{"id":142,"date":"2004-10-06T22:07:45","date_gmt":"2004-10-07T02:07:45","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/ugasser\/2004\/10\/06\/palfrey-on-cyberlaw-digital-media\/"},"modified":"2006-12-10T10:17:34","modified_gmt":"2006-12-10T14:17:34","slug":"palfrey-on-cyberlaw-digital-media","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/ugasser\/2004\/10\/06\/palfrey-on-cyberlaw-digital-media\/","title":{"rendered":"Palfrey on Cyberlaw &amp; Digital Media"},"content":{"rendered":"<p><a name=\"a13\"><\/a>  <a href=\"http:\/\/cyber.law.harvard.edu\/home\/\">Berkman Center&#8217;s<\/a> Executive Director <a href=\"http:\/\/cyber.law.harvard.edu\/people\/jpalfrey.html\">John Palfrey<\/a> lectured earlier today at <a href=\"http:\/\/www.cornell.edu\/\">Cornell&#8217;s<\/a> <a href=\"http:\/\/www.cit.cornell.edu\/oit\/UCPL.html\">University<\/a><a href=\"http:\/\/www.cit.cornell.edu\/oit\/UCPL.html\"> Computer Policy and Law Program<\/a>. In the <a href=\"http:\/\/www.cit.cornell.edu\/oit\/ucpl\/Palfrey.html\">first session<\/a>, he made a strong case why, in fact, it makes sense to teach \u201c<a href=\"http:\/\/www.lessig.org\/content\/articles\/works\/finalhls.pdf\">cyberlaw<\/a>\u201d rather than the \u201c<a href=\"http:\/\/www.law.upenn.edu\/law619\/f2001\/week15\/easterbrook.pdf\">law of the horse<\/a>\u201d. John started with an analysis of three contemporary legal and regulatory issues that are Internet-specific: Spam, the digital media crises, and VoIP. From there, he moved to a more abstract level and discussed some of the basic characteristics \u2013 phenomena such as large-scale infringements, uncertainty surrounding the applicability of traditional legal doctrines such as fair use, high costs of enforcement and coordination, and global reach of the medium, among others \u2013 which make the law of the Internet (at least in part) different from other areas of law. John also used variations on <a href=\"http:\/\/www.lessig.org\/\">Lessig\u2019s<\/a> theme of the <a href=\"http:\/\/www.lessig.org\/content\/articles\/works\/LessigNewchicschool.pdf\">four modalities of regulation<\/a> to illustrate what makes Internet law special.<\/p>\n<p>In the <a href=\"http:\/\/www.cit.cornell.edu\/oit\/ucpl\/Palfrey.html\">second lecture<\/a>, John Palfrey offered a thoughtful and comprehensive overview of the current digital media crisis. Starting with the Napster saga, he moved forward to the current state of affairs, discussing from a comparative law perspective, among other things, the Berkman Center\u2019s <a href=\"http:\/\/cyber.law.harvard.edu\/media\/uploads\/81\/iTunesWhitePaper0604.pdf\">iTunes case study<\/a> and recent case law at the intersection of copyright and contract law as well as technological protection measures. Finally, John discussed <a href=\"http:\/\/cyber.law.harvard.edu\/media\/scenarios\">possible scenarios<\/a> for the future of digital media.<\/p>\n<p>Both lectures provide a great opportunity to get an expert&#8217;s overview where cyberlaw stands and what some of today\u2019s hottest topics are; <a href=\"http:\/\/www.cit.cornell.edu\/oit\/ucpl\/Palfrey.html\">highly recommended<\/a>, also to the audience abroad. And even if you are a scholar working in the same field, you\u2019ll enjoy Palfrey\u2019s presentation, since it\u2019s one of the increasingly rare occasions to re-think some of the fundamental assumptions and concepts of cyberlaw. Thanks, John!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Berkman Center&#8217;s Executive Director John Palfrey lectured earlier today at Cornell&#8217;s University Computer Policy and Law Program. In the first session, he made a strong case why, in fact, it makes sense to teach \u201ccyberlaw\u201d rather than the \u201claw of the horse\u201d. John started with an analysis of three contemporary legal and regulatory issues that [&hellip;]<\/p>\n","protected":false},"author":202,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[257,1151,749,1197,1183,116],"tags":[],"class_list":["post-142","post","type-post","status-publish","format-standard","hentry","category-copyright","category-e-compliance","category-entrepreneurship","category-futurology","category-itunes","category-policy"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/posts\/142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/users\/202"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/comments?post=142"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/posts\/142\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/media?parent=142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/categories?post=142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/ugasser\/wp-json\/wp\/v2\/tags?post=142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}