Cover image for Law and the information superhighway
Title:
Law and the information superhighway
Personal Author:
Edition:
2nd ed
Publication Information:
New York, NY : Aspen Law & Business, 2001
ISBN:
9780735517448
General Note:
Accompanied by study guide ; 2006 cumulative supplement : KF390.5.C6 P473 2001

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010127766 KF390.5.C6 P47 2001 Reference Book 1:BOOKREF
Searching...
Searching...
30000010127767 KF390.5.C6 P473 2001 Reference Book 1:BOOKREF
Searching...

On Order

Summary

Summary

Make sure you're on the cutting edge of cyberspace law and emerging technologies. With Law And The Information Superhighway, Second Edition, you'll get detailed discussions of intellectual property, access rights, tort and criminal liability, and privacy. There's also a thorough analysis of the major legal issues that arise as the National Information Infrastructure (NII) matures. And you'll get a wealth of checklists, sample agreements, and much more! Annual updates keep pace with the rapidly changing regulatory environment, In the U.S. And internationally, As the Internet systems of the world.


Table of Contents

Preface to the Second Editionp. xxv
Preface to the First Editionp. xxvii
Acknowledgmentsp. xxxi
Short Reference Listp. xxxiii
Chapter 1 National Information Infrastructure as a Source of Legal Issuesp. 1
1.01 Introduction and Nature of Problemsp. 3
1.02 Basic Technological Terms and Conceptsp. 4
[A] Computersp. 4
[B] Networksp. 5
[C] Communicationsp. 9
[D] Softwarep. 10
[E] Compatibility and Standardsp. 10
[F] Newsgroupsp. 11
[G] World Wide Webp. 12
[H] Securityp. 13
1.03 What is the NII?p. 13
[A] Changing Information Architecturesp. 14
[B] Wireless Technologiesp. 15
[C] Cellular Telephonep. 15
[D] Personal Communications Systemsp. 16
[E] Satellite Systemsp. 17
[F] Internet as Model for the NIIp. 18
[G] Internet and Telephone Systemp. 20
[H] New Forms of Electronic Publishingp. 22
1.04 Legal Status of the Four Traditional Categoriesp. 25
1.05 Effect of Digital Phenomenap. 27
[A] Fast Replicationp. 28
[B] Computer Networksp. 28
1.06 Commercializing the Internetp. 31
1.07 What's Newp. 33
[A] Convergence of Technologiesp. 33
[B] Collapse of Old Boundariesp. 34
[C] Communications or Information Processing?p. 34
[D] Basic or Enhanced Services?p. 34
[E] Raw Information or Value-Added?p. 35
[F] Atomizationp. 35
1.08 What's Not Newp. 36
Chapter 2 Access to Networks and Facilitiesp. 39
2.01 Introduction and Description of the Problemp. 41
[A] Three kinds of Access Problemsp. 42
[B] Access by Suppliers and Consumersp. 43
[C] Common Foci of Major Legal Doctrinesp. 44
2.02 Sources of Rightp. 45
2.03 FCC Common Carrier Regulationp. 47
2.04 Who Was a Common-Law Common Carrier?p. 54
2.05 Common Law Nondiscrimination Obligationp. 60
2.06 Application of Common Carrier Principles to Digital Network Technologiesp. 61
[A] Holding-Out Factorsp. 62
[B] Market Structure Factorsp. 63
[C] Narrowed Statutory and Public Contract Dutyp. 63
2.07 Enforcing Express and Implied Contractsp. 64
2.08 Cablep. 70
2.09 Peeringp. 70
2.10 Antitrustp. 71
[A] Joint Venturesp. 72
[B] Tying Arrangementsp. 75
[C] Exclusive Dealingp. 79
[D] Vertical Exclusive Arrangementsp. 80
[E] Horizontal Exclusive Dealing Arrangementsp. 82
[F] Essential Facilitiesp. 84
[G] Monopolization: The Microsoft Casep. 90
[H] Bad Faith Assertions of Intellectual Propertyp. 90
[I] Access by Spammersp. 91
[J] Antitrust Requirements for Self-Governancep. 94
[K] Satellite Accessp. 99
2.11 Trespass and Entryp. 101
2.12 Eminent Domain and Condemnation of Intellectual Propertyp. 101
2.13 Privileges and Immunitiesp. 103
2.14 Role of Competitionp. 104
2.15 Domain Name Registration Systemsp. 105
2.16 Sample Statement of Access Rightsp. 108
2.17 Sample Access Agreementp. 109
2.18 Sample Electronic Publishing Agreementp. 110
Chapter 3 Privacyp. 111
3.01 Introduction and Description of the Problemp. 113
3.02 Legal Relationships and Interestsp. 114
3.03 Codes of Good Practicep. 118
3.04 Common-Law Invasion of Privacyp. 121
3.05 Electronic Communications Privacy Act: Background and Structurep. 128
[A] Interception, Use, and Disclosure of Communications Streamsp. 130
[B] Interception Devicesp. 135
[C] Stored Communicationsp. 136
[D] Pen Registers and Trap and Trace Devicesp. 139
[E] ECPA Cases and Hypotheticalsp. 140
[F] ECPA Remediesp. 147
[G] Carnivorep. 147
3.06 Computer Fraud and Abuse Actp. 148
3.07 Gramm-Leach-Bliley Financial Modernization Actp. 150
3.08 Cable Communications Policy Actp. 152
3.09 Privacy of Health Informationp. 154
3.10 State Data Protection Lawsp. 155
3.11 Privacy Actp. 157
3.12 Fair Credit Reporting Actp. 162
3.13 Financial Records Privacy Actp. 165
3.14 Children's Online Privacy Protection Act of 1998p. 167
3.15 Constitutional Protectionp. 170
3.16 State Statutes Limiting Insurance Information Disclosurep. 171
3.17 Effect of Unintended Disclosurep. 171
[A] Breach of Confidentialityp. 172
[B] Waiver of Attorney-Client Privilegep. 174
3.18 Seal Programs and Other Self-Regulatory Approachesp. 175
3.19 European Initiativesp. 176
3.20 Future U.S. Legal Initiativesp. 185
3.21 Spamp. 186
3.22 Basic Approaches: Property or Tort?p. 187
3.23 Transactional Records Versus Content: Data Aggregationp. 190
3.24 Compliance Proceduresp. 191
3.25 Privacy Under the 1996 Actp. 192
3.26 Procedural Issuesp. 192
3.27 Anonymityp. 193
3.28 Encryption as a Solutionp. 194
3.29 CALEAp. 195
3.30 Privacy Audit Checklistp. 197
3.31 Model Statement of Privacy Rightsp. 198
3.32 Sample Email and File Storage Agreement Provisosp. 199
Chapter 4 Liability for Harmful Communicationsp. 201
4.01 Introduction and Description of the Problemp. 203
4.02 Legal Position of Intermediariesp. 204
4.03 Early Questions of Intermediary Liability and Section 230p. 209
4.04 Types of Information Tortsp. 217
[A] Defamationp. 217
[B] Intentional or Negligent Infliction of Emotional Distressp. 218
[C] Invasion of Privacyp. 219
[D] Negligencep. 220
4.05 Third-Party Beneficiary of Contractp. 222
4.06 Intentional Interference with Contractual Relationsp. 223
4.07 Direct Infringement of Intellectual Property Rightsp. 223
4.08 Contributory Infringement of Intellectual Property Rightsp. 226
4.09 Digital Millennium Copyright Act Protection of Intermediariesp. 227
4.10 Strict Products Liabilityp. 228
[A] Publishers and Strict Liabilityp. 230
[B] Application of Strict Products Liability to Charts and Mapsp. 231
[C] Design and Manufacturing Defectsp. 233
[D] Strict Products Liability of Retailersp. 236
[1] Origins of Retailer Strict Products Liabilityp. 236
[2] Indemnification: Fault Returnsp. 238
[3] Statutory and Common-Law Reformp. 239
[E] Leasesp. 241
[F] Strict Liability and First Amendment Considerationsp. 242
4.11 Fair Credit Reporting Act Obligationsp. 243
4.12 False Advertisingp. 245
4.13 Trespassp. 250
4.14 Liability Resulting from Self-Help Remediesp. 250
[A] Tortp. 250
[B] Antitrustp. 253
4.15 Availability of Sovereign Immunityp. 254
[A] Sovereign Immunity in Generalp. 254
[B] Derivative Sovereign Immunity for Government Contractorsp. 255
[C] Privity of Contractp. 256
4.16 Liability of Employersp. 257
4.17 Model Disclaimer Languagep. 260
4.18 Notice of Lack of Control of Third Partiesp. 260
4.19 Language Disclaiming Third-Party Beneficiariesp. 261
Chapter 5 Liability for Service Failuresp. 263
5.01 Introduction and Description of the Problemp. 265
5.02 Breach of Contractp. 265
5.03 Coverage by UCC Article 2p. 266
5.04 UCITAp. 266
5.05 Warranty Conceptsp. 268
5.06 Disclaimer of Warrantiesp. 273
5.07 Statutory Immunities: Year 2000 Liabilityp. 274
5.08 Licensingp. 274
[A] Licenses and the First Sale Doctrinep. 276
[B] Licensing and Antitrustp. 276
5.09 Relationship Among Contract, Warranty, and Tort Theoriesp. 280
5.10 Checklist for License Agreementp. 287
5.11 Negligence Standards in Evaluating Breachp. 288
5.12 Warranties and Usage of Tradep. 289
5.13 Disclaimers of Warranties in Computer Casesp. 291
5.14 Fraudulent Misrepresentationp. 296
[A] Fraud in the Inducementp. 301
5.15 Consumer Protection Principlesp. 302
5.16 Electronic Regulation of Performancep. 308
5.17 Minor System Failuresp. 309
5.18 Damages Generallyp. 309
5.19 Tariff Limitationsp. 315
5.20 Model Disclaimer Languagep. 318
Chapter 6 Constitutional Considerationsp. 325
6.01 Overview of Constitutional Conceptsp. 327
6.02 First Amendment: Introductionp. 328
[A] State Action Requirementp. 331
[B] Expressive Versus Functional Speech or Conductp. 332
[C] Commercial Speechp. 333
[D] Least Restrictive Meansp. 336
6.03 First Amendment as a Shield: Blocking Access Dutiesp. 336
6.04 First Amendment as Limitation on Private Rights and Remediesp. 339
[A] Indecent Conductp. 340
[B] Telephone Company Video Production for Cablep. 344
[C] Limiting Liability for Harmful Contentp. 345
[D] Communications Decency Act of 1996p. 347
[E] Child Online Protection Actp. 354
6.05 Prior Restraint and Copyrightp. 355
6.06 Constitutionality of Filtersp. 357
6.07 Conflict Between First Amendment and Antitrust Principlesp. 358
6.08 First Amendment as a Sword: Source of Private Dutyp. 360
6.09 Media Ride Alongp. 371
6.10 Fourth Amendment Issuesp. 371
6.11 Property Rightsp. 374
6.12 Burdens on Interstate Commercep. 376
6.13 Eminent Domain for Rights-of-Wayp. 379
6.14 Condemnation and Eminent Domain in Intellectual Propertyp. 385
Chapter 7 Regulationp. 389
7.01 Nature of the Problem and Introductionp. 391
[A] Competition's Rolep. 392
[B] Institutional Mechanisms for Price Regulationp. 396
[C] New Forms of Regulationp. 397
7.02 Legal Overviewp. 397
7.03 Telecommunications Act of 1996p. 399
7.04 Common Carrier Regulationp. 400
[A] Evolution of Title II Before 1996 Actp. 401
[B] New Duties of Telecommunications Carriers Under 1996 Act: In Generalp. 406
[C] Open Network Accessp. 408
[1] Interconnectionp. 409
[2] Access to Network Elementsp. 410
[3] Resalep. 416
[4] CMRSp. 417
[5] New Definitionsp. 417
[6] Interconnection Issuesp. 417
[D] Number Assignment and Administrationp. 418
[E] Freedom of Entryp. 418
[F] Universal Servicep. 419
[G] Compatibility and Standardsp. 420
[H] Cross-Subsidiesp. 421
[I] Long-Distance Freedom of Entryp. 421
[J] Electronic Publishing by BOCsp. 424
[K] Cross-Subsidy of Pay Phone Servicesp. 425
[L] Tariffsp. 425
[M] Price Cap Regulationp. 428
[N] Interexchange Access Chargesp. 430
7.05 Radio Regulationp. 433
[A] Broadcast Regulationp. 433
[B] Broadcast Regulation Under 1996 Actp. 437
[C] Other Radio Regulationp. 439
[1] Spectrum Auctionsp. 440
[2] Cellular Telephone Regulationp. 441
[3] Satellite Communicationsp. 442
[a] Direct Satellite Broadcastsp. 442
[b] Regulation of Satellite Communication Infrastructurep. 443
[4] New Wireless Servicesp. 446
7.06 Cable Regulationp. 447
[A] Cable Services Under 1996 Actp. 453
[B] Other Changes in Regulatory Structure for Cablep. 456
[C] Video Dial Tone Servicesp. 458
7.07 Antitrust Limitations on Pricingp. 460
7.08 Future Federal Legislationp. 475
7.09 Regulatory Reform in General Under 1996 Actp. 476
[A] Enforcementp. 477
[B] Disabled Accessp. 478
7.10 State Regulationp. 479
[A] Judicial Review of State Commission Interconnection Decisionsp. 481
[B] Interconnection in Generalp. 483
[C] Zoningp. 484
7.11 Actions by Other Federal Agenciesp. 484
7.12 FCC Regulation of the Internetp. 485
[A] Access to PSTN Digital Data Channelsp. 485
[B] Internet Service Provided via Cablep. 497
[C] Reciprocal Compensationp. 500
[D] Advanced Technologiesp. 501
[E] Internet Telephonyp. 506
[F] Network Self-Governancep. 506
[G] Self-Governance: Domain Name Registrationp. 519
[1] ICANN Memorandum of Understandingp. 521
[2] ICANN Dispute Resolution Machinery and Enforcement Issuesp. 528
Chapter 8 Interoperability and Compatibilityp. 531
8.01 Description of the Problem and Introductionp. 533
8.02 Infrastructure and Interoperability Requirementsp. 534
8.03 Economics of Standard Settingp. 536
8.04 Legal Framework for Imposing Standardsp. 538
[A] FCC's CEI and ONA Rulesp. 539
[B] CMRS Interconnectionsp. 540
[C] Enhanced Service Provider Obligations Under the Communications Actp. 542
[D] Address Assignmentp. 542
[E] International Wireless Standardsp. 544
[F] Encryption Infrastructurep. 544
[G] FCC Standard Setting Authorityp. 544
8.05 Private Standards Agreements Under Sherman Act with Government Involvementp. 545
[A] Private Standards Under Sherman Actp. 549
[B] Adoption of Proprietary Standards as Sherman Act Monopolization Violationsp. 552
8.06 Federal Contract Requirementsp. 554
8.07 Functional Versus Technical Standardsp. 556
Chapter 9 Electronic Commerce: Authentication and Electronic Contractingp. 559
9.01 Nature of the Problemp. 561
[A] Repudiation Examplesp. 563
[B] Contract Formationp. 564
[C] Contract Interpretationp. 569
9.02 UCITAp. 571
9.03 Electronic Signatures in Global and National Commerce Actp. 574
9.04 Uniform Electronic Transaction Act (UETA)p. 576
9.05 Agencyp. 578
9.06 Formalities: Traditional Solutions to Offer-and-Acceptance and Interpretation Problemsp. 581
[A] Statute of Frauds: Signatures and Writingsp. 584
[B] Attestationp. 586
[C] Contracts Under Sealp. 587
[D] Authenticationp. 587
[E] Notarizationp. 587
9.07 Encryption and Digital Signaturesp. 588
[A] Public Key Encryptionp. 590
[B] Certificate Authoritiesp. 592
9.08 Separate Trading Partner Agreementsp. 594
9.09 Electronic Funds Transferp. 595
[A] UCC Article 4Ap. 596
[B] Federal Reserve Regulationsp. 600
[C] Electronic Funds Transfer Actp. 602
9.10 Article 8 and the Move Away from Document-Based Commercial Transaction Systemsp. 603
9.11 Payment Mechanismsp. 605
[A] Credit Cards in the GIIp. 610
[B] Credit Card Charge Backsp. 611
9.12 Offering Securities Through the Internetp. 614
9.13 Bandwidth Tradesp. 619
9.14 Computer Votingp. 619
9.15 Electronic Auctions Under Article 9p. 619
9.16 Chattel Paper Under Article 9p. 620
9.17 Draft Language for Electronic Offers of Contractsp. 620
Chapter 10 Intellectual Propertyp. 623
10.01 The Problem: Information as a Commodityp. 625
10.02 Economics of Intellectual Propertyp. 628
10.03 Copyrightp. 630
[A] Scope of Protectionp. 632
[B] Fixation Requirementp. 639
[C] Registration and Depositp. 641
[D] Originator and Intermediary Liabilityp. 641
[E] Fair Usep. 650
[F] Misuse Defensep. 651
[G] Gatt-Tripp. 652
[H] WIPO Treatiesp. 653
[I] EC Copyright Directivep. 654
[J] 1990s New Copyright Legislationp. 655
[K] Digital Millennium Copyright Actp. 656
[1] Copying Devicesp. 662
[2] Recommended Steps to Comply with Digital Millennium Copyright Actp. 662
[L] Caching and Copyright Protectionp. 662
[M] Works for Hirep. 665
[N] Importation of Copyrighted Materialsp. 667
10.04 Trademark and Unfair Competitionp. 668
[A] Reverse Passing Offp. 675
[B] Dilutionp. 678
[C] Trademarks Under Gatt-Tripp. 679
[D] Internet Addresses (Domain Names) as Trademarksp. 680
[E] Case Law on Domain Namesp. 682
[F] Meta Data as Trademark Infringementp. 684
[G] Anti-Cybersquatting Consumer Protection Actp. 688
10.05 Trade Secretp. 689
[A] Trade Secrets Under Gatt-Tripp. 692
[B] Economic Espionage Actp. 692
10.06 Patentp. 696
[A] Patents Under Gatt-Tripp. 699
[B] Patents in the NIIp. 700
[C] Standard of Review for Patent Office Decisionsp. 702
10.07 Compatibility as Infringementp. 702
10.08 Web Page Linking/Framing as Infringementp. 703
[A] Surface Linksp. 703
[B] Deep Linksp. 705
[C] File Linksp. 706
[D] Framingp. 707
10.09 Preemptionp. 708
[A] Real Events and Factual Informationp. 712
[B] Private Enforcementp. 715
10.10 State Liability for Infringementp. 715
10.11 Alternative Protection Methodsp. 715
10.12 Proposed Legal Initiativesp. 722
10.13 Questions for Intellectual Property in the Internetp. 724
Chapter 11 Public Informationp. 727
11.01 Introduction and Description of the Problemp. 729
11.02 Dissemination Dutiesp. 734
11.03 Access Rights: Freedom of Information Actsp. 735
[A] Federal FOIAp. 736
[1] Agency Recordsp. 738
[2] Exceptions to Disclosurep. 739
[B] State Freedom of Information Lawp. 741
[C] European Freedom of Informationp. 748
[D] FOI Privacy Considerationsp. 749
[E] Sealed Materialp. 750
11.04 Intellectual Property and Exclusivityp. 751
[A] Trademark Protectionp. 756
11.05 Public Contractingp. 757
11.06 Constitutional Issuesp. 758
[A] First Amendmentp. 758
[B] Burdens on Interstate Commercep. 760
[C] Substantive Due Process and Equal Protectionp. 760
11.07 Antitrust Argumentsp. 761
11.08 International Issuesp. 763
11.09 Pricing Public Informationp. 764
11.10 Strategies for Private Sector Publishersp. 767
11.11 Internet Votingp. 768
11.12 Government Web Sitesp. 768
11.13 Draft Principles for Public Information Policyp. 768
Chapter 12 Civil Dispute Resolution and Procedurep. 771
12.01 Overviewp. 773
[A] Civil Procedure Issuesp. 773
[B] Historical Relationship Among Jurisdiction, Venue, and Choice of Lawp. 776
12.02 Personal Jurisdictionp. 779
[A] Obtaining Personal Jurisdiction over Publicationsp. 783
[1] Circulationp. 783
[2] Intentional Conduct Directed at the Forum Statep. 784
[B] Personal Jurisdiction over Internet Activitiesp. 788
[C] Jurisdiction-Licensingp. 795
12.03 Service of Processp. 796
[A] Electronic Filingp. 799
[B] Model Service of Process Rulep. 799
12.04 Venuep. 800
[A] Forum Selection Clausesp. 802
12.05 Enforcement of Judgmentsp. 804
[A] Geographic Scope of Injunctionsp. 806
[B] Provisional Relief by Injunction and Under the All Writs Actp. 811
12.06 Choice of Lawp. 812
[A] Adoption of Specialized Legal Principles for the Internetp. 819
12.07 Factual Example of Procedural Issuesp. 821
12.08 Arbitrationp. 823
[A] Alternative Dispute Resolutionp. 826
[1] Credit Card Charge Backsp. 827
[2] Ebay's Escrow and Insurance Arrangementsp. 829
[B] WIPO Proceduresp. 830
12.09 Model Forum Selection and Choice of Law Clausesp. 830
12.10 Discovery of Electronic Formatsp. 833
[A] Attorney-Client Privilegep. 834
[B] Work Product Privilegep. 834
[C] Model Request for Production of Electronic Recordsp. 835
[D] Definitions for Discovery of Electronic Informationp. 836
[E] Model Request for Productionp. 836
[1] Model Subpoena Duces Tecum Languagep. 838
[2] Model Request to Permit Entry on Landp. 839
[3] Model Motion to Quashp. 839
[4] Model Protective Orderp. 840
12.11 Evidencep. 843
[A] Admissibility of Electronic Informationp. 843
[B] Authentication in Generalp. 844
[C] Statute of Fraudsp. 844
[D] Original Documents Rulep. 848
[E] Business Records Exception to the Hearsay Rulep. 849
[F] Sample Direct and Cross-Examination Questions for Witness Authenticating Electronic Recordsp. 852
[G] Video Depositionsp. 854
[H] Demonstrative Evidencep. 858
12.12 Video Trialsp. 859
12.13 Indispensable Partiesp. 860
12.14 State Immunityp. 861
Chapter 13 Criminal Lawp. 863
13.01 Introduction and Nature of Issuesp. 865
13.02 Substantive Crimesp. 865
[A] Criminal Copyright Infringementp. 866
[B] Wire Fraudp. 866
[1] Establishing a Schemep. 868
[2] Use of the Mails or Wires in Furthering the Schemep. 869
[C] Copyright Infringement as Wire Fraudp. 871
[D] Computer Fraud and Abusep. 872
[E] Unauthorized Access and Disclosurep. 874
[F] Pornographyp. 874
[G] Transportation of Stolen Propertyp. 876
[H] Threatening Communicationsp. 877
[I] Crimes Under RICOp. 878
[J] State Crimesp. 884
13.03 Procedurep. 885
[A] Jurisdiction and Venuep. 885
[B] Extradictionp. 886
[C] Enforcement of Foreign Criminal Lawp. 887
13.04 Search Warrantsp. 889
[A] Searches and Seizures of Papers and Informationp. 890
[B] Privacy Protection Actp. 898
[C] Distinction Between Warrants and Subpoenasp. 899
[D] Obtaining Search Warrants Through Electronic Meansp. 900
[E] ECPA Procedures for Interceptionp. 901
[1] Interception of Electronic Communicationsp. 901
[2] Access to Stored Electronic Communicationsp. 904
[3] Pen-trap Surveillancep. 907
[4] Judicial Authority and Exclusionp. 907
[5] Carnivorep. 908
[F] CALEAp. 908
13.05 Foreign Intelligence Surveillance Actp. 908
13.06 Model Search Warrant Languagep. 912
13.07 Foreign Searchesp. 912
[A] U.S. Crime, Foreign Searchp. 913
[B] U.S. Search, Foreign Crimep. 918
[C] Impact of Search Not Being Authorizedp. 919
[D] Solutionsp. 922
13.08 Investigatory Datap. 923
13.09 Damages Actions Under 42 U.S.C. Section 1983 for Misuse of Criminal Justice Powersp. 925
13.10 Seizures and Forfeituresp. 926
Chapter 14 International Law and Tradep. 929
14.01 Introduction and Overviewp. 931
14.02 Institutional Arrangementsp. 932
14.03 Types of International Lawp. 937
[A] Treaty Lawp. 937
[B] Customary International Lawp. 939
[C] Jus Cogensp. 939
14.04 Relationship Between International Law and Domestic Lawp. 940
14.05 GATT and WTOp. 941
[A] Substantive WTO Provisionsp. 944
14.06 NAFTAp. 948
14.07 European Unionp. 953
[A] European E-Commerce Directivep. 962
[B] Germanyp. 964
14.08 Japanp. 964
14.09 UNCITRALp. 965
14.10 International Regulatory Institutionsp. 965
14.11 Export Controlsp. 965
[A] Litigationp. 971
[B] Legislative Initiativesp. 976
[C] National Research Council Reportp. 976
[D] Executive Branch Initiativesp. 977
14.12 Transnational Data Flow Regulationsp. 978
14.13 International Electronic Money Transferp. 978
14.14 New Structures for International Regulation of the Internetp. 982
[A] Chicago-Kent/ABA Internet Jurisdiction Projectp. 984
[B] Committee on Global Networks and Local Valuesp. 985
14.15 Competition Regulationp. 985
14.16 WIPO Trademarksp. 987
14.17 Enforcing Judgments in Other Countriesp. 987
[A] Draft Hague Judgments Conventionp. 992
14.18 International Arbitrationp. 995
[A] Model International Arbitration Clausep. 999
14.19 Access to Infrastructure in Other Countriesp. 999
14.20 Border Controlsp. 1000
[A] Screening Alternativesp. 1000
[B] Feasibility Issuesp. 1002
14.21 Cyber Warfare and Cyber Terrorismp. 1003
[A] Intelligence Gatheringp. 1003
[B] Cyber Warfare Techniquesp. 1004
[1] Virusesp. 1005
[2] Denial of Service Attacksp. 1005
[C] Legality of Cyber Warfarep. 1006
[1] Cyber Warfare as Terrorismp. 1006
[2] Cyber Warfare as Economic Sanctionsp. 1006
[3] Cyber Warfare as Use of Forcep. 1006
[4] Cyber Warfare as Jammingp. 1007
14.22 International Settlement Ratesp. 1009
[A] FCC Authorityp. 1011
[B] Basis of a Domestic Carrier's Duty to Complyp. 1011
[C] Basis of Any Duty Owed by a Foreign Carrier to Complyp. 1011
[D] International Internet Connectionsp. 1012
14.23 The Global Commonsp. 1013
14.24 U.S. Government Principlesp. 1014
14.25 Foreign Investment Controlsp. 1015
Chapter 15 Taxation of Internet Commercep. 1017
15.01 Introductionp. 1019
15.02 Taxation Within the United Statesp. 1019
15.03 Advisory Commission on Electronic Commercep. 1023
15.04 International Taxationp. 1024
Table of Casesp. 1027
Indexp. 1067