Script Publications Law and the Internet Regulating cyberspace, Oxford, Hart users, (1994) 45 Northern Ireland legal Quarterly 30 127; Copyright in future publications, (1985) 30 http://www.law.ed.ac.uk/script/newscript/pubsmain.htm
Extractions: Publications Directory Online publications: 'Archiving in the Digital Era' . Paper give by Professor John Frow, Director of IASH and Regius Professor of Rhetoric, University of Edinburgh at his seminar on Friday 15th February at the Faculty of Law, Old College, Edinburgh. On the Very Idea of Intellectual Property - an Essay according to the Institutionalist Theory of Law' Paper given by Professor Sir Neil MacCormick MEP at the launch of the AHRB Centre for Intellectual Poperty and Technology Law on 11 February 2002 SCRIPT Annual Report 2001 Seminar Paper given by Professor Michael Rushton at the Faculty of Law, University of Edinburgh on 30 October 2000. Genetics and insurance: is it "in the public interest" to involve the law? by Dr Graeme Laurie. Talk given at The Royal Society, London, 23 October 2000. . Article by Professor Hector MacQueen Trade Marks and Domain Names. There's a lot in a name.' Article by Charlotte Waelde. 'The Internet - An Introduction for Lawyers' Article by Andrew Terrett and Iain Monaghan.
Swiggart & Agin, LLC Publications And Presentations with Personal Jurisdiction in cyberspace ABA Subcommittee on Finance Performing Initial Public Offerings on the a New Arena for legal Conflict, INDEPENDENT http://www.swiggartagin.com/publications.html
Extractions: Publications and Presentations LLC is proud to announce that the groundbreaking book, B ANKRUPTCY AND S ... YBERSPACE , is now available from Bowne Publishing. Publications Massachusetts' New Business Corporation Act - New Chapter 156D Compared with Old Chapter 156B, February 2004; Enemy By E-Mail, BUSINESS LAW TODAY (American Bar Association, May/June 2002); Internet Law for the Business Lawyer (American Bar Association, 2001); Web Linking Agreements: Quasi-Licenses in Interactive Media T HE C YBERSPACE L AWYER (March 2001;) B ANKRUPTCY AND S ... Drafting the Intellectual Property License: Bankruptcy Considerations, J OURNAL O F B ANKRUPTCY L AW A ND P RACTICE , Vol. 9, No. 6 (September/October 2000); Domain Names: Obtaining and Perfecting a Security Interest, T HE R MA J OURNAL (September 2000); What is a Domain Name Anyway? Impact of Network Solutions and Umbro Rulings, E-C OMMERCE L AW TRATEGY , Vol. 17, No. 2 (June 2000); Rights in Cyberassets: Umbro Decision Teaches Creditors to Proceed Carefully Against Cyberassets, Interview in E LECTRONIC C OMMERCE AW R EPORT , Vol. 5, No. 19 (May 10, 2000);
UNBSJ Ward Chipman Library Business Internet Law See also Law and legal Serial publications; See also Electronic Commerce Serial publications; cyberspace Law Journal, 19982001, full-text; Federal http://www.unbsj.ca/library/subject/cyberlaw.htm
Philosophy In Cyberspace social philosophy, providing a muchneeded forum for those seeking to engage traditional legal, moral and Theoria http//www.und.ac.za/und/publications/theoria http://www-personal.monash.edu.au/~dey/phil/pjourn-qz.htm
Extractions: http://socrates.berkeley.edu/~quiparle/ Qui Parle is an interdisciplinary journal published by the University of California at Berkeley and focusing on Literature, Philosophy, Visual Arts, and History. This site provides information on ordering and subscription rates, tables of contents and article indexes, and links to other sites of interest. Radical Philosophy http://www.blackwellpublishers.co.uk/scripts/webjrn1.idc?issn=00340006 Ratio publishes work of a high quality on a wide variety of topics. It encourages articles which meet the highest standards of philosophical expertise, while at the same time remaining accessible to readers from a broad range of philosophical disciplines. The journal has encouraged links between philosophers writing in English, and those who work primarily in German, its main emphasis is on analytic philosophy. Ratio Juris
Legal Research Sources looseleaf services for business, corporate, securities and cyberspace law resources. abstracts or references from more than 800 legal publications; law journals http://www.law.duke.edu/lib/lresources.html
Extractions: A comprehensive, full text database of a wide range of material including cases, statutes, regulations and especially strong for news resources. A full text database with a comprehensive collection of a wide range of materials including cases, statutes, regulations, news and periodicals. A full text database of primarily state cases, statutes and regulations. Law faculty, staff and students register for free access that continues through the summer. Center for Computer Assisted Legal Instruction is a consortium of law schools that develops computer-mediated legal instruction exercises on over 250 legal subjects. Contains the equivalent of the CCH looseleaf services for business, corporate, securities and cyberspace law resources. Database with a variety of tax resources published by CCH including the Standard Federal Tax Reporter and Federal Estate and Gift Tax Reporter. National Law Center for Inter American Free Trade database for Latin American law, containing selected commercial treaties, statutes, and regulations.
PRIVACY IN CYBERSPACE: Assignment 6 details); Libel in cyberspace, Mike Hadley 3/12/1999 Consideration of the legal and policy patrons to certain contentbased categories of Internet publications. http://cyber.law.harvard.edu/privacy99/lesson6.html
Extractions: Lesson beginning: April 27, 1999 - 12:00:00 AM (midnight Monday) Jump to: lessons readings events 6. Free Speech, Journalism, and Filtering When one person's privacy is another person's speech. This week we will address the intersection of free speech and privacy on the Internet. There are a number of ways that the freedom of speech as guaranteed by the First Amendment to the U.S. Constitution implicates the privacy rights of the person speaking and of other people. For simplicitys sake, the readings are divided into 3 main areas: a.) False information available about individualsi.e. libel and defamation; b.) The availability of true, but private information about individuals, as illustrated by the Nuremberg files case; c.) Giving out private information to access protected speech in the case of library filtering. A more detailed introduction of each topic appears as the first reading in each sub-lesson. Because of the different areas covered this week, it looks like there is a ton of readingdont worry. Only a few readings are required. The rest of the readings are there if you want to explore any given topic in greater depth. Also, many of the readings are short news articles or press releases rather than longer cases and legal essays. As you read, think about the questions posed by the hypothetical and the questions that accompany each section of the lesson. Also, consider what private information you have about the people you interact with on the 'net and what information they have about you. How might that information be used in any of the contexts comtemplated by the readings?
Extractions: Files Subdirectories On-Site Links Off-Site Links access_rights_johnson.article "Access Rights All Power to the Sysop?", article by David Johnson. Excerpt: "Some enlightened sysops will create mechanisms by means of which users can participate in making rules and overseeing their enforcement. Will those sysops prosper in preference to others who act less accountably? Will the existence of checks on arbitrary exercises of raw power help to keep other, external, regulators at bay?" anon_juris.article "The Coming Jurisdictional Swamp of Global Internetworking (Or, How I Learned to Stop Worrying and Love Anonymity)", by Douglas Barnes. Overview of several reasons why anonymity on the Net is a good idea, and a look at the many ways in which a foreign jurisdiction can exercise authority over citizens of other countries. anonymity_online_johnson.article
LEGAL ASSOCIATIONS - SPECIALTY ASSOCIATIONS (OTHER) cyberspace Law Center; cyberspace Law Institute; Defense Research Council; False Claims Act legal Center; Fathers Federalist Society for Law Public Policy Studies; http://www.hg.org/other-assoc.html
LawInfo Legal Links -- Resources Law Journal Top legal Stories. O, The Journal of Online Law Electronic publication of scholarly essays about law and online communicationslaw and cyberspace. http://www.lawinfo.com/links/zines.html
Extractions: Programmes from previous years T he Centre holds public seminars and conferences on cyberspace law and policy, and practical workshops covering 'the nuts and bolts' of dealing with certain issues and procedures.They generally run for a half or one day. These events are run in conjunction with UNSW Law Faculty's Centre for Continuing Legal Education (CLE) ,who take registrations, and they entitle legal practitioner attendees to credits for mandatory CLE. They are alsointended to be of interest to professionals, academics and advocates from a range of relevant disciplines. The 2004 Programme is below ; it's updated as details are finalised.
Cyberspace Intellectual Property Journals the application of computer technology to legal practice. Online Law An electronic publication of scholarly online communicationslaw and cyberspace from the http://resource.lawlinks.com/Content/Online_Publications/cyberspace_&_intellectu
Extractions: FEW INTELLECTUALS HAVE influenced the way people think about cyberspace as much as Lawrence Lessig. His first book, Code and Other Laws OF Cyberspace (Basic Books, 1999), was described by one critic as "a direct assault on the libertarian perspective that informs much Internet policy debate." At the same time, by probing the complicated relationship between "East Coast code"that is, legislationand the "West Coast code" that creates the architecture of the Internet, the book changed the terms of the debate, influencing even the people Lessig was criticizing. Last year's follow-up, The Future of Ideas: The Fate of the Commons in a Connected World (Random House), asks what allows innovation to take place online, examining such issues as Napster, software patents, and regulation of the electromagnetic spectrum. By explaining technology to the lawyers and law to the technologists, Lessig has deepened a lot of people's understanding of the Net. Few in the public policy community, for example, have given much thought to the different layers of cyberspace. By contrast, Lessig distinguishes the physical layer (the network's hardware and wires) from the logical layer (the protocols that determine who connects to what) and the content layer (the actual material delivered by the protocols over the wires). To maintain our ability to innovate online, he argues, one must recognize the different relationship public policy has with each layer of the system.
Legal Resources On The Internet About The Net Public Figures, and the Ne Discusses the legal protection afforded to if their target were not a public figure, and how all this relates to cyberspace. http://www.infosyssec.net/infosyssec/legres1.htm
Articles: Legal Research discusses possible sources for the creation of legal rules and mechanisms of enforcement in cyberspace. jurisdication as a result of the publication of a http://www.legalethics.com/pa/articles/article.htm
Extractions: NOTICE: These articles, FAQS, newsletters, alerts and other publications relate to computers, legal research, or Internet use . They are typically intended to provide general information about the matters discussed. You should assume that they do NOT offer legal advice or legal opinions on any specific matters. Do not rely on them without seeking legal counsel. Submit an article to be added here by selecting the Feedback link. o Home Top ... Accidents On the Information Superhighway: On-Line Liability And Regulation Accidents On the Information Superhighway: On-Line Liability And Regulation , is a comment by Marc L. Caden and Stephanie E. Lucas, "examines recent efforts by legislators, regulators and the judiciary to tame the [Internet]. ... [It] considers the prominent legal cases concerning the liability of on-line access providers for electronic transmissions; examines congressional and state legislative efforts aimed at regulating on-line activities; and analyzes whether the Internet is a proper candidate for regulation, and to what extent our existing framework of laws can be adequately used to prosecute illegal on-line activities." Administrative Litigation Before the Iowa Department of Natural Resources Administrative Litigation Before the Iowa Department of Natural Resources , by James L. Pray : A review of the regulations and statutes governing administrative litigation before the agency which enforces Iowa's environmental laws.
Legal Reference and access to public resources and information in new media. They have an extensive archive of legal and policy materials relating to cyberspace and the law. http://www.legalethics.com/pa/legrefer/legrefer.htm
Extractions: ALI-ABA ALI-ABA, a provider of continuing legal education in the United States since 1947, offers members of the profession a comprehensive curriculum of post-admission legal education live courses, course materials, video and audio tapes, satellite broadcasts, books, computer disks, and magazines. Big Ear "The Big Ear listens to a variety of law-related listservers and newsgroups. From each, it selects messages which contain references to Net documents, and constructs a convenient cumulative listing which shows the title of the document, a link to it, and a link to the message 'announcing' it on the listserv. At the end of a week's time, the old listing is scrapped and a new one started." The Big Ear listens to lawsrc-l, net-lawyers, teknoids, law-lib, legal-webmasters, and int-law.
Legal/Technical Architectures Of Cyberspace large audience, and ease of publication of cyberspace. This architecture directly addresses the ease of publication. By adding legal liability to the publisher http://www.swiss.ai.mit.edu/classes/6.805/admin/admin-1998/conf-details/topic8-l
Extractions: The popularization of cyberspace gives birth to new medium for defamatory speech to which current libel law does not easily apply. Traditional libel law seems lost amidst the realities of cyberspace, where large audiences are easily reached, publishing comes cheaply, and content can seem to last forever. A key problem is the inherent uncertainty as to who assumes the responsibility for content control. Worst of all, on the Internet, identifying the libeler is significantly harder than in real space. In our white paper we strive to analyze the shortcomings of existing libel law in the terms of a parameterized analysis and an economics analysis. In doing so we also hope to introduce possible architectures that address some of these concerns. Libel law was originally engineered to remedy the damage to reputation by defamatory statements. Libel consists of a written defamatory (reputation-damaging) statement about an identifiable party, communicated to a third party. Under common law, the courts have established that one who takes a responsible part in the repetition of a libelous statement is just as liable as the original speaker. However, the courts also have long recognized a distinction between those who republish libelous statements and those who may merely pass on the libelous statement without meaningful scrutiny. This distinguishes newspapers and broadcasters, who have control of their content, from bookstores and libraries who do not. In cyberspace various protocols serve as media for potentially libelous statements.
Duane Morris - E-Legal: Securing Cyberspace From Attacks Elegal Securing cyberspace From Attacks, The National Infrastructure Protection Center (NIPC) in February issued a public advisory to heighten http://www.duanemorris.com/articles/article1178.html
Extractions: The National Infrastructure Protection Center (NIPC) in February issued a public advisory to heighten awareness of an increase in global hacking activities resulting from the growing tensions between the United States and Iraq. According to NIPC, during times of increased international tension, illegal Internet activities escalate. Against this backdrop, the White House has issued a report titled "The National Strategy to Secure Cyberspace" to provide a framework to protect the Internet. According to President Bush's cover memorandum to the report, "the policy of the United States is to protect against the debilitating disruption of the operation of information systems for critical infrastructures, and, thereby, help to protect the people, economy and national security of the United States." Thus, President Bush declares that "we must act to reduce our vulnerabilities to these threats before they can be exploited to damage the cybersystems supporting our Nation's critical infrastructures and ensure that such disruptions of cyberspace are infrequent, of minimal duration, manageable and cause the least damage possible." The report goes on to articulate five national priorities, and for each such priority, action items are recommended. Whether these action items will be followed, and if so, whether they will effectively protect the Internet, remain to be seen.
Extractions: MS-Word format ... http://www.bakernet.com ) are the principal sponsors of the Baker and McKenzie Cyberlaw and Policy Centre. The centre, established within the Faculty of Law at UNSW, provides a focus for research, public interest advocacy and education on issues of law and policy concerning digital transactions in cyberspace. Visit the Centre's web resources at www.austlii.edu.au/CyberLPC/ Chris Connolly Connolly is a lawyer, researcher and consumer advocate. He is the Director of the Financial Services Consumer Policy Centre - a non-profit research organisation which examines financial services from the perspective of low income and disadvantaged consumers.Chris is also the General Editor of the Internet Law Bulletin.