81,779 research outputs found
The concept of interoperability in European Union law – An analysis in competition law and intellectual property law
The technology industry and even open source projects are heavily based on intellectual property rights, such as the copyright protection for software. In a rapidly changing technological and legal landscape, it can be difficult to find a proper balance between the enforcement of software copyright and alternative considerations such as safeguarding interoperability. This is illustrated by presenting and analysing cases from competition law and copyright law, with a focus on the abuse of a dominant position under Article 102 and the scope of protection of software under Directive 91/250. On this legal basis and supported by economic literature, the current situation and its development is presented, where market conditions that favour monopolies and inherent network-effects can present a challenge for interoperability, a concept that is instrumental for a functioning technological landscape, especially for Free and Open Source Software. While there are already some safeguards in place with regard to Directive 91/250 as is shown by such cases as SAS or BSA, these leave a considerable degree of legal uncertainty. As such, especially with regard to the Commission’s plan to potentially legislate in this area based on Article 118 TFEU as part of Agenda 2020 and the initiative for a single digital market, the concept of interoperability information should be safeguarded and recognized more expressly
The normativity of code as law: towards input legitimacy
In the debate on how the new information and communication technologies impact on democratic politics the role played by the digital architecture seems to be surprisingly underrated. In particular, while a lot of attention has been paid to the possibilities that new technologies open up to democratic theory, few works have attempted to look at how democracy may help in shaping technologies. By adopting as a starting point the approach known as ‘code as law’, the paper aims at two objectives: to re-affirm the importance of discussing normative principles to guide the process of code writing in order to reinvigorate the debate; to claim the importance of input reasons when deciding which principles should be chosen. After having remarked that code is relevant for establishing democratic norms, the paper briefly tackles with the main attempts by European scholars to deal with this issue. Then, a couple of practical examples of how code impacts on democratic rights are sketched out. In the last section of the paper a shift from an output-based approach to the legitimacy of code to an input-based is openly advocated: an inquiry into the legitimacy of code should focus on its production
Comparative analysis of copyright assignment and licence formalities for Open Source Contributor Agreements
This article discusses formal requirements in open source software contributor copyright assignment and licensing agreements. Contributor agreements are contracts by which software developers transfer or license their work on behalf of an open source project. This is done for convenience and enforcement purposes, and usually takes the form of a formal contract. This work conducts a comparative analysis of how several jurisdicitons regard those agreements. We specifically look at the formal requirements across those countries to ascertain whether formalities are constitutive or probative. We then look at the consequences of the lack of formalities for the validity of those contributor agreements
Recommended from our members
Recording Victim Video Statements as Evidence to Advance Legal Outcomes in Family Violence Cases (ReVEAL)
This Implementation Guide provides an overview of the video-recording practices currently in place across several Texas jurisdictions. It provides guidance and considerations for jurisdictions in the collection and use of video evidence in family violence cases. This guide is divided into seven sections, including this Background and Overview. The second section includes information for law enforcement on the purpose of video statements, how to develop and implement a video program, and considerations for sustaining a program. The third section focuses on prosecutorial practices for the use of video statements including legal considerations, coordination with partners, and victim engagement around the video statement. The fourth section provides specific information for victim advocates and includes considerations for victim privacy and confidentiality. The fifth section focuses on technology and equipment, with information on type of equipment, technology infrastructure, and efficient transfer of evidence between agencies. The sixth section is the Summary Report of the ReVEAL project. The Summary Report is a technical overview of the evaluation that includes major findings and links to the ReVEAL reports that were previously released. The seventh and final section is comprised of the appendices and provides sample protocols, site overviews, equipment charts, and additional resources that may be helpful to users of this guide. Throughout this guide, there are several examples of cases and practices that illustrate the specific issues that may present themselves when launching a video-recording program. These
examples highlight the complexities of the practice while using real world examples of how video impacts family violence cases,
victim safety, and privacy.IC2 Institut
Responding to Cross Border Child Trafficking in South Asia: An Analysis of the Feasibility of a Technologically Enabled Missing Child Alert System
This report examines the feasibility of a technologically enabled system to help respond to the phenomenon of cross-border child trafficking in South Asia, and makes recommendations on how to proceed with a pilot project in the selected areas of Bangladesh, Nepal and India. The study was commissioned by the Missing Child Alert (MCA) programme which is an initiative led by Plan. MCA is an initiative to address cross-border child trafficking in South Asia, led by Plan. The aim of the programme is to link existing institutions, mechanisms and resources in order to tackle the phenomenon from a regional perspective. To achieve this, Plan propose to implement a technologically equipped, institutionalised system of alert that can assist in the rescue, rehabilitation, repatriation and reintegration of children who are at risk of, or are victims of, cross-border trafficking
Lex Informatica: The Formulation of Information Policy Rules through Technology
Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage
- …