Computer Law Seminar Readings
This list of assigned readings will grow as
the quarter progresses. We'll mark new additions conspicuously; a few
marked
have been added as of June 1. Some of the listings here are not assignments;
they're there for reference (and may be useful as you look into your
project topics).
Many of these materials were written for lawyers,
which means they presume some familiarity with legal terms and concepts.
Of course I encourage you to note unfamiliar terms and bring them to class
so I can (try to) clarify them.
Most of these references are available on-line,
but some will be available only on paper. Access instructions for paper
materials appear below.
Access to some of the electronic references
may be restricted to the UCI community (which is an example of intellectual
property law in practice). The URLs to those references will work from
computers at UCI. If you (as a UCI student) want access from off campus,
you'll need to set up a Virtual Private Network (VPN) using free software
available from UCI's NACS (for Windows, Linux, or MacOS X). NACS has
a page describing how to download and install the VPN software: http://www.nacs.uci.edu/security/vpn.html
.
The readings come from a variety of sources,
such as:
-
Law review article--a law review is a publication
containing scholarly articles about the law, typically written by law professors
(for the main articles) or law students (for the shorter articles, often
designated "Note" or "Comment"). Law reviews are roughly
akin to academic journals in CS, except that they're edited at law schools
by law students. A citation with "L.R" or "L.J." in
the title, especially along with a law school name, is probably a law review.
Law review articles are among the most intensively documented publications
in the world; every assertion is backed up with a citation in a footnote.
A tongue-in-cheek metric of the scholarly quality of a law review article
is the extent to which the volume of the footnotes exceeds the volume of
the main document.
-
Popular media article--Newspaper and magazine
articles tend to be accessible, since they're written for non-lawyers,
but they're subject to the problems we discussed in class (incompleteness,
oversimplification, technical inaccuracy, focus on sensational facts over
legal issues).
-
Article in a professional publication--Articles
for computing professionals (e.g., in the Communications of the ACM)
or for legal professionals (e.g., in the ABA Journal from the American
Bar Association) often hit a good balance between accessibility and accuracy.
-
Sources of Law [This section is for
reference; it's not an assignment]
-
Federal
-
U.S. Constitution: http://www.findlaw.com/casecode/constitution/
-
Legislation and Statutes
-
U. S. Code: http://uscode.house.gov/download/download.php
or http://www.gpoaccess.gov/uscode/index.html
or http://uscode.house.gov/search/criteria.php
or http://www4.law.cornell.edu/uscode/
-
Legislation in progress: http://thomas.loc.gov/
-
Courts
-
U. S. Supreme Court opinions: http://www.findlaw.com/casecode/supreme.html
-
U.S. Circuit Courts of Appeal: http://www.findlaw.com/casecode/courts/index.html
-
California
-
Legislation and Statutes: http://www.leginfo.ca.gov/calaw.html
-
Court opinions:
-
Filed in the last 60 days: http://www.courtinfo.ca.gov/opinions/
-
Older opinions: http://www.findlaw.com/cacases/
or http://www.westlaw.com/ (fee-based)
-
International
-
The World Intellectual Property Organization
(http://www.wipo.int/)
-
Lexis access: The Lexis system was one of
the first full-text-searchable databases, first available about 30 years
ago. Access is available to the UCI community at http://web.lexis-nexis.com/universe
. You can search here for cases and statutes.
-
Computer Law--General [for reference;
not an assignment]
-
There are good, short, reasonably current
overviews of many legal topics at http://www.findlaw.com
, which also provides access to statutes and reported cases (i.e., appellate
court opinions).
-
NGOs (non-governmental organizations) often
follow legislation and pending cases in their areas of interest.
-
The ACM has a public policy office and web
site: http://www.acm.org/usacm/
-
The Electronic Frontier Foundation (http://www.eff.org/)
addresses a wide range of computing-related legal and policy issues.
-
The Recording Industry Association of America
(http://www.riaa.com/) and the Motion
Picture Association of America (http://www.mpaa.org/)
take an industry perspective.
-
The Electronic Privacy Information Center
(http://www.epic.org) covers privacy issues,
as does the American Civil Liberties Union (http://www.aclu.org/).
-
Three notable law professors who address cyberlaw
issues:
-
Larry Lessig at Stanford (http://www.lessig.org/)
-
Pamela Samuelson at Berkeley (http://www.sims.berkeley.edu/~pam/)
-
Eugene Volokh at UCLA (http://www1.law.ucla.edu/~volokh/)
-
Intellectual Property--Patent
-
Patent sources and references [for reference,
not an assignment]
-
U. S. Patent and Trademark Office: http://www.uspto.gov/
-
USPTO Patent Database: http://www.uspto.gov/patft/index.html
-
The Amazon.com one-click patent
(No. 5,960,411). This link shows an HTML-friendly version of the patent.
From that page, click the "Images" link to see what the real
patent application looks like. Don't feel obligated to read through
the entire patent application, but look it over (especially the front page
and the claims).
-
The Patent Office examination guidelines for
computer-related inventions: http://www.uspto.gov/web/offices/pac/compexam/examcomp.htm
-
David S. Almeling, Patenting Nanotechnology:
Problems with the Utility Requirement, 2004 Stan. Tech. L. Rev. N1 (2004).
-
Intellectual Property--Copyright
-
U.S. Copyright Office [for reference]: http://www.
copyright.gov/
-
U.S. Copyright Office Circular 61 on computer
programs: http://www.copyright/gov/circs/circ61.pdf
-
Stacey M. Lantagne, The Morality of MP3s:
The Failure of the Recording Industry's Plan of Attack, 18 Harvard
J. Law Tech. 269 (2004)
-
Intellectual Property--Trade Secret and
Trademark
-
Trade Secret Home Page
has a variety of trade secret information [for reference, not an assignment]
-
Jurisdiction
-
Yvonne A. Tamayo, Catch Me If You Can:
Serving United States Process On An Elusive Defendant Abroad, 17 Harvard
J. Law Tech. 211 (2003)
-
Contracts
-
Pro CD, Inc. v. Zeidenberg,
86 F.3d 1447 (7th Cir. 1996). An actual appellate opinion, mercifully short,
holding that "[s]hrinkwrap licenses are enforceable unless their terms
are objectionable on grounds applicable to contracts in general (for example,
if they violate a rule of positive law, or if they are unconscionable)."
-
Liability for Malfunction
-
Meiring de Villiers, Virus Ex Machina: Res Ipsa Loquitur,
2003 Stan Tech. L. Rev. 1
-
Privacy
-
Who Knows Where You've Been?
Privacy Concerns Regarding the Use of Cellular Phones as Personal Locators,
18 Harvard J. Law Tech. 307 (2004)
-
Gail Lasprogata, Nancy J. King, Sukanya Pillay,
Regulation of Electronic Employee Monitoring:
Identifying Fundamental Principles of Employee Privacy through a Comparative
Study of Data Privacy Legislation in the European Union, United States and
Canada, 2004 San. Tech. L. Rev. 4. There are options for on-line and off-line
reading.
-
Harry A. Valetk, Mastering the Dark Arts of Cyberspace:
A Quest for Sound Internet Safety Policies, 2004 Stan Tech. L. Rev. 2 (2004)
-
Jerry Kang and Benedikt Buchner, Privacy in Atlantis,
18 Harvard J. Law Tech. 229 (2004)
-
European Community, Directive on privacy and electronic communications,
12 July 2002.
-
Litigation and Evidence
-
California Evidence Code sec. 1552
(the authenticity of computer-based information)
-
Zubulake v. UBS Warburg LLC, 217 F.R.D. 309
(S.D.N.Y. 2003) (Electronic discovery of e-mail). You can find this in
LEXIS through the UCI Library.
-
Computer Crime
-
California Penal Code sec. 502 and 502.01
(the California computer crime law). You'll have to scroll down the
page to find these sections.
-
Jay Becker, "Rifkin: A Documentary History,"
Computer/Law Journal (Summer 1980). This includes the full paper record
of the multi-million-dollar electronic theft from Security Pacific National
Bank, including the defendant's gulity-plea interview with the judge.
This is only available on paper; the packet looks large, but the print
is not dense. You can find this packet on the bookshelf in my outer office,
CS 406, which is generally open during business hours. There's a nice
couch there where you can read it; if you take it away to read elsewhere,
leave a note so a classmate won't look in vain. (The packet is on the
bookshelf near the blackboard, bound with a large black metal clip.)
David G. Kay,
406B Computer Science
University of California, Irvine
Irvine, CA 92697-3425
-- (949) 824-5072
-- Fax (949) 824-4056
-- Email
kay@uci.edu
Tuesday, June 7, 2005 -- 7:27 AM