Cyberspace Law Censorship and regulation of the Internet

This book explores what the American Civil Liberties Union calls the "third era" in cyberspace, in which filters "fundamentally alter the architectural structure of the Internet, with significant implications for free speech." Although courts and nongovernmental organizations inc...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Travis, Hannibal
Médium: E-kniha Kniha
Jazyk:angličtina
Vydáno: Abingdon Routledge 2013
Taylor and Francis
Taylor & Francis Group
Vydání:1
Témata:
ISBN:9780415630306, 0415630312, 9780415630313, 0415630304
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Illustrations -- Preface -- Acknowledgements -- List of contributors -- Table of authorities -- Introduction: Cyberspace as a product of public-private censorship -- The Internet versus the State? -- The State strikes back: Indirect regulation and mobilized private power -- The State as champion of copyrights against "piracy" -- The State takes on "cybersquatters" and "cyberpiracy" -- The business method patent explosion -- The Internet ascendant, as the First Amendment prevails -- Theories of Internet regulation -- The focus of this book -- Topical overview -- Owning cyberspace -- Policing cyberspace -- Regulating cyberspace -- Bibliography -- Part 1: Owning cyberspace -- 1. Claiming Web addresses as property -- Trademark law and trademark use -- "Trademark use" and the Internet -- Classic "cybersquatting" -- The forum site domain name cases -- Expanding the meaning of "services" -- Relying on links to commercial sites to find a trademark infringement -- Pairing the defendant's "use" with the plaintiff's goods and services -- Relying on the defendant's predatory intent -- The metatag cases -- Contextual advertising cases -- Conclusion -- 2. The promise of information justice -- The Google Books Project saga -- Copyright social utility and social justice -- The Google Books Project and copyright social utility: Solving the problem of orphan works -- Google Books and copyright social justice: Traversing the new digital divide and other social challenges -- Fulfilling the promise of information justice -- Bibliography -- 3. Owning methods of conducting business in cyberspace -- Introduction -- The origins of U.S. patent law -- Business methods patentable -- The basis for business methods-subject matter patentability of processes
  • The origins of contributory liability in modern trademark infringement -- Evolving the second prong of contributory liability-facilitation -- The online marketplace and contributory liability -- The consequences of Tiffany v. eBay -- Conclusion -- Bibliography -- 7. Bad Samaritanism: Barnes v. Yahoo! and Section 230 ISP immunity -- Conclusion -- Part 3: Regulating cyberspace -- 8. Internet responsibility, geographic boundaries, and business ethics -- Introduction -- The Yahoo! saga -- The French court orders -- American salvation? -- Comparative legal dimension -- Business dimension -- Responsible terms of service -- Conclusion -- Bibliography -- 9. Neutralizing the open Internet -- Introduction -- Net neutrality activism prior to 2008 -- The FCC theorizes net neutrality as free speech -- Net neutrality as censorship of the Internet? -- Resolving the conflict between net neutrality and freedom of speech -- Conclusion -- Bibliography -- 10. The ''monster'' that ate social networking? -- The birth of Facebook -- Privacy implications of Facebook use -- Is Facebook a natural monopoly? -- Is Facebook a threat to privacy and freedom of speech online? -- Facebook versus government censorship -- Conclusion -- Bibliography -- Conclusion: Taking it down -- Index
  • The "useful, concrete and tangible result" -- The growth of business methods -- The impact of patents on free speech and communication in cyberspace -- Bilski v. Kappos : Shaking the foundation of business methods -- USPTO and BPAI -- The Federal Circuit Court of Appeals' decision-the creation of the "machine or transformation" test -- The response to the "machine or transformation" test -- The U.S. Supreme Court's unhelpful clarification -- Clarity or confusion in the wake of Bilski? -- Post- Bilski in the USPTO -- Post- Bilski in the courts -- Conclusion: Looking forward -- Bibliography -- Part 2: Policing cyberspace -- 4. Red flags of ''piracy'' online -- A billion-dollar cyberlaw debate -- The mechanics of a safe harbor -- The knowledge standard and red flags -- A decade is forever in tech years-the impact of the DMCA and the challenges of Web 2.0 -- Viacom v. YouTube -- Viacom's argument -- Viacom's evidence that YouTube was generally aware of facts or circumstances from which infringement was apparent -- Viacom's evidence that YouTube was aware of specific instances of infringement -- Viacom's evidence of willful blindness -- YouTube's defense -- YouTube's counterarguments to Viacom's evidence that YouTube was aware of facts or circumstances of infringement -- Court is in session -- A legislative approach to safe harbor analysis -- Case law analysis of what triggers a red flag -- The argument that summary judgment should not have been granted -- The consequence of the court's reading of the DMCA is a notice and takedown only regime -- Caught between a rock and a hard place-the court had few choices because of an antiquated DMCA -- Conclusion -- 5. Who controls the Internet? The Second Circuit on YouTube -- Bibliography -- 6. Is eBay counterfeiting? -- Trademarks and counterfeiting