Cyberlaw Casebooks' Contents
Summary of Contents
PREFACE
TABLE of CASES
Chapter I. Introduction to Computer Law
Chapter II. Copyright Protection of Computer Software
A.Introduction to Copyright ConceptsChapter III. The Patentability of Programs and Programmed Computers
B.Computer-Related Subject Matter of Copyright
C.General Standards of Copyrightability
D.Exclusive Rights
E.Limitations on the Exclusive Rights
F. Copyright Formalities
G. Infringement
A. IntroductionChapter IV. Misappropriation of Computer Technology
B.Organization of This Chapter
C.A Software Patent
D. Eligibility for Patent Protection
E.Historical Development of Computer Program Patent Law
F.Infringement by Equivalents of Claim Elements
A.Trade SecretsChapter V. International Intellectual Property Protection
B.Taking of Nonsecret Information
A. Treaties Protecting Intellectual PropertyChapter VI. Computer Contracts
B.General Agreement on Tariffs and Trade
C.Proposals for Software Protection
A.Applicability of the Uniform Commercial CodeChapter VII.Intellectual Property Remedies
B.Warranties and Warranty Disclaimers
C. Tort as an Alternative to Contract Claims
D.Software Sales and Licensing
A. DamagesChapter VIII.Taxing Intellectual Property
B. Injunction
C.Seizure and Destruction
D.International Trade Commission Action
E.Federal Criminal Remedies
F.State Criminal Remedies for Trade Secret Violation
A.Local Property Taxes on SoftwareChapter IX.Privacy
B.Local Sales or Use Taxes on Computer Services
C.Federal Income Tax
A.Restricting Data Base Gathering, Accessibility, and UseChapter X.Right to Accuracy of Information
B.Aggregation
A.Rights of Persons About Whom Data Is KeptChapter XI. Access to Information in Computerized Form
B. Computerized Records as Evidence
C.Computer CrimePunishing Interference With Computer Systems
D. Preventing Radio Frequency Interference
A. Access to Government Data BanksChapter XII. Regulating the Transfer of Information
B. Access to Computerized Data in Litigation
C. Duty to Use Data Banks
A.Electronic Funds TransferChapter XIII. Antitrust Considerations
B.Export Controls
A. MonopolizationChapter XIV. Trademark Law, Computer Standardization, and Competition
B. Vertical Restraints
C.Horizontal Restraints
D.Tie-ins
Chapter XV. Restriction of Competition in the Computer Industry
A.Restrictions on Telephone Company CompetitionINDEX 729
B. Restrictions on Government Competition
C.Restrictions on Foreign Competition
Contents [Note: cases, articles and other materials have been omitted from this list.]
Preface
Acknowledgments
Chapter I Fundamental Principles of Free Speech and the Nature of the Internet
Values Served by the First AmendmentChapter II Regulation of Internet ContentThe Nature of the Internet
Is There a Dichotomy Between Freedom of Speech and Freedom of the Press?
Analytical Frameworks for Internet Speech
Jurisdiction as an Illustration
First Amendment Analytical FrameworksChapter III DefamationHate Speech and Speech that Promotes Harm
Speech Relating to Matters of National Security
Obscenity and Indecency
Definition and ElementsChapter IV Privacy InterestsPublication
1. Publication to AnotherOf and Concerning the Plaintiff
2. Publication by Conduits
3. Archived Materials1. IdentificationDefamatory Import
2. Group Libel
3. The Plaintiff with the Same Name
4. The "Other Side" of Of and Concerning: Identifying the Originator of OnLine Content1. The Per Se/Per Quod DistinctionFalsity
2. Defamatory Import in the Internet Context1.Substantial TruthThe Requisite Degree of Fault
2. Opinion
3.Matters of Public ConcernRetractions and Clarifications285
Fundamental Principles of PrivacyChapter V Proprietary Interests in ContentCommon Law Privacy Claims
1.False LightData Mining and Data Protection Directives, Policies, and Legislation
2. Misappropriation
3.Public Disclosure of Private Facts
4.Intrusion on Seclusion1.Data Collection TechniquesTechnological Privacy Protections
2. Data Mining Controversies
3. Theories of Concern about Privacy in OnLine Communications
4. Data Protection Paradigmsa. The European Union Model5. Access to Information
b. American Approaches
c.Data Collection Protections Relating to Children
d. Legislative Privacy Protections
CopyrightNotes and Questions1. Fundamental Principles of CopyrightTrademark
2. Injunctive Relief and First Amendment Implications
3. Copyright Infringement Claims
4. The Digital Millennium Copyright Acta. OnLine Copyright Infringement Liability Limitation4.[sic; 5.] The Fair Use Defense
b. Circumvention of Technological Protection Measures
c. Copyright Management Information Provisions1. Fundamental Principles of TrademarkIssues Relating to Domain Names
2. Trademark Infringement and Dilution Claims
3. Defenses1. The Nature of Domain NamesSpecial Applications to Emerging Technologies
2.Domain Name Disputes
3.Cybergriping
4.Cybersquatting1. Background
2. Linkinga. Hypertext Linking3.Framing
b. InLine Linking
c. Deep Linking
4.Metatags
Glossary
Table of Cases
Index 538
Clifford, Computer and Cyber Law (1999)
Contents
Table of Authorities Preface Acknowledgments Availability
of Updates
xiii xvi xvii xviii
I Introduction to Computers and the Law3
A. What Is a Computer?3
1. Computer Hardware3
2. Computer Software10
Example Computer Program Written in a High Level Language12
Example Computer Program Written in Assembly Language13
Example Computer Program Written in Machine Language15
Zelkowitz, Perspectives of Software Engineering15
Note21
B. The Legal System's Attempts to Define Computer Technology22
Data Cash Systems, Inc. v. JS&A Group, Inc.22
Note27
Uniform Commercial Code28
Computer Servicenters, Inc. v. Beacon Manufacturing Co.29
Triangle Underwriters, Inc. v. Honeywell, Inc.30
Commerce Union Bank v Tidwell33
Notes36
Bernstein v. U.S. Department of State36
Note46
II Contracts Involving Computer Technology and Personnel49
A. General Breach of Contract49
SAS Institute, Inc. v. S & H Computer Systems, Inc.49
B. Employment Relationships51
Revenue Ruling 874151
Title 17 United States Code. Copyrights57
Community for Creative Nonviolence v. Reid58
Aymes v Bonelli67
Whelan Associates, Inc. v. Jaslow Dental Laboratory,
Inc.73
vm CONTENTS
Power Distribution, Inc. v. Emergency Power Engineering,
Inc.74
Modern Controls, Inc. v. Andreadakis78
Pierce Real Estate v. Brass83
C. Warranty Provisions in Computer Contracts85
Uniform Commercial Code85
Acme Pump Company, Inc. v. National Cash Register Company87
Bakal v. Burroughs Corp.90
Ridge Company, Inc. v. NCR Corp.92
Note94
D. Revocation of Acceptance in Computer Contracts96
Uniform Commercial Code96
Carl Beasley Ford, Inc. v. Burroughs Corp.97
E. Electronic Data Interchange and Contract Formation106
Electronic Messaging Services Task Force, The Commercial
Use of Electronic Data Interchange A Report and
Model
Trading Partner Agreement107
Note115
F Security Interests in Computer Software116
National Peregrine, Inc. v. Capitol Federal Savings and
Loan
Association of Denver (In re Peregrine Entertainment,
Ltd.)117
III Tort Liability Involving Computer Techonolgy and
Personnel129
A. Negligent Design or Implementation of Computer Technology129
Superwood Corp. v. Siempelkamp Corp.130
Note133
B. Professional Malpractice and the Computer Programmer135
Triangle Underwriters, Inc. v. Honeywell, Inc.135
Diversified Graphics, Ltd. v. Groves139
Notes142
C. Detrimental Reliance and Other Fraud Actions142
Dunn Appraisal Co. v. Honeywell Information Systems Inc.143
D. Defamation and Inaccurate Information147
1. Internet Publication147
Cubby, Inc. v. Compuserve Inc.147
Notes153
Zeran v. America Online, Inc.154
2. Credit Reports163
Stevenson v. TRW Inc.163
Notes169
IV Use by the Legal System of Computer Stored Information171
A. Computer Records as Evidence171
People v. Lugashi171
Note178
B.
V Cc A.
VI Sc
B.
CONTENTSix
Commercial Union Insurance Co. v. Boston Edison Co.178
B. Access to Computer Records Under Freedom of Information Laws183 Grodsky,
The Freedom of Information Act in the Electronic
Age: The Statute Is Not User Friendly183
V Computers and the Constitution187
A. The First Amendment187
Reno v. American Civil Liberties Union187
B. Civil jurisdiction206
Maritz Inc. v CyberGold Inc.206
Bensusan Restaurant Corporation v. King212
VI Society's Response to the Misuse of Computer Technology217
A. Privacy Issues and Responses217
1. Constitutional Remedies217
'%Nhalen v. Roe217
2. Statutory Remedies223
Quinn v. Stone223
Notes233 3. Future Privacy Concerns234 Weingarten, Communications
Technology:
New Challenges to Privacy234
B. Inaccuracy of Law Enforcement Data242
Arizona v. Evans242
Note254
Brown v. Patterson255
Note259
Pierson v Multnomah County260
C. Criminal Statutes and Prosecution264
1. Computer Crimes264
Lund v. Commonwealth of Virginia264
Notes267
Ohio v. Perry267
Title 18 United States Code. Crimes and Criminal Procedure273
United States v. Morris275
Notes283
2. The Internet and Crime284
United States v Thomas284
Note293
VII Proprietary Rights295
United States Constitution. Article I, Section 8, Clause
8295
A. Copyright295
1. Basic Introduction to Copyright Law296
CONTENTS
Title 17 United States Code. Copyrights296
2. Copyright Office Procedures for Computer Programs303
Copyright Office Regulations303
3. Computer Copyright Before January 1, 1977306
WhiteSmith Music Publishing Co. v. Apollo Co.306
4. Protection Received by a Computer Program Under
the Copyright Act of 1976309
Final Report of the National Commission on New
Technological Uses of Copyrighted Works309
Apple Computer, Inc. v. Franklin Computer Corp.315
Whelan Associates, Inc. v Jaslow Dental Laboratory, Inc.326
Computer Associates International, Inc. v. Altai, Inc.339
Note357
5. The Limits of Copyright Protection358
Lotus Development Corp. v Borland International, Inc.358
6. Publication366
M. Bryce & Associates, Inc., v. Gladstone366
E.F. Johnson Co. v. Uniden Corp. Of America368
7. Rights of Users of Computer Programs369
Title 17 United States Code. Copyrights369
MicroSPARC, Inc. v. Amtype Corp.371
Vault Corp. v. Quaid Software Limited373
Note377
8. Fair Use and Computer Programs377
Title 17 United States Code. Copyrights377
Sony Corp. of America v. Universal City Studios, Inc.377
Sega Enterprises Ltd. v Accolade, Inc.382
9. The Creator/Created Problem396
Title 17 United States Code. Copyrights396
Notes396
10. Databases and Copyright398
Final Report of the National Commission on New
Technological Uses of Copyrighted Works398
Feist Publications, Inc. v. Rural Telephone Service
Company, Inc.400
11. Software Copyright versus Display Copyright412
Midway Manufacturing Co. v. Dirkschneider412
Midway Manufacturing Co. v. Artic International, Inc.420
Lotus Development Corp. v. Paperback Software International424
12. Proving Copying427
E.F. Johnson Co. v. Uniden Corporation of America427
SAS Institute, Inc. v. S & H Computer Systems, Inc.439
Frank Shepard Co. v. Zachary P Taylor Pub. Co.443
Computer Associates International, Inc. v. Altai, Inc.444
B. Trade Secret446
C.
E.
CONTENTSxi
)61. Basic Introduction to Trade Secret Law446
)3Uniform Trade Secrets Act446
)3Notes448
)62. Establishing Trade Secret Protection449
)6ElectroCraft Corp. v. Controlled Motion, Inc.449
Note459
i9Data General Corp. v. Digital Computer Controls, Inc.460
3. Protection Received by a Computer Program Under
i9Trade Secret Law465
5Telex Corp. v. International Business Machines Corp.465
:64. The Boundaries Between Trade Secret Law and Copyright469
19Title 17 United States Code. Copyrights469
7Avco Corp. v. Precision Air Parts, Inc.469
.8M. Bryce & Associates, Inc. v. Gladstone473
85. Shrink Wrap Licenses478
6BobbsMerrill Co. v. Straus478
6Note479
8Uniform Commercial Code480
9StepSaver Data Systems, Inc. v. Wyse Technology480
9ProCD, Inc. v. Zeidenberg493
1Sample License Agreements498
3Vault Corp. v. Quaid Software Limited502
7C. Patent Law511
71. Basic Introduction to Patent Law511
7Title 35 United States Code. Patents511
7Graham v. John Deere Co.514
2General Dynamics Corp. v. Whitcomb529
62. Protection Received by a Computer Program Under
6Patent Law532
5Gottschalk v. Benson532
3Parker v. Flook537
Diamond v Diehr543
3Arrhythmia Research Technology, Inc. v. Corazonix Corp.558
State Street Bank & Trust Co. v Signature Financial
Group, Inc.566
Patent and Trademark Office, Examination Guidelines for
ComputerRelated Inventions574
Note588
3. Describing a Computer Program in the Patent Application588
White Consolidated Industries, Inc. v Vega ServoControl,
Inc.588
D. Sui Generis Protection592
Brooktree Corp. v. Advanced Micro Devices, Inc.592
E. Trade Dress and Trademark608
1. Trade Dress608
Computer Care v. Service Systems Enterprises, Inc.608
Engineering Dynamics, Inc. v Structural Software, Inc.614
2. Trademark
CD Solutions, Inc. v. Tooker
Panavision International, L.P. V Toeppen
Acme. Cash Apple Corp Archit Inc., Arizor~ Arrhyl Cora
Atari Inc., Avco c Aymes Bakal Batem Bensw: 212 Berns Bobbs Brook
Devi Brown Carl I 97 CD St Chath Regi Clybu Comr, Cons
Edh Court Reic Coral Alta COMI Ent,
TABLE OF CONTENTS
Page
SECTION I: THE REGULATORY STRUCTURE
A Technical Governance
A BRIEF HISTORY OF THE INTERNET 1
REQUEST FOR COMMENTS: 1958: ARCHITECTURAL PRINCIPLES
OF THE INTERNET °
B Jurisdiction, the Dormant Commerce Clause, and TransBorder
Data Flow
ZIPPO MFR CO V ZIPPO DOT COM, INC~
AMERICAN INFORMATION CORP V AMERICAN INFOMETRICS, INC
41
AMERICAN LIBRARY ASSOCIATION V PATAKI ZV
US V KAMMERSELL~
PLAYBOY ENTERPRISES V CHUCKLEBERRY PUBLISHING (I) S,
Z
PLAYBOY ENTERPRISES V CHUCKLEBERRY PUBLISHING (II)
C Regulation ofPrivate Communities hy the Community Owner
MARSHV ALABAMA ~ `CYBER PROMOTIONS V AMERICA ONLINE?
l~ir\tx~11LAW AND BORDERSTHE RISE OF LAW IN CYBERSPACEr7,c,w
ACA RAPE IN CYBERSPACE ~
C0VArv1~Z~'
99P,~)<THE FIRST INTERNET WAR I `Governance
by TechnologyImposed Restrictions
ALA STATEMENT ON LIBRARY USE OF FILTERING SOFTWARE
SHIFTING THE POSSIBLE: HOW TRUSTED SYSTEMS AND DIGITAL
PROPERTY RIGHTS CHALLENGE US TO RETHINK DIGITAL120 PUBLISHING
The Futility of Regulation and the Creation of Data Havens
X MINNESOTA WARNING TO ALL INTERNET USERS AND PROVIDERS
FLORIDA ATTORNEY GENERAL ADVISORY LEGAL OPINION„
LETTER TO PETER JUNGER FROM MCKAY (:3 JG
RESPONSE TO C P MCKAY, COUNTY SOLICITOR FROM JUNGER ,
CYBERRIGHTS & CYBERLIBERTIES (UK) PRESS RELEASE
FSelfHelp Remedies as Internet Governancet /A4
INTERNIC WHO?1
~' NO CEASEFIRE ON THE WEB: BASQUE WEBSITE UNDER ATTACK
ARE IRISH REPUBLICAN SITES NEXT?
TO SURF AND PROTECT ~, VIGILANTE COPYRIGHT ENFORCER AIMS
AT FREELOADERS G A Case Study: The Regulation of Junk EMailt 6 o
THE REGULATION OF JUNK EMAIL
SECTION II: THE BUSINESS STRUCTUREI rI t
A Contract Formationr , BELLCO FIRST FEDERAL CREDIT UNION
V KASPAR
~CDOHERTY V REGISTRY OF MOTOR VEHICLES ( qS
X B ShrinkWrap Licensing
PROCD V ZEIDENBERG
KLOCEK V GATEWAY4
BREWER V GATEWAY
~( C ClickWrap Licensing
CASPI V MICROSOFT
SPECHT V NETSCAPE COMMUNICATIONS 2,CX~
YD Other Contract Issues
OPPEDAHL & LARSON V NETWORK SOLUTIONS, INC~'
E Property Interests~ I q COMPUSERVE V CYBERPOMOTIONS
THE NATIONAL BASKETBALL ASSOCIATION V MOTOROLA
EBAY V BIDDERS EDGE (~ F Netiquette',Z
1267632 ONTARIO INC V NEXX ONLINE
G Employee and Privacy Issues
BOURKE V NISSAN
SMYTH V PILSBURY
ANDERSEN CONSULTING V UOP AND BICKEL & BREWER US
V SIMONS9 STATE V MORAN DOUBLECLICK V HENDERSON 2 Co `7
EARTHWEB V SCHLACK 27
IN THE MATTER OF GEOCITIES /
ANALYSIS OF PROPOSED CONSENT ORDER TO AID PUBLIC COMMENT
2
RESPONSE TO PETITION REQUESTING INVESTIGATION OF, AND
ENFORCEMENT ACTION AGAINST SPECTRACOM
HOW TO COMPLY WITH THE CHILDREN'S ONLINE PRIVACY PROTECTIONZ
RULE
COMMON LAW DERIVATIVE RIGHT OF PRIVACY c)~
THE EUROPEAN UNION DATA PROTECTION DIRECTIVE
H Regulated Industries and Products 3039
USDOT CONSENT ORDER AGAINST VIRGIN ATLANTIC AIRWAYS
3C6
TAUCHER V BORN ~90
STATE OF MISSOURI V BEER NUTS :~ L BRINDENBAUGH V O'BANNON
; ?I)
TABLE OF CONTENTS
Page
SECTION III: SPEECH ISSUES
A Indecency and Obscenity
ACLU V RENOvi
US V THOMAS
MAINSTREAM LOUDOUN V BOARD OF TRUSTEES OF THE LOUDOUN
COUNTY LIBRARY (I) ~
MAINSTREAM LOUDOUN V BOARD OF TRUSTEES OF THE LOUDOUN
COUNTY LIBRARY (II)`'~"
B Child Pornography31P V MATTHEWS
THE FREE SPEECH COALITION V RENO '55( r I
C Defamation
CUBBY V COMPUSERVE
STRATTON OAKMONT V PRODIGY If
THE COMMUNICATIONS DECENCY ACT, 47 USC 230A ZERAN V AMERICAN
ONLINE LIBEL LAW: LET IT DIE
D Hate Speech and Its Relatives4 Z2
US V BAKER
US V ALKHABAZ1Z) %
PLANNED PARENTHOOD V AMERICAN COALITION OF LIFE ACTIVISTS
"
E Computer Code as Speech*4~,
JUNGER V DALEY
SECTION IV: INTELLECTUAL PROPERTY '4 gyp
A Copyrights4
MICHAELS V INTERNET ENTERTAINMENT GROUP
RELIGIOUS TECHNOLOGY CENTER V NETCOM A(~
PLAYBOY ENTERPRISES V WEBBWORLD (PART I)49q
UMG RECORDINGS V MP3COM U15
A NOTE ON THE DIGITAL MILLENIUM COPYRIGHT ACT 49
LIABILITY FOR LINKING AND FRAMING`Lv
A & M RECORDS V NAPSTER
B Trademarks JS O?
BIGSTAR ENTERTAINMENT V NEXT BIG STAR1~0
META TAGS AND ORIGINALINTEREST CONFUSION 5132
PLAYBOY ENTERPRISES V WEBBWORLD (PART II)'S,1
PLAYBOY ENTERPRISES V WELLES,~
PANAVISION V TOEPPEN
LOCKHEED MARTIN V NETWORK SOLUTIONS, INC '~` ~3
ARCHDIOCESE OF ST LOUIS V INTERNET ENTERTAINMENT GROUP
REQUEST FOR COMMENTS: 1591DOMAIN NAME STRUCTURE AND
DELEGATION
ICANN ARBITRATION
ICANN UNIFORM DOMAIN NAME DISPUTE RESOLUTION POLICY
'S
~7g
TATA SONS V D&V ENTERPRISES
CAPT'N SNOOZE MANAGEMENT V DOMAINS 4 SALEO
C Trade SecretsE~Economic Espionage9VFIONT MICROSYSTEMS
V AUTODESK
FORD MOTOR COMPANY V LANE top® ECONOMIC ESPIONAGE
ACT OF 1996U to
US V MARTIN
SECTION V: CRIME Co z '1
A Computer Intrusions, Attacks & Unauthorized Use
l Zq( Z17 PEOPLE V VERSAGGI
PEOPLE V ANGELES (Obo
STATE V OLSON 1<
SHURGARD STORAGE CENTERS V SAFEGUARD SELF STORAGE
B Theft of Service Cc (A('~
PEOPLE V TANSEY
US V ASHEG~
US V BAILEY
AMERICAN TELEPHONE & TELEGRAPH COMPANY V THE NEW
YORK CITY
HUMAN RESOURCES ADMINISTRATION
C Interception ofElectronic Communications ( ~~?
STEVE JACKSON GAMES V UNITED STATES SECRET SERVICE
BOHACH V CITY OF RENO
SHERMAN & COMPANY V SALTON MAXIM HOUSEWARES
D Online Stalking (P 90
1999 REPORT ON CYBERSTALKING (407 'Zo
CYBERSTALKING HYPE Et~ i
E Online Fraud
LETTER FROM MEDINE TO GRAVES RE: DOMAIN NAME <INTERNICCOM>
INTERNIC POSER TO PAY UP
PEOPLE V LIPSITZ 710 COMMONWEALTH V MURGALLIS STATEMENT
OF FTC ON INTERNET FRAUD W
COPYRIGHT INFRINGEMENT AS WIRE FRAUDqjq
TABLE OF CONTENTS
Page
F Computer Viruses, Time Bombs, Trojans & Malicious
Code II I
US V MORRIS
STATE V CORCORAN U'
WERNER, ZAROFF, SLOTNICK, STERN & ASKENAZY V LEVIS
MAHRU V SUPERIOR COURT OF LOS ANGELES COUNTY 'z~
,I
G Infrastructure Security 'I 33
THE CLINTON ADMINISTRATION'S POLICY ON CRITICAL INFRASTRUCTURET33
PROTECTION: PRESIDENTIAL DECISION DIRECTIVE 63 „,
H Hactivism 14Z
ACTIVISM, HACKTIVISM AND CYBERTORRISM: THE INTERNET AS
A TOOL
FOR INFLUENCING FOREIGN POLICY