Computer Law Seminar Readings
This list of readings will grow as
the quarter progresses. We'll mark new additions conspicuously.
Many of these materials were written for lawyers,
which means they presume some familiarity with legal terms and concepts.
Of course I encourage you to note unfamiliar terms and bring them to class
so I can (try to) clarify them.
Most of these references are available on-line,
but some will be available only on paper. Access instructions for paper
materials appear below.
Access to some of the electronic references
may be restricted to the UCI community (which is an example of intellectual
property law in practice). The URLs to those references will work from
computers at UCI. If you (as a UCI student) want access from off campus,
you'll need to set up a Virtual Private Network (VPN) using free software
available from UCI's NACS (for Windows, Linux, or MacOS X). NACS has
a page describing how to download and install the VPN software: http://www.nacs.uci.edu/security/vpn.html
The readings come from a variety of sources,
Law review article—a law review is a publication
containing scholarly articles about the law, typically written by law professors
(for the main articles) or law students (for the shorter articles, often
designated "Note" or "Comment"). Law reviews are roughly
akin to academic journals in CS, except that they're edited at law schools
by law students. A citation with "L.R" or "L.J." in
the title, especially along with a law school name, is probably a law review.
Law review articles are among the most intensively documented publications
in the world; every assertion is backed up with a citation in a footnote.
A tongue-in-cheek metric of the scholarly quality of a law review article
is the extent to which the volume of the footnotes exceeds the volume of
the main document.
Popular media article—Newspaper and magazine
articles tend to be accessible, since they're written for non-lawyers,
but they're subject to the problems we discussed in class (incompleteness,
oversimplification, technical inaccuracy, focus on sensational facts over
legal issues, lack of long-term follow-up).
Article in a professional publication—Articles
for computing professionals (e.g., in the Communications of the ACM)
or for legal professionals (e.g., in the ABA Journal from the American
Bar Association) often hit a good balance between accessibility and accuracy.
Sources of Law [This section is for
reference; it's not an assignment]
- U.S. Constitution: http://www.findlaw.com/casecode/constitution/
- Legislation and Statutes
- U. S. Code: http://uscode.house.gov/usc.htm or http://www4.law.cornell.edu/uscode/ or http://www.access.gpo.gov/congress/cong013.html
- Legislation in progress: http://thomas.loc.gov/
- U. S. Supreme Court opinions: http://www.findlaw.com/casecode/supreme.html
- U.S. Circuit Courts of Appeal: http://www.findlaw.com/casecode/courts/index.html
- Legislation and Statutes: http://www.leginfo.ca.gov/calaw.html
- Court opinions:
- Filed in the last 60 days: http://www.courtinfo.ca.gov/opinions/
- Older opinions (fee-based): http://www.westlaw.com/
- The World Intellectual Property Organization
- European Community, Directive on privacy and electronic communications,
12 July 2002.
- Lexis access: The Lexis system was one of
the first full-text-searchable databases, first available about 30 years
ago. Access is available to the UCI community at http://web.lexis-nexis.com/universe . You can search here for cases and statutes.
- The meaning of legal terms goes beyond the plain English meaning of the words. Even a law dictionary won't give you all the nuances and applications of a legal term, but law dictionaries are a place to start. Two on-line law dictionaries are at dictionary.law.com and dictionary.findlaw.com.
Computer Law—General [for reference;
not an assignment]
There are good, short, reasonably current
overviews of many legal topics at http://lp.findlaw.com
, which also provides access to statutes and reported cases (i.e., appellate
NGOs (non-governmental organizations) often
follow legislation and pending cases in their areas of interest.
The ACM has a public policy office and web
The Electronic Frontier Foundation (http://www.eff.org/)
addresses a wide range of computing-related legal and policy issues.
The Recording Industry Association of America
(http://www.riaa.com/) and the Motion
Picture Association of America (http://www.mpaa.org/)
take an industry perspective.
The Electronic Privacy Information Center
(http://www.epic.org) covers privacy issues,
as does the American Civil Liberties Union (http://www.aclu.org/).
Three notable law professors who address cyberlaw
Larry Lessig at Stanford (http://www.lessig.org/)
Pamela Samuelson at Berkeley (http://www.sims.berkeley.edu/~pam/)
Eugene Volokh at UCLA (http://www1.law.ucla.edu/~volokh/)
- Intellectual Property—General [for reference]
- U. S. Patent and Trademark Office: http://www.uspto.gov/
- Patent Act: http://www.law.cornell.edu/uscode/35/
- USPTO Patent Database: http://www.uspto.gov/patft/index.html
- Delphion Intellectual Property Network Patent
- USPTO examiners' guidelines for computer-related
- U.S. Copyright Office: http://lcweb.loc.gov/copyright/
- Copyright Act: http://www.law.cornell.edu/uscode/17/
- Digital Millennium Copyright Act of 1998 summary: http://lcweb.loc.gov/copyright/legislation/dmca.pdf
- Trade Secret
- Trade Secret Home Page: http://tradesecretshomepage.com
- U. S. Patent and Trademark Office trademark
- [Patent] The Amazon.com one-click patent (No. 5,960,411). This link shows an HTML-friendly version of the patent.
From that page, click the "Images" link to see what the real
patent application looks like. Don't feel obligated to read through
the entire patent application, but look it over (especially the front page
and the claims).
- [Patent] In re Bilski addresses the statutory subject matter of patents, particularly what kinds of "business methods" can be patented. An opinion from the Supreme Court is expected this term.
- [Copyright] U.S. Copyright Office Circular 61 on registration for computer
- [Copyright] Rowling vs. RDR Books involves the author of the Harry Potter books, J.K. Rowling, and the publisher of an unauthorized Harry Potter encyclopedia that appeared first on the Internet. To give you an idea of what the documents in a lawsuit look like, Rowling's original complaint, Rowling's brief for an injunction, RDR's brief in opposition, Rowling's reply, and transcripts of the trial (day 2, day 3) are available.
- [Copyright] Christina J. Hayes, Changing the Rules of the Game: How Video Game Publishers Are Embracing User-Generated Derivative Works, 21 Harvard J. Law Tech. 567 (2008).
[Jurisdiction] Yvonne A. Tamayo, Catch Me If You Can:
Serving United States Process On An Elusive Defendant Abroad, 17 Harvard
J. Law Tech. 211 (2003)
- [Contracts] Pro CD, Inc. v. Zeidenberg,
86 F.3d 1447 (7th Cir. 1996). An actual appellate opinion, mercifully short,
holding that "[s]hrinkwrap licenses are enforceable unless their terms
are objectionable on grounds applicable to contracts in general (for example,
if they violate a rule of positive law, or if they are unconscionable)."
- [Liability for Malfunction]
Meiring de Villiers, Virus Ex Machina: Res Ipsa Loquitur,
2003 Stan Tech. L. Rev. 1
- [Evidence] California Evidence Code sec. 1552
(the authenticity of computer-based information)
- [Evidence] Zubulake v. UBS Warburg LLC, 217 F.R.D. 309
(S.D.N.Y. 2003) (Electronic discovery of e-mail). You can find this in
Google Scholar or via LEXIS through the UCI Library.
[Computer Crime] California Penal Code sec. 502 and 502.01 (the California computer crime law). You'll have to scroll down the
page to find these sections.
- [Computer Crime] Jay Becker, "Rifkin: A Documentary History,"
Computer/Law Journal (Summer 1980). This includes the full paper record
of the multi-million-dollar electronic theft from Security Pacific National
Bank, including the defendant's gulity-plea interview with the judge.
This is only available on paper; the packet looks large, but the print
is not dense. You can find this packet on the table in the Technology Garden, room 5054 Donald Bren Hall. There's a nice
couch there where you can read it; if you must take it away to read elsewhere,
leave a note so a classmate won't look in vain and bring it back promptly. (The packet is bound with a large black metal clip.)
- [Computer Crime] Chris Jay Hoofnagle, Identity Theft: Making the Known Unknowns Known, 21 Harvard J. Law Tech. 97 (2007).
David G. Kay,