. 1203 (1998)
http://eon.law.harvard.edu/property99/alternative/98fish.html (June 10, 1998 draft)- Secure Digital Music Initiative, http://www.sdmi.org
- Tom Bell, Fair Use vs. Fared Use: The Impact of Automated Rights Management on Copyright's Fair Use Doctrine, 76 N.C. L. Rev. 557 (1998)
abstract: http://www.tomwbell.com/writings/AbFared.html
full paper: http://www.tomwbell.com/writings/FullFared.html- Dan L. Burk & Julie E. Cohen, Fair Use Infrastructure for Copyright Management Systems, 11 Harv. J. Law & Tech. (forthcoming) available at http://papers.ssrn.com/paper.taf?abstract_id=239731
- Julie E. Cohen, Copyright and the Jurisprudence of Self-Help, 13 Berkeley Tech. L.J. 1087 (1998) available at http://www.law.berkeley.edu/journals/btlj/articles/13_3/Cohen/html/text.html
- David Friedman, In Defense of Private Orderings, 13 Berkeley Tech. L.J. 1149 (1998) www.law.berkeley.edu/journals/btlj/articles/13_3/Friedman/html/reader.html
- Jane C. Ginsburg, From Having Copies to Experiencing Works: the Development of an Access Right in U.S. Copyright Law, in U.S. Intellectual Property: Law and Policy (Hugh Hansen, ed., 2001), available at http://papers.ssrn.com/paper.taf?abstract_id=222493
- Mark Stefik, Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing, 12 Berkeley Tech. L.J. 137 (1997)
- Sara Robinson, CD Software is said to Monitor Users Listening Habits, New York Times, November 1, 1999 http://www.wcbcourses.com/wcb/schools/LEXIS/law08/pschwartz/2/files/01REAL.HTML
November 13 Circumvention of Technical Measures Protecting Digital ContentRequired Reading:
- Universal City Studios v. Reimerdes, 111 F. Supp. 2d 294 (S.D.N.Y. 2000) (On appeal - to be decided soon), available at http://eon.law.harvard.edu/openlaw/DVD/NY/trial/op.html
- DVD-CCA v. McLaughlin, 2000 WL 48512 (Cal. Super. 2000), http://www.eff.org/pub/Intellectual_property/Video/DVDCCA_case/20000120-pi-order.html
- CA Appellate Decision Overturning DeCSS Injunction in DVDCCA v. Bunner (Nov. 1, 2001)
rev'd sub nomine DVD-CCA v. Bunner, Calif. Ct. App. (2001),
http://www.eff.org/Cases/DVDCCA_case/20011101_bunner_appellate_decision.html
<<<short version>>>
http://eff.org/sc/20011101_bunner_appellate_decision.html
Recommended Reading:November 15 More on Circumvention
- Universal City Studios v. Corley, (2d Cir. N.Y. Nov. 28, 2001) opinion affirming a lower court ruling in Universal City Studios v. Reimerdes. http://www.sims.berkeley.edu/academics/courses/is235/f01/ reimerdes_nov28_2001.pdf
- Jane C. Ginsburg, Copyright Use and Excuse on the Internet, 24 Colum.-VLA J. L. & Arts 1 (2000) http://papers.ssrn.com/paper.taf?abstract_id=239747
- David Nimmer, A Riff on Fair Use in the Digital Millennium Copyright Act, 148 U. Pa. L. Rev. 673 (2000)
- Brief Amicus Curiae, American Committee for Interoperable Systems and Computer & Communications Industry Ass'n in support of Bruner in DVD-CCA v. Bruner, on appeal to California appellate court; http://www.eff.org/pub/Intellectual_property/Video/DVDCCA_case/20000628_def_ccia_appeal_amicus.html
- EU Directive on the harmonisation of certain aspects of copyright and related rights in the Information Society, Document 599PC0250, see especially Article 6 on Technical Protection Measures, http://europa.eu.int/comm/internal_market/en/intprop/docs/index.htm (click on Directive 2001/29/EC of the European Parliament and the Council of 22 May 2001 on the harmonization of certain aspects of copyright and related rights in the information society)
- Séverine Dusollier, Tipping the Scale in Favor of the Right Holders: The Anti-Cirumvention Provisions of the European Directive on Copyright and Information Society http://www.sims.berkeley.edu/academics/courses/is235/f01/TM art6 2001.doc
- Kamiel J. Koelman, A Hard Nut to Crack: The Protection of Technological Measures, 22 Eur. Intell. Prop. Rev. 272 (2000) http://www.ivir.nl/publications/koelman/harnut.html
Required Reading:
- Complaint in Felten v. RIAA, available at http://www.eff.org/sc/felten/20010606_eff_complaint.html
- Brief Amicus Curiae of Cryptographers in Universal v. Reimerdes http://www.eff.org/IP/Video/MPAA_DVD_cases/20010126_ny_crypto_amicus.html
- (WEB ONLY) Julie E. Cohen, Unfair Use, The New Republic online; http://www.tnr.com/online/cohen052300.html
- (WEB ONLY) Andrea Foster, 2 Scholars Face Off in Copyright Clash, The Chronicle of Higher Education, August 10, 2001, at 45. http://chronicle.com/free/v47/i48/48a04501.htm
Recommended Reading:
- Larry Lessig, Jail Time in the Digital Age, N.Y. Times, July 30, 2001 http://www.nytimes.com/2001/07/30/opinion/30LESS.html
- Criminal Complaint in US v. Dmitry Sklyarov, Case # 5 01 257
http://www.eff.org/IP/DMCA/US_v_Sklyarov/20010707_complaint.html- Amy Harmon, Software Double Bind, N.Y. Times, August 13, 2001, http://www.nytimes.com/2001/08/13/technology/ebusiness/13NECO.html
- RealNetworks, Inc. v. Streambox, Inc., 2000 WL 127311 (W.D. Wash. 2000), available at http://www.streambox.com/RNvsSB/ruling.htm
- Sony Computer Entertainment America, Inc. v. Gamemasters, 87 F.Supp.2d 976 (N.D. Cal. 1999)
- Library of Congress/Copyright Office rulemaking on 1201
- Yochai Benkler, Free As the Air to Common Use: First Amendment Constraints on Enclosure of The Public Domain, 74 N.Y.U. L. Rev. 354 (1999), http://www.nyu.edu/pages/lawreview/74/2/benkler.pdf
- Neil Netanel, Locating Copyright Within the First Amendment Skein, 54 Stan. L. Rev. (forthcoming Oct. 2001),available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=267848
- Pamela Samuelson, Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to Be Revised, 14 Berkeley Tech. L. J. 519 (1999) (excerpts in casebook at 892-902)
- Saul Hansell, In Cyberspace, Rivals Skirmish for Control Over Messaging, N.Y. Times, July 24, 1999 http://www.nytimes.com/library/tech/99/07/biztech/articles/24mail.html
- Larry Powers, Computer Code as Free Speech, New Media Music.com, May 15, 2001. http://www.newmediamusic.com/articles/NM01050219.html (deals with the Gracenote v. Roxio dispute)
November 20 The Collision of Trademarks and Domain Names in CyberspaceRequired Reading:
- Panavision Int'l, L.P. v. Toeppen, 141 F.3d 1316 (9th Cir. 1998) (casebook at 799-809)
- Avery-Dennison Corp. v. Sumpton, 189 F.3d 868 (9th Cir. 1999) (casebook at 810-20)
- Planned Parenthood v. Bucci, 152 F.3d. 920 (2d Cir. 1998) (casebook at 821-34)
- Anti-Cybersquatting Consumer Protection Act,
http://www.eff.org/GII_NII/DNS_control/s1255_1999_bill.htmlRecommended Reading:November 27 ICANN, the UDRP, and WIPO RFC
- Brookfield Communications, Inc. v. West Coast Entertainment Corp., 174 F.3d 1036 (9th Cir. 1999) (casebook at 835-46) (metatagging)
- Playboy Enterprises, Inc. v. Welles, 7 F. Supp.2d 1098 (S.D. Cal. 1998) (metatagging) (casebook at 846-54)
- Playboy Enterprises, Inc. v. Excite, Inc., 55 F. Supp.2d 1070 (C.D. Cal. 1999) (keyword buys) (casebook at 854-59)
- Sporty's Farm, L.L.C. v. Sportsman's Market, Inc., 202 F.3d 489 (2d Cir. 2000), http://pub.bna.com/lw/987542.htm (ACPA decision)
- Sally Abel, Trademark Issues in Cyberspace: The Brave New Frontier, 5 Mich. Telecomm. & Tech. L. Rev. 91 1999), http://www.mttlr.org/volfive/abel/art.html
- Jessica Litman, The DNS Wars: Trademarks and The Internet Domain Name System, 4 Small & Emerg. Bus. L. 149 (2000), available at http://www.law.wayne.edu/litman/papers/DNSwars.pdf
- Oscar Cisneros, Legal Tips for Your 'Sucks' Site, WIRED News, August 14, 2000, http://www.wired.com/news/politics/0,1283,38056,00.html
Required Reading:
- ICANN, Uniform Domain Name Dispute Resolution Policy, http://www.icann.org/udrp/udrp-policy-24oct99.htm
- Jeoffrey Leonard, Domain Name Disputes: An Analysis of the UDRP Resolution Thus Far, 2001 Wake Forest Intell. Prop. L.J. 4, Posted April 27, 2001, available at http://www.law.wfu.edu/students/IPLA/sp2001/art04.htm
- WIPO RFC3 (Executive Summary and Part IV: Personal Names (paragraphs 132 to 186 ONLY)), http://wipo2.wipo.int/process2/rfc/rfc3/report.html
Recommended Reading:
- Milton Mueller, Rough Justice: An Analysis of ICANN's Uniform Dispute Resolution Process, available at http://dcc.syr.edu/roughjustice.htm
- WIPO best practice guidelines on TM-DN disputes, available at http://ecommerce.wipo.int/domains/cctlds/bestpractices/index.html
- P. Landon Moreland and Colby Springer, Celebrity Domain Names: ICANN Arbitration Pitfalls and Pragmatice Advice, 17 Computer & High Tech. L.J. 385 (May 2001)
- Commerce Dept Report to Congress: The Anticybersquatting Consumer Protection Act of 1999, section 3006 concerning abusive registration of domain names, available at www.uspto.gov/web/offices/dcom/olia/tmcybpiracy/repcongress.pdf (no need for additional legislation to protect personal names)
- Michael Geist, Fair.com, available at: http://aix1.uottawa.ca/~geist/frameset.html
Required ReadingsRecommended Reading:
- Jonathan Weinberg, ICANN and the Problem of Legitimacy, 50 Duke L. J. 187 (2000) http://www.law.duke.edu/journals/dlj/articles/dlj50p187.htm
Required Reading:Recommended Reading:
- League Against Racism and Antisemitism v. Yahoo! Inc., County Court of Paris (2000), http://www.cdt.org/speech/international/001120yahoofrance.pdf
- Yahoo Inc v. League Against Racism and Antisemitism, granting summary judgement. http://www.cdt.org/jurisdiction/011107judgement.pdf
- David R. Johnson & David G. Post, And How Shall the Net Be Governed? A Meditation on the Relative Virtues of Decentralized, Emergent Law (casebook at 1069-1088) also available at http://www.cli.org/emdraft.html
USEFUL SITES:
- Joel Reidenberg, The Yahoo Case and the International Democratization of the Internet , Fordham Law and Economics Research Paper No. 11, April 2001 http://papers.ssrn.com/sol3/papers.cfm?abstract_id=267148
- Brett M. Frischman, Privatization and Commercialization of the Internet Infrastructure: Rethinking Market Intervention into Government and Government Intervention Into the Market, -- 2 Colum. Sci. & Tech. L. Rev. 1 - (June 8, 2001) http://www.stlr.org/cite.cgi?volume=2&article=1
- Yochai Benkler, Internet Regulation: A Case Study in the Problem of Unilateralism, 11 Europ. J. Int'l L. 167 (2000)- http://papers.ssrn.com/sol3/papers.cfm?abstract_id=206828
- Dan L. Burk, Virtual Exit in the Global Information Economy, 73 Chi.-Kent L. Rev. 943 (1998)
- A. Michael Froomkin, The Internet As a Source of Regulatory Arbitrage, published in BORDERS IN CYBERSPACE (Brian Kahin & Charles Nessen, eds. 1997), http://personal.law.miami.edu/~froomkin/articles/arbitr.htm
- Bill Joy, Why the Future Doesn't Need Us, 8.04 WIRED 238 (2000), http://www.wired.com/wired/archive/8.04/joy.html
- John Markoff, Rebel Outpost on the Fringes of Cyberspace, New York Times on the Web, June 4, 2000 (Internet rebels to connect to the Internet from their sovereign "cybernation" -- the Principality of Sealand -- outside the reach of British law.), http://search3.nytimes.com/search/daily/bin/fastweb?getdoc+site+site+131045+0+wAAA+Sealand
- Neil Netanel, Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory, 88 Calif. L. Rev. 395 (2000), available at http://www.utexas.edu/law/faculty/nnetanel/primary.pdf
- Margaret Jane Radin & R. Polk Wagner, The Myth of Private Ordering: Rediscovering Legal Realism in Cyberspace, 73 Chi.-Kent L. Rev. 1295 (1998), available at http://papers.ssrn.com/paper.taf?ABSTRACT_ID=162488
- Joel Reidenberg, Lex Informatica: The Formulation of Information Policy Rules through Technology, 76 Texas L. Rev. 553 (1998), available at http://reidenberg.home.sprynet.com/lex_informatica.pdf
- Martin Libicki et al., Scaffolding the New Web: Standards and Standards Policy for the Digital Economy, http://www.rand.org/publications/MR/MR1215/
- Mark McDonald, Living Where the Net is a threat: Vietnam heavily filters content, but firewalls are leaking, Sillicon Valley.com, August 12, 2001, http://www.siliconvalley.com/docs/news/svtop/firew081301.htm
- Mark McDonald, Several Asian Countries Clamp Down on the Net, Silicon Valley.com, August 13, 2001, http://www.siliconvalley.com/docs/news/depth/firew081301a.htm
- James Love, As the Hague Conference Diplomatic Conference ends, the Internet and Public Domain are at Risk, June 20, 2001, at http://www.cptech.org/ecom/jurisdiction/badly.html
- Must all good things come to an end? http://www.1112.net/lastpage.html
American Civil Liberties Union, http://www.aclu.orgCenter For Democracy and Technology, http://www.cdt.org
Cyberspacelaw, http://www.cyberspacelaw.org
Electronic Frontier Foundation, http://www.eff.org
Electronic Privacy Information Center, http://www.epic.org
European Commission Information Society Project Office, http://www.ispo.cec.be
Global Internet Liberty Campaign, http://www.gilc.org/
Information Technology Association of America, http://www.itaa.org
Internet Corporation for Assigned Names & Numbers, http://www.icann.org
ICANN Watch, http://www.icannwatch.org
Junkbusters, http://www.junkbusters.com
Politechbot, http://www.politechbot.com/
Progressive Policy Institute, http://www.dlcppi.org
Recording Industry Association of America, http://www.riaa.org
Tech Law Journal, http://techlawjournal.com/
World Wide Web Consortium, http://www.w3c.org