Teachers! If you use our Table of Contents as your course syllabus, then this page will help you transition effortlessly to the new edition. All of the new subject areas added to the 10th edition are labeled below as New. Additionally, many of the subject areas from the previous edition have been updated with new material and are noted as suchNew. We realize some teachers are reluctant to upgrade to a revised textbook, so we have kept the structure and content as close to the original as possible. However, it is extremely important that you always use the most current edition because:

  • The law has changed since the last edition
  • Technology has changed since the last edition
  • Many of the pending cases discussed in the previous edition have been decided by the courts since the last edition.

How to tell the current 10th edition from previous editions:

Many online sellers list multiple editions of the book on their Web sites. The new 10th Edition can be distinguished from previous editions in that:

  • The 10th edition has a black cover with gold and silver text
  • It has 586 pages
  • The ISBN is 978-1-935971-30-6 (softcover) and 978-1-935971-31-3 (hardcover)
  • It says "10th edition" on the top right of the front cover, below the title
  • It has a number "10" on the bottom of its spine

Where to obtain the 10th edition:

The paperback version of the 10th edition was published in November 2015, and is available through Amazon, and Barnes & Noble; the hardcover version will be published in December 2015. The digital version of the 10th edition available from VitalSource was published in October 2015.

If you, your students, or your school bookstore have any difficulty ordering copies, they are always available directly from the publisher, Amber Book Company.

Teachers may request a complimentary digital evaluation copy or, if they are already using the text, a free desk copy.

Bookstores may order through their suppliers, Ingram, or per our Discount Schedule.

Students may order from the bottom of this, or any other, page on the site, or directly from the publisher.

 

 

 

Table of Contents for the 11th edition
of Issues in Internet Law
 
PART ONE: INTRODUCTION

Chapter One: Introduction to Law
Introduction to Law
How Many Jurisdictions?
Federalism
The American Court System
Jurisdiction & Venue
     Personal Jurisdiction
     Subject Matter Jurisdiction
     In Rem Jurisdiction
     Jurisdiction in Cyberspace
     Jurisdictional Examples
     Jurisdictional Balance
Anatomy of a Court Decision
NewOnward to Court

PART TWO: INTELLECTUAL PROPERTY

Chapter Two: Copyright Basics
The Copyright Act
     Exclusive Rights of the Copyright Owner
     Filing A Copyright
     The © Symbol
     Length of Protection
“Work-Made-For-Hire”
Elements of a Civil Copyright Infringement Claim
     NewVolitional Conduct
Defenses to a Civil Copyright Infringement Claim
     Public Domain
     Independent Creation
     De Minimus Copying
     Parody
NewFair Use Doctrine
NewTransformative Use
Criminal Infringement
Civil Remedies
Additional Creator Rights Provisions
     The Visual Artists Rights Act
     Creative Commons
The Actor as Copyright Holder?
Chapter Three: Copyright Infringement
Copyright Infringement
Direct Infringement
    New of Web Site Content
     of the Web Site Itself
Contributory Infringement
     Linking
     Framing Issues
The Digital Millennium Copyright Act
     The Effect of the DMCA – Before and After
     Peer-2-Peer Networking
     Contributory Infringer
     A Defeat for the Recording Industry
     Vicarious Infringement
     Illegal Music File-Sharing
     NewExemptions
     The First Sale Doctrine
     Computer Software
Chapter Four: Trademarks, Patents, and Trade Secrets
The Lanham Act
Filing A Trademark
     Trademark Search
     Trademark Registration
International Trademarks
     European Registration
     The Madrid System
The ® Symbol
Trademark Infringement and Dilution
     Trademark Infringement or Parody?
      Direct & Contributory Infringement
Patents
     Filing the Application
     The Patent Application
     Who is the Patent Holder?
     Patents and the Internet
     Patent Infringement
     International Patents
     Software Patents
Trade Secrets
     Misappropriation of Trade Secrets
Chapter Five: Trademark and the Internet
Are Domain Names Property?
Domain Name Tricks
     Domain Misspellings
     Mousetrapping
     Pagejacking
Truth in Domain Names
     The Truth in Domain Names Act
     The Fraudulent Online Identity Sanctions Act
Cybersquatting
     Anti-Cybersquatting Consumer Protection Act
     Cyberpoachers
    Personal Names as Domain Names
     Shared Domain Name
     Uniform Domain Name Dispute Resolution Policy
     Social Network Subdomains
Search Terms and Infringement
     Meta Tags
     Keyword Advertising
PART THREE: CYBERCRIMES

Chapter Six: CyberCrimes
Spam
     Where Does Spam Come From?
     Tips to Avoid Spam
     The CAN-SPAM Act
     State Spam Laws
     International Spam Laws
     Using Existing U.S. Laws to Fight Spam
     Murking
     Mail Bombs
     Permission-Based Marketing
Social Engineering and Identity Theft
     E-Mail Spoofing
     Phishing
     Overview of Identity Theft
     Social Security Numbers
     Safeguard Your ID Information
     The Identity Theft Penalty Enhancement Act
Cookie Poisoning
Malware
    Adware Versus Spyware
   New Ransomware
    Drive-by Download
Computer Trespass
     The Computer Fraud and Abuse Act
Wardriving, Piggybacking, and Telecommunications Theft
Pod Slurping
Electromagnetic Keyboard Sniffing
The Mule Scam
Cyberstalking
   New The Weaponized Tweet
Federal Statutes Used to Fight CyberCrime
     Securities Act of 1933 & Securities Exchange Act of 1934
     The Wire Wager Act & Online Gambling
Virtual Crime

PART FOUR: PRIVACY
Chapter Seven: Privacy Basics
The Right to Privacy
     Appropriation (The Right of Publicity)
     Intrusion on Solitude or Seclusion
     Public Disclosure of Private Facts
     False Light in the Public Eye
     Privacy Defenses
Federal Laws Affecting Privacy
Voluntary Disclosure
     Job Searches
     Virtual Tour Web Sites
     Social Networks
     NewThe Electronic Trail
International Privacy Laws
     Canadian Privacy Laws
     NewThe European Union Privacy Directives

Chapter Eight: Data Privacy

Data Collection
      ISP Subscriber Information
      Search Queries
Data Retention
Data Outsourcing
NewData Breach
     Types of Data Breaches
     Consequences of Data Breaches
Metadata
Data in the Wrong Hands
Public Records
     Data Brokers
     Data Broker Liability
     Insurer Liability


Chapter Nine: The Expectation of Privacy
Expectation of Privacy in Chat Rooms
NewExpectation of Privacy in E-Mail
     In the Workplace
     Hackers
     Mistaken Recipients
     NewInternet Service Providers (ISPs)
     Law Enforcement Officials
     A Party in a Lawsuit
False Pretenses
NewExpectation of Privacy After Death
NewExpectation of Privacy on Social Networks
NewExpectation of Privacy in One's Own Hard Drive
     NewFourth Amendment: Repair Shops
     NewFourth Amendment: Border Searches
     Fifth Amendment: Encryption
     NewSpycams
     File-Sharing
Spyware
NewExpectation of Privacy in Web Posts
Expectation of Privacy in Search Histories
NewExpectation of Privacy in Smart Phones
Expectation of Privacy in Public: Google Glass
NewExpectation of Privacy in the Internet of Things

Chapter Ten: Privacy & The Police State
Government Intrusion into Individual Privacy
The Statutory Framework
     The Omnibus Crime Control and Safe Streets Act of 1968
     The Electronic Communications Privacy Act
     The Foreign Intelligence Surveillance Act
     The FISA Amendments Act of 2007
     The FISA Amendments Act of 2008
     The FISA Amendments Act Reauthorization Act of 2012
     The USA PATRIOT Act
     Executive Order No. 12333
     The Communications Assistance for Law Enforcement Act (CALEA)
     CISPA and § 2511 Letters
     The Homeland Security Act
     The 21st Century Department of Justice Appropriation Authorization Act
Federal Espionage Tools
     Carnivore
     Hacking & Malware
     CIPAV
     Social Media Real-time Monitoring
     DCSNet
     DMAC
     Fusion Centers
     XKeyscore
     Total Information Awareness
     PRISM
     BLARNEY
The NSA

Chapter Eleven: Privacy Policies & Behavioral Marketing
Web Site Privacy Policies
     Ingredients for a Good Privacy Policy
     If No One Heard the Tree Fall, Did It Make A Noise?
Behavioral Marketing
     Cookies
     Flash Cookies
     Stored Browser Histories
     Device Fingerprinting
     Privacy Concerns
     Deep Packet Inspection
     Behavioral Experimentation on Users
Behavioral Marketing and Privacy Policies
Society, Technology, and the Law

Chapter Twelve: Privacy and Children
Soupy Sales and the Naiveté of Kids
Protecting Children from Marketers and Other Predators
     Children's Online Privacy Protection Act (COPPA)
     COPPA and COPA
     To Catch a Predator
     Web Monitoring Software
     Inappropriate Misappropriation?
Social Interaction in the Cyber-environment
     Show and Tell on the Internet
     What Kids Are Posting
     Where Kids Are Posting
     Is It a Good or Bad Thing?

Chapter Thirteen: Social Networks
Social Networks
Dangers of Social Media Posting
Misuse of Social Media
NewCourts and Social Media
Ownership of Social Media Accounts
Coerced Access to Social Media Accounts
NewPseudonymity and the Ransoming of Facebook Accounts
Caches, Like Diamonds, Are Forever
     Social Media Monitoring
     Reputational Management
     NewThe Right to be Forgotten
     Sweeping Away One's Digital Footprint
PART FIVE: FIRST AMENDMENT FREE SPEECH • PRESS

Chapter Fourteen: Free Speech
Political Speech
Commercial Speech
Expressive Conduct
Speech Subject to Restriction Based on Role of the State
     Employer
     Educator Through the Public School System
     Prison Warden
     Military
     Regulator of the State Bar
     Regulator of the Air Waves
Unprotected Speech
Social Boundaries of Speech

Chapter Fifteen: Defamation, the CDA, and Anonymous Speech
Defamation
     Defenses to Defamation
     Forums for Potential Defamation
§ 230 of the Communications Decency Act
     Common Law Approach
     Enactment
     No Takedown Provision
     No Recourse?
    New Limitations on § 230 Immunity
     Summary of § 230
     The Fake Profile Cases
Exploitation Web Sites
     NewRevenge Porn
     Mugshot Web Sites
Defamation in a Blog
     First Amendment Protection
     Vlogs
     Blogola
Defamation By Self-Publishers
Defamation By Search Engine Results
Defamation versus Anonymous Free Speech
    Rationales Favoring Anonymity
    Arguments Against Anonymity
    The Tradition of Anonymous Speech
    Unmasking the Speaker
    Barriers to Identifying an Anonymous Poster
    WikiLeaks
   International Approaches
Chapter Sixteen: Student Speech
Forum Analysis
Spare the Rod
The Material and Substantial Disruption Standard
Tinkering with Student Speech Rights
     A Bridge Too Far
     Lobbing the Grenade
     A Tale of Two Cities
     Panel-Demonium
     Tinker's Overlooked Prong
     Student Hate Web Sites
     Cyberbullying
     Analysis

Chapter Seventeen: Journalism in the Digital Age
The Rise of the Digital Age
     The Rise of "Citizen Journalism"
Traditional versus Digital Journalism
Advantages of Digital Journalism
Drawbacks of Digital Journalism
     Why Professionalism Matters
     Importance of Fact Checking
Dangers and Failings of Citizen Journalism
News Formats
     Discussion Boards
     Hyperlocal Web Sites
     Blogs
     Live Blogging
     RSS
     Podcasting
     Wikis


Chapter Eighteen: Obscenity & Pornography
Federal Obscenity Statutes
     The Communications Decency Act (CDA) §223
     The Child Online Protection Act of 1998 (COPA)
     The Children's Internet Protection Act of 2000 (CIPA)
Obscene Words
Child Pornography
     The PROTECT Act
     Other Child Protection Statutes
     What Is "Possession"?

Chapter Nineteen: Hate Speech and Repression
Online Harassment
     Happy Slapping
Hate Speech On the Internet
     Remedies to Hate Speech
     Hate Speech in International Jurisdictions
    New Hate Speech and "Fake News"
Repression of Online Speech
     NewWeb Speech Under Totalitarianism
PART SIX: Business and the Internet

Chapter Twenty: Business and the Internet
NewMarketing Concerns
Legal Concerns
     E-Discovery
     Corporate Securities
     Cybergripers
      Strategic Lawsuits Against Public Participation
      Tortious Interference with Business Relationship
Interstate Commerce and the Internet
     NewSales Tax
Privacy Concerns
      Privacy Policy
      Data Breach
Employer Concerns
     Job Applicants
      Employee Bloggers
      Privacy and Work — Lifestyle Privacy
Chapter Twenty-One: Web Contracts
Basic Principles of Contract Law
    NewAffirmative Defenses
     Remedies
     Assignment and Delegation
Electronic Signatures
     The Uniform Electronic Transactions Act (UETA)
     The E-SIGN Act
     E-mails as a Signed Writing
Terms of Use Agreements
     Privacy Policies
     Membership Agreements
     Shrink-wrap Agreements
     Click-wrap Agreement
     Browse-wrap Agreement
     ISP Contracts
     Notification of Changes
     Unilateral Contracts
Web Site Development Agreements
PART SEVEN: WEB 2.0 AND BEYOND

Chapter Twenty-Two: Issues On The Horizon
Digital Estate Planning
Internet Accessibility for the Disabled
Net Neutrality
E-Books
Geolocation Filtering: Erecting Borders to the Internet
Cloud Computing
Digital Currency
Wearable Technology
NewDistracted Driving
NewAutonomous Vehicles
NewThe Internet of Things
The Blame Game
The New Nation-states
NewGlossary
NewAcronyms & Abreviations
NewTable of Cases
NewTable of Statutes & Treaties
    NewU.S. Federal Statutes
    NewU.S. State Statutes
    NewInternational Statutes & Directives
    NewConventions and Treaties
Author Biography

 

Stay Up-To-Date with the New Digital 11th Edition!

 

10th Edition Print Format
Paperback and Hardcover

Available from VitalSource, the leader in electronic textbooks, downloadable to your reading device to read offline and automatically updated each time you log in. Includes Text-to-Speech and Search functions. Available in paperback and hardcover from Amazon, Barnes & Noble, and other fine retailers, the 10th Anniversary Edition is current through 2015.

Issues in Internet Law: Society, Technology, and the Law 11th Edition

2017 Edition. (686 pages)
Published by Amber Book Company LLC

Issues in Internet Law

2015 Edition. (586 pages, 7x10)
Published by Amber Book Company LLC

 

 

Hardcover Buy from Barnes & Noble

Softcover Buy from Amazon

EBOOK VitalSource eBook

or Order at your local bookstore - Ask For:
ISBN 978-1-935971-24-7 softcover
ISBN 978-1-935971-31-3 hardcover

Order from: VitalSource eBook

United States

United Kingdom

Australia

Softcover Buy from Amazon

 

 

Table of Contents
Updates
Report Errors
Press Kit
Mailing List
Cases
Student Chapter Questions

© 2017 Amber Book Company LLC