democratic character of society.' Margaret Jane Radin and Polk Wagner, 'The Myth of Private Ordering: Rediscovering Legal Realism in Cyberspace,' Chicago-Kent Law Review 73 (1998); Margaret Jane Radin, Reinterpreting Property (Chicago: University of Chicago Press, 1993), 56–63. Pam Samuelson, 'Encoding the Law into Digital Libraries,' Communications of the ACM 41 (1999): 13, 13–14; Pamela Samuelson, foreword to 'Symposium: Intellectual Property and Contract Law for the Information Age,' California Law Review 87 (1998): 1; Pamela Samuelson observes in 'Embedding Technical Self-Help in Licensed Software' (Communications of the ACM 40 [1997]: 13, 16) that 'licensors of software or other information . . . will generally invoke selfhelp'; see also the criticism of the European database directive in J. H. Reichman and Pamela Samuelson, 'Intellectual Property Rights in Data?,' Vanderbilt Law Review 50 (1997): 51, 84–95; Samuelson, 'The Copyright Grab,' 134; Pamela Samuelson, 'Fair Use for Computer Programs and Other Copyrightable Works in Digital Form: The Implications of Sony, Galoob and Sega,' Journal of Intellectual Property Law 1 (1993): 49. There is much more that I have learned from in the last seven years. But rather than repli cating the listing style, I would point to Jessica Litman, Digital Copyright: Protecting Intellectual Property on the Internet (Amherst, N.Y.: Prometheus Books, 2000); Vaidhyanathan, Copyrights and Copywrongs; William Fisher, Promises to Keep: Technology, Law, and the Future of Entertainment (Stanford: Stanford University Press, 2004), and Benkler, The Wealth of Networks .

69.

Boyle, Shamans, Software, and Spleens . For other compelling accounts of the general movement to propertize information, see Debora J. Halbert, Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights (Westport, Conn.: Quorum, 1999). Seth Shulman's Owning the Future (Boston: Houghton Mifflin, 1999) gives the story its appropriate drama. Internet Publishing and Beyond: The Economics of Digital Information and Intellectual Property (Brian Kahin and Hal R. Varian, eds., Cambridge, Mass.: MIT Press, 2000) (Internet publishing and intellectual property). A Handbook of Intellectual Property Management: Protecting, Developing and Exploiting Your IP Assets (Adam Jolly and Jeremy Philpott eds. London: Kogan Page, 2004) (intellectual property and intangible property).

70.

'We favor a move away from the author vision in two directions; first towards recog nition of a limited number of new protections for cultural heritage, folkloric productions, and biological `know-how.' Second, and in general, we favor an increased recognition and protection of the public domain by means of expansive `fair use protections,' compulsory licensing, and narrower initial coverage of property rights in the first place'; Boyle, Shamans, Software, and Spleens, 169.

71.

James Boyle, 'A Politics of Intellectual Property: Environmentalism for the Net?,' Duke Law Journal 47 (1997): 87.

Chapter Eleven Notes

1.

See Jonathan Zittrain, 'What the Publisher Can Teach the Patient: Intellectual Property and Privacy in an Era of Trusted Privication,' Stanford Law Review 52 (2000): 1201.

2.

Olmstead v. United States, 277 US 438 (1928).

3.

International News Service v. Associated Press, 248 U.S. 215, 250 (1918) (Brandeis, dis senting).

4.

Declan MCullagh and Elinor Mills collected the practices of all major search engines in 'Verbatim: Search Firms Surveyed on Privacy,' CNET NEWS, February 3, 2006, available at http://news.com.com/2100-1025_3-6034626.html (cached: http://www.webcitation.org/5J6iacy4N).

5.

Stefik, The Internet Edge , 20.

6.

The government too can snoop on e-mail conversation, but only with a warrant. Ordi narily, notice of the snooping is required. But the government can get a 90 day delay on giving that notice. See US Code Title 18, Section 2705(a)(i).

7.

See Richard Posner, 'Our Domestic Intelligence Crisis,' Washington Post, December 21, 2005, available at http://www.washingtonpost.com/wp- dyn/content/discussion/2005/12/20/DI2005122001142.html (cached: http://www.webcitation.org/5J6idb3Ng).

8.

See, e.g., L. Grossman, 'Welcome to the Snooper Bowl,' Time , February 12, 2001, avail able at http://www.time.com/time/archive/preview/0,10987,999210,00.html (cached: http://www.webcitation.org/5J6ihTfJH); D. McCullagh, 'Call It Super Bowl Face Scan I,'

Вы читаете Code 2.0
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×