6 research outputs found

    A Basic Primer on Copyrights on the World Wide Web

    Get PDF
    This article discusses some often-raised copyright questions concerning the assembly and distribution of a World Wide Web page on the Interne

    E-LAW4: Computer Information Systems Law and System Operator Liability

    Get PDF
    This Article gives a summary of the current regulatory structure in the United States governing a few of the Empires of Cyberspace, such as bulletin board systems, electronic databases, file servers, networks (such as the Internet) and the like. Different legal analogies that may apply will be illustrated, and some of their strengths, weaknesses, and alternatives will be analyzed. I will begin by looking at different types of computer information systems, and then the major legal issues surrounding computer information systems will be surveyed in brief. Next, the different legal analogies which could be applied to computer information systems will be examined. These different analogies provide an understanding of how courts have seen various communication technologies, and how more traditional technologies are similar to computer information systems. Liability for improper activities—both defining what is improper and who can be held responsible—has been determined by the analogy the courts decide to apply. In the course of this analysis, it will be shown where some judges and legislators have gone wrong. Hopefully, as more attorneys, judges and legislators become familiar with computers and network communication, there will be fewer errors to point out

    A Primer on Trademark Law and Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997)

    Get PDF
    The conflicts arising over Internet addresses generally fall within four categories: trademarks as second-level domains; second-level domains that are similar to trademarks; trademarks as third-level domain/machine names; and trademarks as userIDs. When confronted with the four categories, a court will generally analyze the problem by looking at the likelihood of confusion, applying the dilution statutes, and determining if the trademark has been blurred or tarnished. The likelihood of confusion analysis looks at: the degree of similarity between the marks in appearance and suggestion; the similarity of the product or services; the area and manner of concurrent use; the degree of care likely to be exercised by consumers; the strength of the complainant’s mark; actual confusion; and intent of the part of the alleged infringer to palm-off his products as those of another. The dilution statutes require the use of mark to be commercial and that there is a likelihood of actual confusion. Next, the court will determine if the trademark has been diluted by tarnishment, such as whether a famous mark has been linked to a poor quality or unwholesome product, or other wise displayed in a derogatory manner. Finally, the court will look to see if the trademark has been diluted by blurring, which is the whittling away of the value and selling power of a mark by its unauthorized use. Conflicts over the first category, trademarks as second-level domains, generally arise because domain names have value. Value arises out of various organizations that wish to use the Internet to conduct business or advertise their business. The organizations seek names that are familiar or easy for their customers to remember. In cases such as these, courts have held that merely registering a name in order to reserve a right to the name is not sufficient use in commerce. The mark must be applied to an identifiable product with an intent to distribute that product. The second category, second-level domains that are similar to trademarks, generally occur when a party seeks to emulate a trademark holder. For example, a party parodied Microsoft by registering the domain name www.micr0soft.com. The general rule is that if you consciously choose a mark that is already establish in the marketplace, that choice supports a finding that you are intending to trade on the senior mark’s name-value. As a result, a likelihood of confusion is produced. A court will find that a parody of a mark does not tarnish the mark if the public associates the two marks only for the purpose of the parody and does not associate the two sources of the products. Generally, confusion of the two sources produces tarnishment. The third category, trademarks as third-level domain, arise because large organizations have many machines connected to the Internet, all addressed under their second-level domain name. For example, the University of Iowa Student Computer Association names its machines whip.isca.uiowa.edu, chop.isca.uiowa.edu, and grind.isca.uiowa.edu. Conflicts arise in this category when the organization uses a trademark to designate a machine. In cases such as these, the likelihood of consumer confusion drops dramatically, and the court will inquire into whether another party’s use of the mark diminishes the power of the mark to identify the goods and services of the mark’s owner. The last category, trademarks as userIDs, occurs when a party uses a trademark in an area other than the domain name. For example, a party may use a trademark as their UserID and thereby have an email address such as [email protected]. The court will apply the same analysis as the third category. The court will look to see how the account is used and the manner of the account’s use will indicate whether confusion is likely to result

    Revising the Copyright Law for Electronic Publishing, 14 J. Marshall J. Computer & Info. L. 1 (1995)

    Get PDF
    The Copyright Act has historically been amended to address technological changes. The Act has been shaped to apply to new situations not previously considered by the original authors. Rather than pass a new Copyright Act to address computer programs and technology, the current Act should be repaired. The changes made to the Copyright Act as a result of the CONTU report provide some necessary updating to the Act, but the increasing use of computer technology is demanding additional refinements to the Copyright Act. In order to amend the Copyright Act with the least amount of disruption, the definition of a computer program could be changed. A computer program definition could include any work of authorship in digitized form which is used in conjunction with a computer or other computer program. This transmission of a public display limitation would also apply to a display of an electronic work over a computer network. The secondary transmission is made by a computer system whose operator has no direct or indirect control over the content of the primary transmission, and whose activities with respect to the primary transmission consists solely of providing a conduit and facilities necessary for the content\u27s dissemination
    corecore