Computer Law Seminar Readings


Many of these materials were written for lawyers, which means they presume some familiarity with legal terms and concepts. Of course I encourage you to note unfamiliar terms and bring them to class so I can (try to) clarify them.

Most of these references are available on-line, but some will be available only on paper. Access instructions for paper materials appear below.

Access to some of the electronic references may be restricted to the UCI community (which is an example of intellectual property law in practice). The URLs to those references will work from computers at UCI. If you (as a UCI student) want access from off campus, you'll need to set up a Virtual Private Network (VPN) using free software available from UCI's NACS (for Windows, Linux, or MacOS X). NACS has a page describing how to download and install the VPN software: http://www.nacs.uci.edu/security/vpn.html .

The readings come from a variety of sources, such as:

  1. Sources of Law [This section is for reference; it's not an assignment]
    1. Federal
      1. U.S. Constitution: http://www.findlaw.com/casecode/constitution/
      2. Legislation and Statutes
        1. U. S. Code: http://uscode.house.gov/usc.htm or http://www4.law.cornell.edu/uscode/ or http://www.access.gpo.gov/congress/cong013.html
        2. Legislation in progress: http://thomas.loc.gov/
      3. Courts
        1. U. S. Supreme Court opinions: http://www.findlaw.com/casecode/supreme.html
        2. U.S. Circuit Courts of Appeal: http://www.findlaw.com/casecode/courts/index.html
    2. California
      1. Legislation and Statutes: http://www.leginfo.ca.gov/calaw.html
      2. Court opinions:
        1. Filed in the last 60 days: http://www.courtinfo.ca.gov/opinions/
        2. Older opinions (fee-based): http://www.westlaw.com/
    3. International
      1. The World Intellectual Property Organization (http://www.wipo.int/)
      2. European Community, Directive on privacy and electronic communications, 12 July 2002.
    4. Lexis access: The Lexis system was one of the first full-text-searchable databases, first available about 30 years ago. Access is available to the UCI community at http://web.lexis-nexis.com/universe . You can search here for cases and statutes.
    5. The meaning of legal terms goes beyond the plain English meaning of the words. Even a law dictionary won't give you all the nuances and applications of a legal term, but law dictionaries are a place to start. Two on-line law dictionaries are at dictionary.law.com and dictionary.findlaw.com.
  • Computer Law—General [for reference; not an assignment]
    1. There are good, short, reasonably current overviews of many legal topics at http://lp.findlaw.com , which also provides access to statutes and reported cases (i.e., appellate court opinions).

    2. NGOs (non-governmental organizations) often follow legislation and pending cases in their areas of interest.
      1. The ACM has a public policy office and web site: http://www.acm.org/usacm/
      2. The Electronic Frontier Foundation (http://www.eff.org/) addresses a wide range of computing-related legal and policy issues.
      3. The Recording Industry Association of America (http://www.riaa.com/) and the Motion Picture Association of America (http://www.mpaa.org/) take an industry perspective.
      4. The Electronic Privacy Information Center (http://www.epic.org) covers privacy issues, as does the American Civil Liberties Union (http://www.aclu.org/).

    3. Three notable law professors who address cyberlaw issues:
      1. Larry Lessig at Stanford (http://www.lessig.org/)
      2. Pamela Samuelson at Berkeley (http://www.sims.berkeley.edu/~pam/)
      3. Eugene Volokh at UCLA (http://www1.law.ucla.edu/~volokh/)

  • Intellectual Property—General [for reference]
    1. Patent
      1. U. S. Patent and Trademark Office: http://www.uspto.gov/
      2. Patent Act: http://www.law.cornell.edu/uscode/35/
      3. USPTO Patent Database: http://www.uspto.gov/patft/index.html
      4. Delphion Intellectual Property Network Patent Database: http://www.delphion.com/
      5. USPTO examiners' guidelines for computer-related inventions: http://www.uspto.gov/web/offices/com/hearings/software/analysis/
    2. Copyright
      1. U.S. Copyright Office: http://lcweb.loc.gov/copyright/
      2. Copyright Act: http://www.law.cornell.edu/uscode/17/
      3. Digital Millennium Copyright Act of 1998 summary: http://lcweb.loc.gov/copyright/legislation/dmca.pdf
    3. Trade Secret
      1. Trade Secret Home Page: http://www.execpc.com/~mhallign/
    4. Trademark
      1. U. S. Patent and Trademark Office trademark database: http://tess.uspto.gov
  • Additional Readings

    1. [Patent] The Amazon.com one-click patent (No. 5,960,411). This link shows an HTML-friendly version of the patent. From that page, click the "Images" link to see what the real patent application looks like. Don't feel obligated to read through the entire patent application, but look it over (especially the front page and the claims).[Patent]

    2. [Copyright] Lothar Determann, "Dangerous Liaisons—Software Combinations as Derivative Works? Distribution, Installation, and Execution of Linked Programs under Copyright Law, Commercial Licences, and the GPL," 21 Berkeley Tech. L. J. (2006)

    3. [Copyright] Timothy K. Armstrong, "Digital Rights Management and the Process of Fair Use," 20 Harvard J. Law Tech. 49 (2006)

    4. [Copyright] U.S. Copyright Office Circular 61 on registration for computer programs: http://www.copyright.gov/circs/circ61.pdf

    5. [Copyright] Stacey M. Lantagne, The Morality of MP3s: The Failure of the Recording Industry's Plan of Attack, 18 Harvard J. Law Tech. 269 (2004)

    6. [Copyright] Rowling vs. RDR Books involves the author of the Harry Potter books, J.K. Rowling, and the publisher of an unauthorized Harry Potter encyclopedia that appeared first on the Internet. To give you an idea of what the documents in a lawsuit look like, Rowling's original complaint, Rowling's brief for an injunction, RDR's brief in opposition, Rowling's reply, and transcripts of the trial (day 2, day 3)are available.

    7. [Open Source] Ronald J. Mann, "Commercializing Open Source Software: Do Property Rights Still Matter?" 20 Harvard J. Law Tech. 1 (2006)

    8. [Jurisdiction] Yvonne A. Tamayo, Catch Me If You Can: Serving United States Process On An Elusive Defendant Abroad, 17 Harvard J. Law Tech. 211 (2003)

    9. [Contracts] Pro CD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996). An actual appellate opinion, mercifully short, holding that "[s]hrinkwrap licenses are enforceable unless their terms are objectionable on grounds applicable to contracts in general (for example, if they violate a rule of positive law, or if they are unconscionable)."

    10. [Liability for Malfunction] Meiring de Villiers, Virus Ex Machina: Res Ipsa Loquitur, 2003 Stan Tech. L. Rev. 1

    11. [Privacy] Who Knows Where You've Been? Privacy Concerns Regarding the Use of Cellular Phones as Personal Locators, 18 Harvard J. Law Tech. 307 (2004)

    12. [Privacy] Gail Lasprogata, Nancy J. King, Sukanya Pillay, Regulation of Electronic Employee Monitoring: Identifying Fundamental Principles of Employee Privacy through a Comparative Study of Data Privacy Legislation in the European Union, United States and Canada, 2004 San. Tech. L. Rev. 4. There are options for on-line and off-line reading.

    13. [Internet] Harry A. Valetk, Mastering the Dark Arts of Cyberspace: A Quest for Sound Internet Safety Policies, 2004 Stan Tech. L. Rev. 2 (2004)

    14. [Internet] Greg Lastowka, "User-Generated Content & Virtual Worlds". Vanderbilt Journal of Entertainment and Technology Law, Forthcoming (2008). Available at SSRN: http://ssrn.com/abstract=1094048

    15. [Evidence] California Evidence Code sec. 1552 (the authenticity of computer-based information)

    16. [Evidence] Zubulake v. UBS Warburg LLC, 217 F.R.D. 309 (S.D.N.Y. 2003) (Electronic discovery of e-mail). You can find this in LEXIS through the UCI Library.

    17. [Free Speech] Ken S. Myers, "Wikimmunity: Fitting the Communications Decency Act to Wikipedia," 20 Harvard J. Law Tech. 163 (2006)

    18. [Computer Crime] California Penal Code sec. 502 and 502.01 (the California computer crime law). You'll have to scroll down the page to find these sections.

    19. [Computer Crime] Chris Jay Hoofnagle, "Identity Theft: Making the Known Unknowns Known," 21 Harvard J. Law Tech. (2007)

    20. [Computer Crime] Jay Becker, "Rifkin: A Documentary History," Computer/Law Journal (Summer 1980). This includes the full paper record of the multi-million-dollar electronic theft from Security Pacific National Bank, including the defendant's gulity-plea interview with the judge. This is only available on paper; the packet looks large, but the print is not dense. You can find this packet on the table in the Technology Garden, room 5054 Donald Bren Hall. There's a nice couch there where you can read it; if you take it away to read elsewhere, leave a note so a classmate won't look in vain. (The packet is bound with a large black metal clip; there may be some delay in its availabilty.)

    21. [Law Practice] Jonathan Jenkins, "What Can Information Technology Do for Law?" 21 Harvard J. Law Tech. (2008)


    David G. Kay, kay@uci.edu