Syllabus
Note: Due to the fact that 2 holidays fall on Monday this semester, we will have a normal lecture on May 3rd, the Monday of RRR week.
-
Jan 18 - Martin Luther King Day
-
Jan 25 - Introduction to Information Law and Policy
Clark, D. D., Wroclawski, J., Sollins, K. R., and Braden, R. 2005. Tussle in cyberspace: defining tomorrow's internet. IEEE/ACM Trans. Netw. 13, 3 (Jun. 2005), 462-475.
Lessig, Larry, Code, chapters 4 & 5
-
Feb 01 - Freedom of Expression
Relationship Between Architecture and State Regulation
Berman, J. and Weitzner, D.J., "Abundance and User Control: Renewing the Democratic Heart of the First Amendment in the Age of Interactive Media," 104 Yale Law Journal 1619, (1995).
ACLU v. Mukasey, 534 F.3d 181, 2008 (3d Cir. Pa. 2008) (skip sections III and IV A)
Supplemental Reading
-
Feb 08 - Facts
Copyright
Feist v. Rural, 499 U.S. 340 (1991)
Hot News
NBA v. Motorola, 105 F.3d 841 (1997) (§§ I and II)
Relation to Contract and TOS
Pro-CD v. Zeidenberg, 86 F.3d 1447 (1996)
Privacy
Mills, E, "Would Google maps street view be legal in Canada?"
Boring v. Google Inc., W.D. Pa., No. 08-694, 2/17/09 (pgs 1-5)
California anti-paparazzi law CALIFORNIA CODE CIVIL CODE SECTION 1708.8
Supplemental Reading
Note: Presumed Assent: The Judicial Acceptance of Clickwrap
H. Nissenbaum, "Protecting Privacy in an Information Age: The Problem of Privacy in Public," (pdf) Law and Philosophy, 17: 559-596, 1998.
-
Feb 15 - Presidents Day
-
Feb 22 - Reusing Other Peoples "Works": Fair Use and Personal Use
17 USC §§ 102, 103, 106, 107, 117 (definitions of works eligible for copyright)
OPG v. Diebold 337 F.Supp.2d 1195 (N.D. Cal. 2004)
Band, J., "The Google Library Project: Both Sides of the Story," 2 Plagiary 1 (2006)
Mulligan, Han, Burstein, "How DRM Content Systems Disrupt Expectations of Personal Use"
The Engadget Interview: Paul Aiken, Executive Director of the Authors Guild
Supplemental Reading
Lee, "Warming up to User-Generated Content"
Cohen, "Copyright and the Perfect Curve"
-
Mar 01 - Liability for Content Created and/or Posted by Others
17 USC § 230 (protection for blocking/screening)
Fair Housing Council of San Fernando Valley, et al. v. Roommates.com LLC
Lenz v. Universal (08/20/2008)
Supplemental Reading
chillingeffects.org FAQ on DMCA Safe Harbor Provisions
Reichman, Jerome H., Dinwoodie, Graeme B. and Samuelson, Pamela, "A Reverse Notice and Takedown Regime to Enable Public Interest Uses of Technically Protected Copyrighted Works"
Urban, J., Quilter, L., "Efficient Process or 'Chilling Effects'? Takedown Notices Under Section 512 of the Digital Millennium Copyright Act"
-
Mar 08 - Liability, Licensing, and Terms of Service
Defective Information
Cardozo v. True, 342 So. 2d 1053 (1977)
Aetna v. Jeppesen, 642 F.2d 339 (1981)
Samuelson, "Liability for Defective Information"
Information Licensing
Mortenson v. Timberline, 140 Wn.2d 568 (2000)
TOS
Williams v. AOL, 43 U.C.C. Rep. Serv. 2d. 1101 (2001)
Supplemental Reading
Braucher, "New Basics: 12 Principles for Fair Commerce in Mass-Market Software and Other Digital Products"
-
Mar 15 - Technology Design and Liability
Copyright
Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417 (1984)
MGM Studios, Inc. v. Grokster, Ltd. 545 U.S. 913 (2005)
Privacy
18 USC § 2512 (electronic communication interception devices)
United States v. Spy Factory, 951 F. Supp. 450, 1997 (S.D.N.Y. 1997) Background and § II
FTC v. Cyberspy Software, Preliminary Injunctive Order
Ohm, Paul, "The Myth of the Superuser: Fear, Risk, and Harm Online", 41 U.C. Davis L. Rev. 1327 (2008) p. 1399-1402
Supplemental Reading
-
Mar 22 - Spring Break
-
Mar 29 - Consumer Protection, Privacy
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Information (through paragraph 18)
FTC Fair Information Practice Principles
In the Matter of Sears Holdings Management Corporation (order)
In the Matter of Sears Holdings Management Corporation (complaint)
Letter to Alan Charles Raul (regarding settlement)
Supplemental Reading
Mulligan, D. and Perzanowski, A., "The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident"
-
Apr 05 - Consumer Protection and Security
FTC v. TJX Companies, Inc.
Agreement Containing Consent Order - Complaint - Analysis of Proposed Consent Order to Aid Public CommentCalifornia Civil Codes sections 1798.29, 1798.82, 1798.84
California Office of Privacy Protection’s Recommended Practices under the Security Breach Notice law
Supplemental Reading
Smedinghoff, Thomas J., The State of Information Security Law: A Focus on the Key Legal Trends (May 2008).
-
Apr 12 - Privacy, Surveillance and the Government
Digital Due Process: About the Issue & Our Principles
Global Network Initiative: Principles & Implementation Guidelines
Geiger, Harley, "Updating Privacy Protections for 21st Century Communications" (March 30, 2010)
Jerilyn Quon et. al. v. Arch Wireless Operating Company, INC
-
Apr 19 - Crime
18 USC § 1030 (Computer Fraud and Abuse Act)
Intel v. Hamidi, 30 Cal. 4th 1342 (Cal. 2003)
Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294 (2000)
Volkh, Eugene, "Crime Facilitating Speech" 57 Stanford Law Review 1095 (2005) (shorter version)
Supplemental Readings
Kerr, Orin S., "Cybercrime's Scope: Interpreting 'Access' an 'Authorization' in Computer Misuse Statutes," NYU Law Rev. Vol. 78 No.5, pp. 1596-1668, November 2003
-
Apr 26 - Copyright & Patent / Trade Secrecy
Copyright & Patent Default Rules
Wexler v. Greenberg, 399 Pa. 569 (1959)
Whyte v. Schlage, 101 Cal. App. 4th 1443 (2002)
Jacobsen v. Katzer, Fed. Cir., No. 08-1001, 8/13/08
Permissive / Free Software Licenses
GPL License (GNU)
Supplemental Readings
Dennis Kennedy, A Primer on Licensing Legal Issues: Copyright, Copyleft and Copyfuture
-
May 03 - Professional Ethics and Approaches
Moore, James, "What is computer ethics?" (The interface is quirky, please read all 4 parts)
Collins, W. R. and Miller, K. W. 1992. Paramedic ethics for computer professionals. J. Syst. Softw. 17, 1 (Jan. 1992), 23-38.
John Morris and Alan Davidson, "Policy Impact Assessments: Considering the Public Interest in Internet Standards Development," August 2003 Sections III- VI and appendixes
Supplemental Readings