896 resultados para 390305 Law and Society
Resumo:
This essay describes and analyzes the legal regime of the United States in relation to language diversity. The article argues that the U.S. case in language law indicates that, under certain conditions, a liberal individualistic legal regime – marked by equal “freedom of choice” in respect to language use – can nevertheless serve as an agency of linguistic assimilation in a multilingual country.
Resumo:
This article aims to provide courts and policymakers with an analytical framework that, building upon the traditional rationales of IP exhaustion doctrine, identifies factors which advocate for a modulation or flexibilization of the role of exhaustion in copyright law. Factors include (i) the personal features of acquirers of copies of copyrighted works, distinguishing between consumers and commercial users; (ii) whether post-sale restrictions have been adequately communicated to acquirers and have been agreed in the contract or license; (iii) the degree of complexity of the acquired goods and their prospects of productive uses and interoperability; (iv) the role of other exclusive rights in providing rightholders with indirect control over uses of the copies in the aftermarket; (v) the impact of post-sale restraints in preventing opportunism in long-term contracts and in reducing deadweight losses created by IP pricing; and (vi) the temporal scope of post-sale restraints. After setting out this analytical framework, the ECJ Judgement in Oracle v. UsedSoft is discussed.
Resumo:
This article provides a holistic legal analysis of the use of cookies in Online Behavioural Advertising. The current EU legislative framework is outlined in detail, and the legal obligations are examined. Consent and the debates surrounding its implementation form a large portion of the analysis. The article outlines the current difficulties associated with the reliance on this requirement as a condition for the placing and accessing of cookies. Alternatives to this approach are explored, and the implementation of solutions based on the application of the Privacy by Design and Privacy by Default concepts are presented. This discussion involves an analysis of the use of code and, therefore, product architecture to ensure adequate protections.