This action might not be possible to undo. Are you sure you want to continue?
The following provides a course outline, list of lecture topics and sample readings. Use the list to familiarize yourself with the range and type of materials that will be used. Please note that the full reading lists and tutorial discussion questions will be provided at the start of the course. Course Lecturer and Convener Professor Andrew Murray: Room NAB.7.26. You can find more information about Professor Murray including his teaching and research interests at: http://www.lse.ac.uk/collections/law/staff/andrew-murray.htm All Lectures will be given by Professor Murray. The tutorials will be conducted by a teaching assistant from the LSE. Introduction Welcome to this Summer School course in Cyberlaw. The course will consist of twelve three-hour lectures and twelve one-hour classes. It will examine the law and policy issues relating to a number of key aspects of the information society. At the end of the course, students should be able to: • Critically evaluate ongoing developments in law relating to information technologies • Display an understanding of how these developments relate to one another. • Examine areas of doctrinal and political debate surrounding rules and theories; • Evaluate those rules and theories in terms of internal coherence and practical outcomes; • Draw on the analysis and evaluation contained in primary and secondary sources. This course covers a selection of topics in the field of Information Technology Law. It will begin by considering the debate about the nature of the influence of information technology upon the development of new legal doctrine, moving on to consider, through topics such as data protection, computer misuse and computer evidence, copyright and digital rights management, criminal content liability and defamation, both how the law has responded to the challenges of information technologies, and the extent to which legal issues have shaped the development of information society policy. The focus will be initially on English law, although the increasingly global nature of IT law means that there are already strong EU and US legal influences
upon the English system, so comparative aspects will be introduced in places, and readings will include materials drawn from, amongst others, US law journals. This course does not require an in-depth understanding of contemporary computer technology – we are primarily interested in the implications of the use of information technology, and the intended and unintended consequences of regulating that use…
Course Materials and On-line Support This course is supported by a Moodle site. Once the course begins operation (i.e. from 23 July 2012) you will be able to access the side via http://shortcourses.moodle.lse.ac.uk. This site will contain copies of handouts and lecture slides as well as coursework requirements. It will be updated regularly and online assignments may be posted via this page. If you need instruction on using Moodle please follow the online guides at http://shortcourses.moodle.lse.ac.uk. Students will be expected to check the Moodle site on a regular basis. Course Assessment The course will be assessed by means of one two-hour unseen examination to be held during the examinations period on 10 August 2012 at a time to be advised by the Summer School Office. In addition you will be required to submit one formative essay of no more than 1500 words by Thursday of week two of teaching. Recommended Reading The recommended textbook is: Murray: Information Technology Law: The Law and Society, 2010, OUP. Texts for Reference Purposes
Bainbridge: Introduction to Information Technology Law 6th ed., 2007, Pearson. Benkler: The Wealth of Networks, 2007, Yale UP Lloyd: Information Technology Law 6th ed, 2011, OUP. Klang & Murray (eds) Human Rights in the Digital Age, 2006, Cavendish. Lessig: Code and Other Laws of Cyberspace ver.2.0, 2006, Basic Books. Edwards & Waelde (eds): Law and the Internet 3rd ed, 2009, Hart. Mayer-Schonberger: Delete: The Virtue of Forgetting in the Digital Age, 2009, Princeton UP. Murray: The Regulation of Cyberspace, 2006, Routledge. Reed (ed): Computer Law 7th ed., 2011, OUP. Reed: Internet Law: Texts and Materials 2nd Ed, 2007, CUP. Solove: Understanding Privacy, 2008 Harvard UP. Zittrain: The Future of the Internet, 2008, Allan Lane. Specialist Journals (You will need to make use of these) Berkeley Technology Law Journal (BTLJ) Computer and Telecommunications Law Review (CTLR) Duke Law & Technology Review European Journal of Law & Technology (EJLT) Harvard Journal of Law and Technology International Journal of Law and Information Technology (IJLIT) International Review of Law Computers and Technology (IRLCT) Journal of Information Law and Technology (JILT) Michigan Telecommunications and Technology Law Review Lecture Outline Week One An Introduction to IT Law Digitisation and the Information Society Subject An introduction to the subject matter and content of the course. Including an introduction to essential computer basics. Digitisation and Law. • Introducing the Internet • How the Modern Internet Functions • Higher Level Protocols • The worlds of Atoms and Bits • The Cross-border challenge of information law Can we regulate the Digital Environment? • Cyberlibertarianism and Cyberpaternalism • Lawrence Lessig’s Modalities of Regulation • Network Communitarianism Lecture Date Mon 23 July
Mon 23 July
Regulating the Digital Environment
Intellectual Property Rights – Theory and Software
Intellectual Property Rights – Peer to Peer
Intellectual Property Rights – Online Distribution
Cyberlaw and Rights – Cyber Speech, Harmful Speech & Injunctions
Cyberlaw and Rights – Obscene Speech
Cyberlaw and Rights – Cybercrime
IPRs and the Information Society • The role of IPRs • The Digital Economy Act 2010 • The Hargreaves Review Protecting Computer Software • Copyright in Computer Software. • SAS v World Programming • Software Patents • Aerotel v Telco and Macrossan’s Application Peer-to-Peer and Filesharing • Peer-to-Peer Networks • Napster v. A&M Records • MGM v. Grokster • BitTorrent • Sweden v. Neij et al. • Volume Litigation Copyright, File-linking and Aggregation • Ownership of online content • Digital Trespass & DeepLinking • Aggregation of Content • NLA v. Meltwater Cyber-Speech • Freedom of Expression and Social Responsibility • Public Interest • Superinjunctions and Twitter Defamation in Cyberspace • Digital Defamation: Publication and Republication • Digital Defamation: Liability • Digital Defamation and UGC Pornography and Hate in the Information Society • Obscenity & Pornography • Hate Speech • Child Abuse Images and Pseudo Images • Age Play • Extreme Pornography • Private Regulation of Pornographic Imagery Computer Misuse • Hacking • Viruses & Mailbombing • Denial of Service
Mon 30 July
E-Commerce – Trade Marks and Domain Names
Computer Crime • Fraud and Identity Theft • Grooming, Harassment and Cyberstalking • Cyberterrorism • Bandwidth Theft Domain Names Mon • Trade Marks in the Global August Business Environment • Trade Mark/Domain Name Disputes • The ICANN UDRP • The Nominet DRS Brand Identities and Secondary Markets • The use of Trade Marks in Advertising • Resellers and Re-importers • Sponsored Links • Secondary Markets (eBay etc) • Google France v. Louis Vuitton • Portakabin v. Primakabin Tues August
E-Commerce – Contracts and Payment
Electronic Contracts, Electronic Payments and Taxation • Contracting Informally • Formal Contracts • Electronic Payments • The Electronic Money Directive • Taxation of Ecommerce Data Privacy – The Data Protection Data Protection Act • Digitisation, Personal Data 1998 and Review and the Data Industry. • Data Protection Act 1998: Background and Structure • Conditions for Processing of Personal Data • Supervision of Data Controllers: Data Subject Rights • The Strategic Communication on a comprehensive strategy on data protection • The Draft Data Protection Regulation • Social Networking and Online Data Surveillance (Facebook
and Google) Revision Lecture
INDICATIVE READINGS Week One Digitisation and the Information Society Murray: Information Technology Law: Law and Society, Chs.1&3. Cate: Privacy in the Information Age, Ch.2. (N.B. This is available via Google Books: Search Terms “Cate Privacy in the Information Age”.) Johnson & Post: “Law and Borders – The Rise of Law in Cyberspace” 48 Stanford Law Review 1367 (1996): http://papers.ssrn.com/sol3/papers.cfm? abstract_id=535 Barlow: The Economy of Ideas: http://www.wired.com/wired/archive/2.03/economy.ideas_pr.html Regulating the Digital Environment Lessig: Code ver.2.0, Chs. 6&7: http://codev2.cc/download+remix/LessigCodev2.pdf Murray: Information Technology Law: Law and Society, Ch.4. Murray: “Nodes and Gravity in Virtual Space” (2011) 5 Legisprudence 195 Barlow, A Declaration of Independence for Cyberspace: http://memex.org/barlow.html. Intellectual Property Rights – Theory and Software MacQueen, Waelde, Laurie & Brown: Contemporary Intellectual Property: Law and Policy 2nd ed, Ch.1. Murray: Information Technology Law: Law and Society, Chs.8&9. Navitaire Inc. v. EasyJet Airline Co and Another  All ER (D) 162. SAS Institute Inc. v. World Programming Limited  EWHC 1829 (Ch). Symbian Ltd v. Comptroller General of Patents  EWCA Civ 1066 Intellectual Property Rights – Peer to Peer Murray: Information Technology Law: Law and Society, pp.233-265. Sweden v. Neij et al., Stockholms Tingsrätt No B 13301-06, 17 April 2009 Twentieth Century Fox Film Corporation & Ors v. BT  EWHC 1981 (Ch) A&M Records, Inc v. Napster, Inc 239 F 3d 1004 (9th Cir. 2001): http://cyber.law.harvard.edu/~wseltzer/napster.html MGM Studios v. Grokster 545 US 913: http://w2.eff.org/IP/P2P/MGM_v_Grokster/04-480.pdf Week Two Intellectual Property Rights – Online Distribution Murray: Information Technology Law: Law and Society, pp.83-95, 222-233, 260265.
Baden-Powell: “Think before you link: yesterday’s news – today’s copyright conundrum”  17 CTLR 25 Infopaq International A/S v. Danske Dagblades Forening (C-5/08)  FSR 20. The Newspaper Licensing Agency Ltd & Ors v. Meltwater Holding BV & Ors  EWCA Civ 890: http://www.bailii.org/ew/cases/EWCA/Civ/2011/890.html Google Inc. v Copiepresse SCRL  ECDR 5 (via Westlaw) Cyberlaw and Rights – Cyber Speech, Harmful Speech & Injunctions Murray: Information Technology Law: Law and Society, Chs.6&7. Master of the Rolls: Report of the Committee on Super-Injunctions: SuperInjunctions, Anonymised Injunctions and Open Justice 1–32: http://www.judiciary.gov.uk/Resources/JCO/Documents/Reports/superinjunction-report-20052011.pdf CTB v. News Group Newspapers Limited  EWHC 1326 (QB) Dow Jones v. Jameel  QB 946 Loutchansky v. Times Newspapers Ltd  QB 783 Cyberlaw and Rights – Obscene Speech Murray: Information Technology Law: Law and Society, Ch.14. Hornle: “Countering the dangers of online pornography - shrewd regulation of lewd content?” 2011 2 EJLT, 2011 http://ejlt.org//article/view/55/121 Murray: The Reclassification of Extreme Pornographic Images (2009) MLR 73. Nair: ‘Real porn and pseudo porn: The regulatory road’  IRLCT 223. R. v. Miller  EWCA Crim 2883. Cyberlaw and Rights – Cybercrime Murray: Information Technology Law: Law and Society, Chs.13&15. Klang: ‘Civil Disobedience Online’ 2 Journal of Information, Communication & Ethics in Society 2. Nehaluddin: Hackers’ Criminal Behaviour and Laws Related to Hacking  CTLR 159. Gillespie: Indecent images, grooming and the law  Criminal Law Review 412 Gillespie: Cyber-bullying and harassment of teenagers: the legal response  Journal of Social Welfare and Family Law 213. Week Three E-Commerce – Trade Marks and Domain Names Murray: Information Technology Law: Law and Society, pp.289-316. British Telecommunications plc. and ors v. One in a Million Ltd. and ors.  1 WLR 903. Cheung & Pun: ‘Comparative study on the liability for trade mark infringement of online auction providers’  EIPR 559 WIPO: Trademarks and the Internet (SCT/24/4) 31 Aug 2010, Annex 1 L’Oreal v. eBay  ETMR 52 (AG &CJEU) E-Commerce – Contracts and Payment
Murray: Information Technology Law: Law and Society, Chs.16&17. Riefa & Hornle: “The Changing Face of Electronic Consumer Contracts in the 21st Century: Fit for Purpose”, Ch.2 of Edwards & Waelde, Law and the Internet 3rd ed. Reed: What is a Signature? 2000 (3) JILT. http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2000_3/reed/ Kohlbach: Making Sense of Electronic Money, 2004 (1) JILT: http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2004_1/kohlbach/ E-Commerce Directive, Dir. 2000/31/EC Data Privacy – The Data Protection Act 1998 and Review Murray: Information Technology Law: Law and Society, Ch.18. Strategic Communication on a comprehensive strategy on data protection in the European Union COM(2010)609. Bohm, ‘The Phorm “Webwise” System – a Legal Analysis’, Foundation for Information Policy Research: http://www.fipr.org/080423phormlegal.pdf Gillespie: ‘Regulation of Internet Surveillance’  EHRLR 552. Garrie & Wong: ‘Social networking: opening the floodgates to “personal data”’  16 CTLR 167.