Return to Nicholas Johnson Main Web Page www.nicholasjohnson.org

Cyberlaw Casebooks' Contents


Maggs, Soma and Sprowl, Computer Law (1992)

Summary of Contents

PREFACE

TABLE of CASES

Chapter I. Introduction to Computer Law

Chapter II. Copyright Protection of Computer Software

A.Introduction to Copyright Concepts
B.Computer-Related Subject Matter of Copyright
C.General Standards of Copyrightability
D.Exclusive Rights
E.Limitations on the Exclusive Rights
F. Copyright Formalities
G. Infringement
Chapter III. The Patentability of Programs and Programmed Computers
A. Introduction
B.Organization of This Chapter
C.A Software Patent
D. Eligibility for Patent Protection
E.Historical Development of Computer Program Patent Law
F.Infringement by Equivalents of Claim Elements
Chapter IV. Misappropriation of Computer Technology
A.Trade Secrets
B.Taking of Nonsecret Information
Chapter V. International Intellectual Property Protection
A. Treaties Protecting Intellectual Property
B.General Agreement on Tariffs and Trade
C.Proposals for Software Protection
Chapter VI. Computer Contracts
A.Applicability of the Uniform Commercial Code
B.Warranties and Warranty Disclaimers
C. Tort as an Alternative to Contract Claims
D.Software Sales and Licensing
Chapter VII.Intellectual Property Remedies
A. Damages
B. Injunction
C.Seizure and Destruction
D.International Trade Commission Action
E.Federal Criminal Remedies
F.State Criminal Remedies for Trade Secret Violation
Chapter VIII.Taxing Intellectual Property
A.Local Property Taxes on Software
B.Local Sales or Use Taxes on Computer Services
C.Federal Income Tax
Chapter IX.Privacy
A.Restricting Data Base Gathering, Accessibility, and Use
B.Aggregation
Chapter X.Right to Accuracy of Information
A.Rights of Persons About Whom Data Is Kept
B. Computerized Records as Evidence
C.Computer CrimePunishing Interference With Computer Systems
D. Preventing Radio Frequency Interference
Chapter XI. Access to Information in Computerized Form
A. Access to Government Data Banks
B. Access to Computerized Data in Litigation
C. Duty to Use Data Banks
Chapter XII. Regulating the Transfer of Information
A.Electronic Funds Transfer
B.Export Controls
Chapter XIII. Antitrust Considerations
A. Monopolization
B. Vertical Restraints
C.Horizontal Restraints
D.Tie-ins
Chapter XIV. Trademark Law, Computer Standardization, and Competition

Chapter XV. Restriction of Competition in the Computer Industry

A.Restrictions on Telephone Company Competition
B. Restrictions on Government Competition
C.Restrictions on Foreign Competition
INDEX 729
Schachter, Law of Internet Speech (2001)

Contents [Note: cases, articles and other materials have been omitted from this list.]

Preface

Acknowledgments

Chapter I Fundamental Principles of Free Speech and the Nature of the Internet

Values Served by the First Amendment

The Nature of the Internet

Is There a Dichotomy Between Freedom of Speech and Freedom of the Press?

Analytical Frameworks for Internet Speech

Jurisdiction as an Illustration

Chapter II Regulation of Internet Content
First Amendment Analytical Frameworks

Hate Speech and Speech that Promotes Harm

Speech Relating to Matters of National Security

Obscenity and Indecency

Chapter III Defamation
Definition and Elements

Publication

1. Publication to Another
2. Publication by Conduits
3. Archived Materials
Of and Concerning the Plaintiff
1. Identification
2. Group Libel
3. The Plaintiff with the Same Name
4. The "Other Side" of Of and Concerning: Identifying the Originator of OnLine Content
Defamatory Import
1. The Per Se/Per Quod Distinction
2. Defamatory Import in the Internet Context
Falsity
1.Substantial Truth
2. Opinion
3.Matters of Public Concern
The Requisite Degree of Fault

Retractions and Clarifications285

Chapter IV Privacy Interests
Fundamental Principles of Privacy

Common Law Privacy Claims

1.False Light
2. Misappropriation
3.Public Disclosure of Private Facts
4.Intrusion on Seclusion
Data Mining and Data Protection Directives, Policies, and Legislation
1.Data Collection Techniques
2. Data Mining Controversies
3. Theories of Concern about Privacy in OnLine Communications
4. Data Protection Paradigms
a. The European Union Model
b. American Approaches
c.Data Collection Protections Relating to Children
d. Legislative Privacy Protections
5. Access to Information
Technological Privacy Protections
Chapter V Proprietary Interests in Content
Copyright
1. Fundamental Principles of Copyright
2. Injunctive Relief and First Amendment Implications
3. Copyright Infringement Claims
4. The Digital Millennium Copyright Act
a. OnLine Copyright Infringement Liability Limitation
b. Circumvention of Technological Protection Measures
c. Copyright Management Information Provisions
4.[sic; 5.] The Fair Use Defense
Trademark
1. Fundamental Principles of Trademark
2. Trademark Infringement and Dilution Claims
3. Defenses
Issues Relating to Domain Names
1. The Nature of Domain Names
2.Domain Name Disputes
3.Cybergriping
4.Cybersquatting
Special Applications to Emerging Technologies
1. Background
2. Linking
a. Hypertext Linking
b. InLine Linking
c. Deep Linking
3.Framing
4.Metatags
Notes and Questions

Glossary

Table of Cases

Index 538



NOTE: MATERIAL BELOW THIS LINE HAS NOT BEEN EDITED/FORMATTED.
[NJ 20020327]

Clifford, Computer and Cyber Law (1999)

Contents
Table of Authorities Preface Acknowledgments Availability of Updates
xiii xvi xvii xviii
I Introduction to Computers and the Law3
A. What Is a Computer?3
1. Computer Hardware3
2. Computer Software10
Example Computer Program Written in a High Level Language12
Example Computer Program Written in Assembly Language13
Example Computer Program Written in Machine Language15
Zelkowitz, Perspectives of Software Engineering15
Note21
B. The Legal System's Attempts to Define Computer Technology22
Data Cash Systems, Inc. v. JS&A Group, Inc.22
Note27
Uniform Commercial Code28
Computer Servicenters, Inc. v. Beacon Manufacturing Co.29
Triangle Underwriters, Inc. v. Honeywell, Inc.30
Commerce Union Bank v Tidwell33
Notes36
Bernstein v. U.S. Department of State36
Note46
II Contracts Involving Computer Technology and Personnel49
A. General Breach of Contract49
SAS Institute, Inc. v. S & H Computer Systems, Inc.49
B. Employment Relationships51
Revenue Ruling 874151
Title 17 United States Code. Copyrights57
Community for Creative Nonviolence v. Reid58
Aymes v Bonelli67
Whelan Associates, Inc. v. Jaslow Dental Laboratory, Inc.73
vm CONTENTS
Power Distribution, Inc. v. Emergency Power Engineering, Inc.74
Modern Controls, Inc. v. Andreadakis78
Pierce Real Estate v. Brass83
C. Warranty Provisions in Computer Contracts85
Uniform Commercial Code85
Acme Pump Company, Inc. v. National Cash Register Company87
Bakal v. Burroughs Corp.90
Ridge Company, Inc. v. NCR Corp.92
Note94
D. Revocation of Acceptance in Computer Contracts96
Uniform Commercial Code96
Carl Beasley Ford, Inc. v. Burroughs Corp.97
E. Electronic Data Interchange and Contract Formation106
Electronic Messaging Services Task Force, The Commercial
Use of Electronic Data Interchange  A Report and Model
Trading Partner Agreement107
Note115
F Security Interests in Computer Software116
National Peregrine, Inc. v. Capitol Federal Savings and Loan
Association of Denver (In re Peregrine Entertainment, Ltd.)117
III Tort Liability Involving Computer Techonolgy and Personnel129
A. Negligent Design or Implementation of Computer Technology129
Superwood Corp. v. Siempelkamp Corp.130
Note133
B. Professional Malpractice and the Computer Programmer135
Triangle Underwriters, Inc. v. Honeywell, Inc.135
Diversified Graphics, Ltd. v. Groves139
Notes142
C. Detrimental Reliance and Other Fraud Actions142
Dunn Appraisal Co. v. Honeywell Information Systems Inc.143
D. Defamation and Inaccurate Information147
1. Internet Publication147
Cubby, Inc. v. Compuserve Inc.147
Notes153
Zeran v. America Online, Inc.154
2. Credit Reports163
Stevenson v. TRW Inc.163
Notes169
IV Use by the Legal System of Computer Stored Information171
A. Computer Records as Evidence171
People v. Lugashi171
Note178
B.
V Cc A.
VI Sc
B.
CONTENTSix
Commercial Union Insurance Co. v. Boston Edison Co.178 B. Access to Computer Records Under Freedom of Information Laws183 Grodsky, The Freedom of Information Act in the Electronic
Age: The Statute Is Not User Friendly183
V Computers and the Constitution187
A. The First Amendment187
Reno v. American Civil Liberties Union187
B. Civil jurisdiction206
Maritz Inc. v CyberGold Inc.206
Bensusan Restaurant Corporation v. King212
VI Society's Response to the Misuse of Computer Technology217
A. Privacy Issues and Responses217
1. Constitutional Remedies217
'%Nhalen v. Roe217
2. Statutory Remedies223
Quinn v. Stone223
Notes233 3. Future Privacy Concerns234 Weingarten, Communications Technology:
New Challenges to Privacy234
B. Inaccuracy of Law Enforcement Data242
Arizona v. Evans242
Note254
Brown v. Patterson255
Note259
Pierson v Multnomah County260
C. Criminal Statutes and Prosecution264
1. Computer Crimes264
Lund v. Commonwealth of Virginia264
Notes267
Ohio v. Perry267
Title 18 United States Code. Crimes and Criminal Procedure273
United States v. Morris275
Notes283
2. The Internet and Crime284
United States v Thomas284
Note293
VII Proprietary Rights295
United States Constitution. Article I, Section 8, Clause 8295
A. Copyright295
1. Basic Introduction to Copyright Law296
CONTENTS
Title 17 United States Code. Copyrights296
2. Copyright Office Procedures for Computer Programs303
Copyright Office Regulations303
3. Computer Copyright Before January 1, 1977306
WhiteSmith Music Publishing Co. v. Apollo Co.306
4. Protection Received by a Computer Program Under
the Copyright Act of 1976309
Final Report of the National Commission on New
Technological Uses of Copyrighted Works309
Apple Computer, Inc. v. Franklin Computer Corp.315
Whelan Associates, Inc. v Jaslow Dental Laboratory, Inc.326
Computer Associates International, Inc. v. Altai, Inc.339
Note357
5. The Limits of Copyright Protection358
Lotus Development Corp. v Borland International, Inc.358
6. Publication366
M. Bryce & Associates, Inc., v. Gladstone366
E.F. Johnson Co. v. Uniden Corp. Of America368
7. Rights of Users of Computer Programs369
Title 17 United States Code. Copyrights369
MicroSPARC, Inc. v. Amtype Corp.371
Vault Corp. v. Quaid Software Limited373
Note377
8. Fair Use and Computer Programs377
Title 17 United States Code. Copyrights377
Sony Corp. of America v. Universal City Studios, Inc.377
Sega Enterprises Ltd. v Accolade, Inc.382
9. The Creator/Created Problem396
Title 17 United States Code. Copyrights396
Notes396
10. Databases and Copyright398
Final Report of the National Commission on New
Technological Uses of Copyrighted Works398
Feist Publications, Inc. v. Rural Telephone Service
Company, Inc.400
11. Software Copyright versus Display Copyright412
Midway Manufacturing Co. v. Dirkschneider412
Midway Manufacturing Co. v. Artic International, Inc.420
Lotus Development Corp. v. Paperback Software International424
12. Proving Copying427
E.F. Johnson Co. v. Uniden Corporation of America427
SAS Institute, Inc. v. S & H Computer Systems, Inc.439
Frank Shepard Co. v. Zachary P Taylor Pub. Co.443
Computer Associates International, Inc. v. Altai, Inc.444
B. Trade Secret446
C.
E.
CONTENTSxi
)61. Basic Introduction to Trade Secret Law446
)3Uniform Trade Secrets Act446
)3Notes448
)62. Establishing Trade Secret Protection449
)6ElectroCraft Corp. v. Controlled Motion, Inc.449
Note459
i9Data General Corp. v. Digital Computer Controls, Inc.460
3. Protection Received by a Computer Program Under
i9Trade Secret Law465
5Telex Corp. v. International Business Machines Corp.465
:64. The Boundaries Between Trade Secret Law and Copyright469
19Title 17 United States Code. Copyrights469
7Avco Corp. v. Precision Air Parts, Inc.469
.8M. Bryce & Associates, Inc. v. Gladstone473
85. Shrink Wrap Licenses478
6BobbsMerrill Co. v. Straus478
6Note479
8Uniform Commercial Code480
9StepSaver Data Systems, Inc. v. Wyse Technology480
9ProCD, Inc. v. Zeidenberg493
1Sample License Agreements498
3Vault Corp. v. Quaid Software Limited502
7C. Patent Law511
71. Basic Introduction to Patent Law511
7Title 35 United States Code. Patents511
7Graham v. John Deere Co.514
2General Dynamics Corp. v. Whitcomb529
62. Protection Received by a Computer Program Under
6Patent Law532
5Gottschalk v. Benson532
3Parker v. Flook537
Diamond v Diehr543
3Arrhythmia Research Technology, Inc. v. Corazonix Corp.558
State Street Bank & Trust Co. v Signature Financial Group, Inc.566
Patent and Trademark Office, Examination Guidelines for
ComputerRelated Inventions574
Note588
3. Describing a Computer Program in the Patent Application588
White Consolidated Industries, Inc. v Vega ServoControl, Inc.588
D. Sui Generis Protection592
Brooktree Corp. v. Advanced Micro Devices, Inc.592
E. Trade Dress and Trademark608
1. Trade Dress608
Computer Care v. Service Systems Enterprises, Inc.608
Engineering Dynamics, Inc. v Structural Software, Inc.614
2. Trademark
CD Solutions, Inc. v. Tooker
Panavision International, L.P. V Toeppen
Acme. Cash Apple Corp Archit Inc., Arizor~ Arrhyl Cora Atari Inc., Avco c Aymes Bakal Batem Bensw: 212 Berns Bobbs Brook
Devi Brown Carl I 97 CD St Chath Regi Clybu Comr, Cons
Edh Court Reic Coral Alta COMI Ent,



Loundy, Cyberlaw (2001)

TABLE OF CONTENTS
Page
SECTION I: THE REGULATORY STRUCTURE
A Technical Governance
A BRIEF HISTORY OF THE INTERNET  1
REQUEST FOR COMMENTS: 1958: ARCHITECTURAL PRINCIPLES OF THE INTERNET °
B Jurisdiction, the Dormant Commerce Clause, and TransBorder Data Flow
ZIPPO MFR CO V ZIPPO DOT COM, INC~
AMERICAN INFORMATION CORP V AMERICAN INFOMETRICS, INC  41
AMERICAN LIBRARY ASSOCIATION V PATAKI ZV
US V KAMMERSELL~
PLAYBOY ENTERPRISES V CHUCKLEBERRY PUBLISHING (I) S, Z
PLAYBOY ENTERPRISES V CHUCKLEBERRY PUBLISHING (II)
C Regulation ofPrivate Communities hy the Community Owner
MARSHV ALABAMA ~  `CYBER PROMOTIONS V AMERICA ONLINE?
l~ir\tx~11LAW AND BORDERSTHE RISE OF LAW IN CYBERSPACEr7,c,w ACA RAPE IN CYBERSPACE ~

C0VArv1~Z~'
99P,~)<THE FIRST INTERNET WAR I  `Governance by TechnologyImposed Restrictions
ALA STATEMENT ON LIBRARY USE OF FILTERING SOFTWARE
SHIFTING THE POSSIBLE: HOW TRUSTED SYSTEMS AND DIGITAL
PROPERTY RIGHTS CHALLENGE US TO RETHINK DIGITAL120 PUBLISHING
The Futility of Regulation and the Creation of Data Havens
X MINNESOTA WARNING TO ALL INTERNET USERS AND PROVIDERS
FLORIDA ATTORNEY GENERAL ADVISORY LEGAL OPINION„
LETTER TO PETER JUNGER FROM MCKAY (:3 JG
RESPONSE TO C P MCKAY, COUNTY SOLICITOR FROM JUNGER ,
CYBERRIGHTS & CYBERLIBERTIES (UK) PRESS RELEASE
FSelfHelp Remedies as Internet Governancet /A4
INTERNIC WHO?1
~' NO CEASEFIRE ON THE WEB: BASQUE WEBSITE UNDER ATTACK ARE IRISH REPUBLICAN SITES NEXT?
TO SURF AND PROTECT ~, VIGILANTE COPYRIGHT ENFORCER AIMS AT FREELOADERS  G A Case Study: The Regulation of Junk EMailt 6 o
THE REGULATION OF JUNK EMAIL

SECTION II: THE BUSINESS STRUCTUREI rI t
A Contract Formationr , BELLCO FIRST FEDERAL CREDIT UNION V KASPAR
~CDOHERTY V REGISTRY OF MOTOR VEHICLES ( qS
X B ShrinkWrap Licensing
PROCD V ZEIDENBERG
KLOCEK V GATEWAY4
BREWER V GATEWAY
~( C ClickWrap Licensing
CASPI V MICROSOFT
SPECHT V NETSCAPE COMMUNICATIONS  2,CX~
YD Other Contract Issues
OPPEDAHL & LARSON V NETWORK SOLUTIONS, INC~'
E Property Interests~ I q COMPUSERVE V CYBERPOMOTIONS
THE NATIONAL BASKETBALL ASSOCIATION V MOTOROLA
EBAY V BIDDERS EDGE (~ F Netiquette',Z
1267632 ONTARIO INC V NEXX ONLINE
G Employee and Privacy Issues
BOURKE V NISSAN
SMYTH V PILSBURY
ANDERSEN CONSULTING V UOP AND BICKEL & BREWER US V SIMONS9 STATE V MORAN DOUBLECLICK V HENDERSON 2 Co `7
EARTHWEB V SCHLACK  27
IN THE MATTER OF GEOCITIES /
ANALYSIS OF PROPOSED CONSENT ORDER TO AID PUBLIC COMMENT 2
RESPONSE TO PETITION REQUESTING INVESTIGATION OF, AND
ENFORCEMENT ACTION AGAINST SPECTRACOM
HOW TO COMPLY WITH THE CHILDREN'S ONLINE PRIVACY PROTECTIONZ RULE
COMMON LAW DERIVATIVE RIGHT OF PRIVACY c)~
THE EUROPEAN UNION DATA PROTECTION DIRECTIVE
H Regulated Industries and Products 3039
USDOT CONSENT ORDER AGAINST VIRGIN ATLANTIC AIRWAYS   3C6
TAUCHER V BORN  ~90
STATE OF MISSOURI V BEER NUTS :~ L BRINDENBAUGH V O'BANNON  ; ?I)
TABLE OF CONTENTS
Page
SECTION III: SPEECH ISSUES
A Indecency and Obscenity
ACLU V RENOvi
US V THOMAS
MAINSTREAM LOUDOUN V BOARD OF TRUSTEES OF THE LOUDOUN
COUNTY LIBRARY (I)   ~
MAINSTREAM LOUDOUN V BOARD OF TRUSTEES OF THE LOUDOUN
COUNTY LIBRARY (II)`'~"
B Child Pornography31P V MATTHEWS
THE FREE SPEECH COALITION V RENO '55( r I
C Defamation
CUBBY V COMPUSERVE
STRATTON OAKMONT V PRODIGY If
THE COMMUNICATIONS DECENCY ACT, 47 USC 230A ZERAN V AMERICAN ONLINE LIBEL LAW: LET IT DIE
D Hate Speech and Its Relatives4 Z2
US V BAKER
US V ALKHABAZ1Z) %
PLANNED PARENTHOOD V AMERICAN COALITION OF LIFE ACTIVISTS  "
E Computer Code as Speech*4~,
JUNGER V DALEY
SECTION IV: INTELLECTUAL PROPERTY '4 gyp
A Copyrights4
MICHAELS V INTERNET ENTERTAINMENT GROUP
RELIGIOUS TECHNOLOGY CENTER V NETCOM A(~
PLAYBOY ENTERPRISES V WEBBWORLD (PART I)49q
UMG RECORDINGS V MP3COM U15
A NOTE ON THE DIGITAL MILLENIUM COPYRIGHT ACT 49
LIABILITY FOR LINKING AND FRAMING`Lv
A & M RECORDS V NAPSTER
B Trademarks JS O?
BIGSTAR ENTERTAINMENT V NEXT BIG STAR1~0
META TAGS AND ORIGINALINTEREST CONFUSION 5132
PLAYBOY ENTERPRISES V WEBBWORLD (PART II)'S,1
PLAYBOY ENTERPRISES V WELLES,~
PANAVISION V TOEPPEN
LOCKHEED MARTIN V NETWORK SOLUTIONS, INC '~` ~3
ARCHDIOCESE OF ST LOUIS V INTERNET ENTERTAINMENT GROUP
REQUEST FOR COMMENTS: 1591DOMAIN NAME STRUCTURE AND
DELEGATION
ICANN ARBITRATION
ICANN UNIFORM DOMAIN NAME DISPUTE RESOLUTION POLICY  'S
~7g
TATA SONS V D&V ENTERPRISES
CAPT'N SNOOZE MANAGEMENT V DOMAINS 4 SALEO
C Trade SecretsE~Economic Espionage9VFIONT MICROSYSTEMS V AUTODESK
FORD MOTOR COMPANY V LANE top® ECONOMIC ESPIONAGE ACT OF 1996U to
US V MARTIN
SECTION V: CRIME Co z '1
A Computer Intrusions, Attacks & Unauthorized Use l Zq( Z17 PEOPLE V VERSAGGI
PEOPLE V ANGELES  (Obo
STATE V OLSON 1<
SHURGARD STORAGE CENTERS V SAFEGUARD SELF STORAGE
B Theft of Service Cc (A('~
PEOPLE V TANSEY
US V ASHEG~
US V BAILEY
AMERICAN TELEPHONE & TELEGRAPH COMPANY V THE NEW YORK CITY
HUMAN RESOURCES ADMINISTRATION
C Interception ofElectronic Communications ( ~~?
STEVE JACKSON GAMES V UNITED STATES SECRET SERVICE
BOHACH V CITY OF RENO
SHERMAN & COMPANY V SALTON MAXIM HOUSEWARES
D Online Stalking (P 90
1999 REPORT ON CYBERSTALKING (407 'Zo
CYBERSTALKING HYPE  Et~ i
E Online Fraud
LETTER FROM MEDINE TO GRAVES RE: DOMAIN NAME <INTERNICCOM>
INTERNIC POSER TO PAY UP
PEOPLE V LIPSITZ 710 COMMONWEALTH V MURGALLIS STATEMENT OF FTC ON INTERNET FRAUD W
COPYRIGHT INFRINGEMENT AS WIRE FRAUDqjq
TABLE OF CONTENTS
Page
F Computer Viruses, Time Bombs, Trojans & Malicious Code II I
US V MORRIS
STATE V CORCORAN U'
WERNER, ZAROFF, SLOTNICK, STERN & ASKENAZY V LEVIS
MAHRU V SUPERIOR COURT OF LOS ANGELES COUNTY  'z~ ,I
G Infrastructure Security 'I 33
THE CLINTON ADMINISTRATION'S POLICY ON CRITICAL INFRASTRUCTURET33 PROTECTION: PRESIDENTIAL DECISION DIRECTIVE 63 „,
H Hactivism 14Z
ACTIVISM, HACKTIVISM AND CYBERTORRISM: THE INTERNET AS A TOOL
FOR INFLUENCING FOREIGN POLICY
 


Web Analytics Made Easy - Statcounter