Written Testimony of Marin K. Levy on 'The Need for New Lower Court Judgeships, 30 Years in the Making' for the Subcommittee on Courts, Intellectual Property, and the Internet of the House Committee on the Judiciary

2021 ◽  
Author(s):  
Marin K. Levy
Author(s):  
Julia Hörnle

Jurisdiction is the foundational concept for both national laws and international law as it provides the link between the sovereign government and its territory, and ultimately its people. The internet challenges this concept at its root: data travels across the internet without respecting political borders or territory. This book is about this Jurisdictional Challenge created by internet technologies. The Jurisdictional Challenge arises as civil disputes, criminal cases, and regulatory action span different countries, rising questions as to the international competence of courts, law enforcement, and regulators. From a technological standpoint, geography is largely irrelevant for online data flows and this raises the question of who governs “YouTubistan.” Services, communication, and interaction occur online between persons who may be located in different countries. Data is stored and processed online in data centres remote from the actual user, with cloud computing provided as a utility. Illegal acts such as hacking, identity theft and fraud, cyberespionage, propagation of terrorist propaganda, hate speech, defamation, revenge porn, and illegal marketplaces (such as Silkroad) may all be remotely targeted at a country, or simply create effects in many countries. Software applications (“apps”) developed by a software developer in one country are seamlessly downloaded by users on their mobile devices worldwide, without regard to applicable consumer protection, data protection, intellectual property, or media law. Therefore, the internet has created multi-facetted and complex challenges for the concept of jurisdiction and conflicts of law. Traditionally, jurisdiction in private law and jurisdiction in public law have belonged to different areas of law, namely private international law and (public) international law. The unique feature of this book is that it explores the notion of jurisdiction in different branches of “the” law. It analyses legislation and jurisprudence to extract how the concept of jurisdiction is applied in internet cases, taking a comparative law approach, focusing on EU, English, German, and US law. This synthesis and comparison of approaches across the board has produced new insights on how we should tackle the Jurisdictional Challenge. The first three chapters explain the Jurisdictional Challenge created by the internet and place this in the context of technology, sovereignty, territory, and media regulation. The following four chapters focus on public law aspects, namely criminal law and data protection jurisdiction. The next five chapters are about private law disputes, including cross-border B2C e-commerce, online privacy and defamation disputes, and internet intellectual property disputes. The final chapter harnesses the insights from the different areas of law examined.


2018 ◽  
Vol 14 (2) ◽  
pp. NP1-NP2

James E.K. Parker, Towards an Acoustic Jurisprudence: Law and the Long Range Acoustic Device, Law, Culture and the Humanities (LCH). DOI: 10.1177/1743872115615502 The following corrections have been made to the article: Under heading III.1, another paragraph has been added. This paragraph begins ‘Whereas normal loudspeaker works…’ Under heading III.2, a paragraph has been edited: ‘In effect, what ATC did with the LRAD…’ Under heading III.2, the first sentence of the last paragraph has been expanded to clarify that the G-20 summit was held in Pittsburgh: The LRAD seems to have been used by police for the first time in Georgia in 2007, before receiving its first and most notorious outing on American soil in September 2009 at protests relating to the G-20 Summit being held in Pittsburgh.66 Under heading III.4, the sentence below in the second paragraph has been changed as follows: The law of property provides the conditions for the circulation and ownership of knowledge that enable developments in the science of acoustics at a US university in the 1950s to re-emerge as failed commercial prototypes in Japan in the 1980s only to be taken up again in 1996 by ACT before being patented, trademarked and marketed first as HSS® and then as the LRAD.82 Under heading III.4, the following has been added to the end of the paragraph ‘If the LRAD was originally imagined…’: Not that the presiding judge in the Toronto case would know however. In his discussion of a deposition by Professor David Wood, of Queen’s University, relating to ‘videos posted on the internet’ documenting the LRAD’s use at Pittsburgh, Justice Brown notes that, ‘unfortunately, Professor Wood did not attach any of those media reports or videos as exhibits to his affidavit. As a result, I cannot attach any weight to his statements.’93 Indeed, it’s not clear that any recordings of an LRAD in action were ever actually played in court. As far as I know, the LRAD has yet to feature in the ‘judicial soundscape’. In the conclusion the word ‘copyright’ has been replaced with ‘intellectual property’: The LRAD is the product of diverse institutions, jurisdictions and areas of doctrine, stretching from the law of intellectual property through the law of war to constitutional and labor law. The references and reference numbers have been updated accordingly. All the subsequent versions of the article will be corrected.


Author(s):  
Юрий Юмашев ◽  
Yuriy Yumashev ◽  
Елена Постникова ◽  
Elena Postnikova

The article deals with international law aspects of the GCL. To this aim firstly the international conventions on copyright law are analyzed, in particular: the Berne Convention for the Protection of Literary and Artistic Works in the wording of the Paris Act of 1971, the Convention on the Establishment of the World Intellectual Property Organization of 1967, the Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organizations of 1961 and Aspects of intellectual property rights (TRIPS) 1994. There is also an analysis of the EU copyright law in terms of its correlation with the law of the EU member-states and an assessment of its evolution. It is emphasized that the core fact of origin of authorship is determined on the basis of the national legislation of the Member-States. Special attention is paid to the scope of the “principle of exhausted rights”. The article also touches upon the aspect of private international law. Particular attention is paid to the legal regulation of the Internet, including Internet providers, and its impact on the formation of the GCL. The problem of combating Internet piracy is also raised, as copyright infringement often occurs in relation to works published online. In addition, the article revealed what changes were made to the GCL to comply with EU law (including secondary law acts and the practice of the EU Court). The result of the study is, among other things, the conclusion that special legal mechanisms should be developed to regulate new forms of selling works that have emerged as a result of technological progress and in the near future the Internet will undoubtedly form ways for the further development of the GCL. However, this process can negatively affect the leading role of the author as a creative person.


2021 ◽  
Vol 10 (1) ◽  
pp. 493-500
Author(s):  
Roshidi Din ◽  
Reema Ahmed Thabit ◽  
Nur Izura Udzir ◽  
Sunariya Utama

The enormous development in the utilization of the Internet has driven by a continuous improvement in the region of security. The enhancement of the security embedded techniques is applied to save the intellectual property. There are numerous types of security mechanisms. Steganography is the art and science of concealing secret information inside a cover media such as image, audio, video and text, without drawing any suspicion to the eavesdropper. The text is ideal for steganography due to its ubiquity. There are many steganography embedded techniques used Arabic language to embed the hidden message in the cover text. Kashida, Shifting Point and Sharp-edges are the three Arabic steganography embedded techniques with high capacity. However, these three techniques have lack of performance to embed the hidden message into the cover text. This paper present about traid-bit method by integrating these three Arabic text steganography embedded techniques. It is an effective way to evaluate many embedded techniques at the same time, and introduced one solution for various cases.


2018 ◽  
Vol 1 (1) ◽  
pp. 59
Author(s):  
Dyah Puspita Srirahayu

Many works - works the academic community that has not been published so that the intellectual property of an educational institution is not widely known by the general public. Institutional repository created and used to manage the results of these works that can be accessed by all people. This study aimed to describe the institutional repository of high perguruang country in Java Timursebagai container to the intellectual academic community views of content, the software used unit that houses, and ratings on Webometrik. This study uses a quantitative approach with descriptive methods. The population used in this study are all the institutional repository of public universities in East Java, which already are online. The sampling technique is the total sampling. The results of this study found that 50% of state universities in East Java has an IR that can be accessed via the internet, 100% of existing IR content is scientific output, the software used various existing GDL, DSpace, Eprints and others, and IR state universities in Java East 66.7% was ranked in webometrik


Sign in / Sign up

Export Citation Format

Share Document