SILICON GULCH
Technology, Law & Politics from the K Street Corridor
INTERNET LAW LIBRARY

The Internet Law Library

The Internet Law Library collects primary and secondary authorities relating to breaking Internet issues.

The Library organizes authorities by topic providing fingertip practice area overviews.

Topics include: jurisdiction and venue; cybersquatting and domain name issues; internet libel and defamation; trade secret protection; first amendment issues; computer invasion, fraud and abuse; spamming; site usage liability, including liability for viruses; copyright and trademark issues; and privacy, including workplace, financial and health issues.

Authorities include:

  • opinions and orders issued by U.S. and international courts;
  • statutes, legislation and treaties;

 
1.Principles of Internet Jurisdiction and Venue
2.Personal Jurisdiction in Internet Defamation Cases
3.Spamming and the Computer Crimes Act
4.Virus Liability
5.Web Site Liability
6.Hacking & Computer Crimes
7.Cybersquatting
8.Internet Security
9.UCITA v. the UCC
10.Privacy: E-mail and Children's Privacy Issues
11.Privacy: Financial, Health and Consumer Issues
12.Digital Millennium Copyright Act
13.Online Piracy

Part 1. Perspectives on the Internet

Please Read

  1. American Civil Liberties Union v. Reno (Reno I), 929 F. Supp. 824, 830-38, 842-44, 877-83 (E.D. Pa. 1996), aff'd, 117 S. Ct. 2329 (1997)
  2. St. Clair v. Johnny's Oyster & Shrimp, Inc.,76 F. Supp. 2d 773 (S.D. Tex. 1999)
  3. Online Balloting: A Question of Fairness, Washington Post (March 19, 2000)
  4. Lawrence Lessig,The Law of the Horse: What Cyberspace Might Teach, 113 Harv.L.Rev. 501 (Fall 1999)
  5. What Larry Doesn't Get: Code, Law and Liberty in Cyberspace, 52 Stanford L. Rev. 1439 (May 2000)David J. Post

Recommended Reading

  1. Patently Absurd, The New York Times Magazine (March 12, 2000)
  2. National Telecommunications and Information Administration, Falling through the Net: Defining the Digital Divide, (July 1999)
  3. American Civil Liberties Union v. Reno (Reno II), 31 F. Supp. 2d 473, 481-84 (E.D. Pa. 1999), aff'd, no. 99-1324 (3d. Cir., June 22, 2000)

[Top]

 

Part 2. Principles of Internet Jurisdiction and Venue

Please Read

  1. Bensusan Rest. Corp. v. King, 937 F. Supp. 295 (S.D.N.Y. 1996), aff'd, 126 F.3d 25 (2nd Cir. 1997)
  2. Cybersell, Inc. v. Cybersell, Inc., 130 F.3d 414 (9th Cir. 1997)
  3. Zippo Manufacturing Company v. Zippo Dot Com, Inc., 952 F.Supp. 1119 (W.D. Pa. 1997)
  4. Compuserve, Inc. v. Patterson, 89 F.3d 1257 (6th Cir. 1996)
  5. Maritz, Inc. v. Cybergold, Inc., 947 F. Supp. 1328, 1329-34 (E.D. Mo. 1996)
  6. Mink v. AAAA Development LLC, 190 F.3d 333 (5th Cir 1999)
  7. Hurley v. Cancun Playa Oasis International Hotels, 1999 WL 718556 (E.D.Pa. 1999)
  8. Decker v. Circus Circus Hotel, 49 F.Supp.2d 743 (D.N.J. 1999)

Recommended Reading

  1. Millennium Enterprises, Inc. v. Millennium Music, LP, 33 F.Supp.2d 907 (D.Or. 1999)
  2. GTE New Media Services Inc. v. Bellsouth Corporation, 199 F.3d 1343 (D.C. Cir. 2000)
  3. Northern Light Technology, Inc. v. Northern Lights Club, 97 F.Supp.2d 96 (D.Ma. 2000)
  4. Molnlycke Health Care Ab v. Dumex Medical Surgical Products Ltd., 64 F.Supp 2d 448 (E.D.Pa. 1999)
  5. Porsche Cars North America, Inc., v. Porsche.Com, 51 F.Supp.2d 707 (E.D.Va. 1999)
  6. J. Donohue, Litigation in Cyberspace: Jurisdiction and Choice of Law: A United States Perspective, Subcommittee on International Transactions, Committee on Law of Commerce and Cyberspace, Section of Business Law, American Bar Association (1997)
  7. T. Vartanian, Whose Internet Is It Anyway? The Law of Jurisdiction in Cyberspace: Achieving Legal Order Among the World's Nations, George Mason University, 2000 Global Internet Summit (March 13-14, 2000)

[Top]

 

Part 3. Personal Jurisdiction in Internet Defamation Cases

Please Read

  1. Ga. Code § 9-10-91 (1999)
  2. Minn. Stat. § 543.19(d)(3) (1999)
  3. Calder v. Jones, 465 U.S. 783 (1984)
  4. Barrett v. Catacombs Press, 44 F.Supp.2d 717 (E.D.Pa. 1999)
  5. Blakey v. Continental Airlines, Inc., 751 A.2d 538, 552-58 (N.J. 2000)
  6. Jewish Defense Organization v. The Superior Court of Los Angeles County, 85 Cal.Rptr.2d 611 (Ct.App., 2d Dist., Div. 7, Ca. 1999)
  7. Bochan v. LaFontaine, 68 F.Supp.2d 692 (E.D.Va. 1999)
  8. Melvin v. Doe, 1999 WL 551335 (Va. Cir. Ct. 1999)

Recommended Reading

  1. Mallinckrodt Medical, Inc. v. Sonus Pharmaceuticals, Inc., 989 F. Supp. 265, 270-73 (D.D.C. 1998)
  2. Telco Communications v. An Apple A Day, 977 F.Supp. 404 (E.D. Va. 1997)
  3. Nat'l Petroleum Mktg., Inc. v. Phoenix Fuel Co., Inc., 902 F.Supp. 1459 (D. Utah 1995)
  4. Bailey v. Turbine Design, Inc., 86 F.Supp.2d 790 (W.D. Tenn. 2000)
  5. Doe v. Oliver, 1999 WL 557977 (Conn.Super. 1999)
  6. Blumenthalv. Drudge , 992 F.Supp 44 (D.D.C. 1998)

[Top]

 

Part 4. SPAMMING AND THE COMPUTER CRIMES ACT

Please Read

  1. Computer Fraud and Abuse Act, 18 U.S.C. § 1030(2000)
  2. Virginia Computer Crimes Act, Va. Code Ann. §§ 18.2-152.1 - 18.2-152.15, § 18.2-152.2
  3. Compuserve Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Oh. 1997)
  4. America Online v. IMS, 24 F. Supp,. 2d 548 (E.D. Va. 1998)
  5. H.R. 2162, 106th Cong. (2000)
  6. E-mail User Protection Act, H.R. 1910, 106th Cong. (2000)
  7. Murkowski-Torricelli (II), S. 759, 106th Cong. (2000)
  8. America Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444 (E.D. Va. 1998)
  9. Hotmail Corp. v. Van$ Money Pie, Inc., 1998 WL 388389 (N.D. Cal. 1998)

Recommended Reading

  1. Seidl v. Greentree Mortgage, 30 F. Supp. 2d 1292 (D. Colo. 1998)
  2. Cyber Promotions, Inc. v. America Online, Inc., 948 F. Supp. 436 (E.D. Pa. 1996)
  3. America Online, Inc. v. Greatdeals.net, 49 F. Supp. 2d 851 (E.D. Va. 1999)
  4. Jeffrey L. Kosiba, Legal Relief from Spam-Induced Internet Indigestion, 25 U. Dayton L. Rev. 187 (1999)

[Top]

 

Part 5. Virus Liability
Please Read
  1. Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (2000)
  2. United States. v. Morris, 928 F.2d 504 (2nd Cir. 1991)
  3. Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510-2711
  4. Virginia Computer Crimes Act, Va. Code Ann. §§ 18.2-152.1 - 18.2-152.15, § 18.2-152.12
  5. Compuserve, Inc. v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Ohio 1997)
  6. Thrifty-Tel, Inc. v. Bezenek, 46 Calif. App. 4th 1559 (1996)
  7. National Surety Corp. v. Applied Systems, Inc., 418 So. 2d 847 (Ala. 1984)
  8. Chatlos Systems, Inc. v. Nat'l Cash Register Corp., 479 F. Supp. 738, 740-41 and n.1 (D.N.J. 1979), aff'd, 635 F.2d 1081 (3rd Cir. 1980)
  9. Invacare Corp. v. Sperry Corp., 612 F. Supp. 448, 453-54 (N.D. Ohio 1984)
  10. RKB Enterprises, Inc. v. Ernst & Young, 182 App. Div. 2d 971 (N.Y. App. 1992)
  11. Diversified Graphics, Ltd. v. Groves, 868 F.2d 293 (8th Cir. 1989)
  12. ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996)

Recommended Reading

  1. Robin A. Brooks, Deterring the Spread of Viruses Online: Can Tort Law Tighten the 'Net'? 17 Rev. Litig. 343 (1998)
  2. Cal. Penal Code, § 502 - 502.01
  3. Tex. Penal Code, § 33.01
  4. North Tel, Inc. v. Brandl, 179 B.R. 620 (Bankr. Minn. 1995)
  5. Advent Syst. Ltd. v. Unisys Corp., 925 F.2d 670, 673-76 (3rd Cir. 1991)
  6. Heidtman Steel Products, Inc. v. Compuware Corp., 1999 U.S. Dist. Lexis 21700 (N.D. Ohio 1999)
  7. Triangle Underwriters, Inc. v. Honeywell, Inc., 604 F.2d 737 (2nd Cir. 1979)
  8. Hospital Computer Systems, Inc. v. Staten Island Hospital, 788 F. Supp. 1351, 1361 (D.N.J. 1992)
  9. RRX Industries, Inc. v. Lab-Con, Inc., 772 F.2d 543 (9th Cir. 1995)
  10. Step-Saver Data Systems, Inc. v. Wyse Technology, 939 F.2d 91 (3rd Cir. 1991)
  11. East River Steamship Corp. v. Transamerica Delaval Inc., 476 U.S. 858 (1986)
  12. Lucker Mfg. v. Home Insurance Co., 23 F.3d 808 (3rd Cir. 1994)
  13. State Farm Fire & Cas. Ins. Co. v. White, 777 F. Supp. 952 (N.D. Ga. 1991)

[Top]

 

 

Part 6. Web Site Liability

[10/2]

Updates

  1. Ticketmaster Corp., et al. v. Tickets.Com, Inc., 54 U.S.P.Q. 2d 1344 (C.D. Ca. 2000)
  2. Bernstein v. JC Penney, Inc., 1998 U.S. DIST. LEXIS 19048 (C.D. Ca. 1998)
  3. Hard Rock Cafe Int. v. Morton, 1999 U.S. DIST. LEXIS 13760 (S.D.N.Y. 1999)
  4. Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 75 F. Supp. 2d 1290 (D. Utah 1999)
  5. Religious Technology Center v. Lerma, 908 F. Supp. 1362 (E.D. Va. 1995)
  6. Religious Technology Center v. Netcom On-Line Communication Services, Inc., 923 F. Supp. 1231 (N.D. Cal. 1995)
  7. Digital Equipment Corp. v. Alta Vista Technology, Inc., 960 F. Supp. 456 (D. Mass. 1998)

Please Read

  1. Ford Motor Company v. Lane, 67 F. Supp. 2d 745 (E.D. Mich. 1999)
  2. Zeran v. America Online, Inc., 129 F.3d 327 (4th Cir. 1997)
  3. Marobie-FL, Inc. v. Nat'l Assn. of Fire Equip. Distributors, 983 F. Supp. 1167 (N.D. Ill. 1997)
  4. Sega Enterprises Ltd. v. Maphia, 948 F. Supp. 923 (N.D. Cal. 1996)
  5. Playboy Enterprises, Inc. v. Frena, 839 F. Supp. 1552 (M.D. Fla. 1993)
  6. Playboy Enterprises, Inc. v. Webbworld, Inc., 991 F. Supp. 543 (N.D. Tex. 1997)

Recommended Reading

  1. Jeffrey G. Gussis, Note, Website Development Agreements, a Guide to Planning and Drafting, 76 Wash. U.L.Q. 721 (1998)
  2. PLI Ecommerce Storefront Development & Hosting, 558 PLI/Pat. 237 (Jan. 2000)
  3. Kathleen M. Sullivan, First Amendment Intermediaries in the Age of Cyberspace, 45 U.C.L.A. Rev. 1653 (1998)
  4. Rice v. Paladin Enterprises, Inc., 128 F.3d 233 (4th Cir. 1997)
  5. Ticketmaster Corp., et al. v. Tickets.Com, Inc., 54 U.S.P.Q. 2d 1344 (C.D. Ca. 2000)
  6. Bernstein v. JC Penney, Inc., 1998 U.S. DIST. LEXIS 19048 (C.D. Ca. 1998)
  7. Hard Rock Cafe Int. v. Morton, 1999 U.S. DIST. LEXIS 13760 (S.D.N.Y. 1999)
  8. Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 75 F. Supp. 2d 1290 (D. Utah 1999)
  9. Religious Technology Center v. Lerma, 908 F. Supp. 1362 (E.D. Va. 1995)
  10. Religious Technology Center v. Netcom On-Line Communication Services, Inc., 923 F. Supp. 1231 (N.D. Cal. 1995)
  11. Digital Equipment Corp. v. Alta Vista Technology, Inc., 960 F. Supp. 456 (D. Mass. 1998)

[Top]

 

 

Part 7. Hacking & Computer Crimes

Please Read

  1. Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (2000)
  2. United States v. Morris, 928 F.2d 504 (2nd Cir. 1991)
  3. North Texas Preventive Imaging, L.L.C. v. Eisenberg, 1996 U.S. Dist. Lexis 19990 (C.D. Cal. 1996)
  4. United States v. Sablan, 92 F.3d 865 (9th Cir. 1996)
  5. United States v. Fernandez, 1993 U.S. Dist. Lexis 3590 (S.D.N.Y. 1993)
  6. United States v. Czubinski, 106 F.3d 1069 (1st Cir. 1997)
  7. United States v. Riggs, 743 F. Supp. 556 (N.D. Ill. 1990)

Recommended Reading

  1. Steve Jackson Games, Inc. v. U.S. Secret Service, 816 F. Supp. 432 (W.D. Tex. 1993), aff'd, 36 F.3d 457 (5th Cir. 1994)

[Top]

 

 

Part 8. Cybersquatting

Updates

  1. Harrods Limited v. Sixty Internet Domain Names, 110 F. Supp. 2d 420 (E.D. Va. 2000)
  2. Heathmount A.E. Corp. v. Technodome.com, 106 F. Supp.2d 860 (E.D. Va. 2000)
  3. Caesar's World, Inc. v. Caesar's-Palace.com, 2000 WL 1272942 (E.D. Va. Aug. 25, 2000)
  4. America Online, Inc. v. Huang,106 F. Supp. 2d 8482 (E.D. Va. July 13, 2000)
  5. Lucent Technologies, Inc. v. LUCENTSUCKS.COM, 95 F.Supp. 2d 528 (E.D. Va. 2000)
  6. Caesars World,Inc. v. CAESARS-PALACE.COM, 112 F.Supp. 2d 505 (E.D. Va. 2000)

Please Read

  1. Anti-Cybersquatting Consumer Protection Act of 1999, 15 U.S.C. § § 1125(d), 1129
  2. Panavision Int'l, L.P. v. Toeppen, 141 F.3d 1316 (9th Cir. 1998)
  3. Sporty's Farm L.L.C. v. Sportsman's Market, Inc., 202 F.3d 489 (2nd Cir. 2000)
  4. Northern Light Technology, Inc. v. Northern Lights Club, 97 F.Supp.2d 96 (D.Ma. 2000)
  5. Porsche Cars North America, Inc. v. Allporsche.com, et al., 2000 WL 742185 (4th Cir. 2000)

Recommended Reading

  1. David Post, Governing Cyberspace, or Where Is James Madison When We Need Him? (June 1999)

[Top]

 

 

Part 9. Internet Security

Update

  1. Karn v. U.S. Dept. of State, 925 F.Supp. 1 (D.D.C. 1996 )

Please Read

  1. Karn v. U.S. Dept. of State, 1997 U.S. App. Lexis 3123 (D.C. Cir. 1997)
  2. Bernstein v. U.S. Dept. of Justice, 176 F.3d 1132 (9th Cir. 1999)
  3. Junger v. Daly, U.S. Secy. of Commerce, 209 F.3d 481 (6th Cir. 2000)

 

Recommended Reading

  1. Security & Freedom Through Encryption (SAFE) Act, H.R. 850, 106th Cong. (1999)
  2. Promote Reliable Online Transactions to Encourage Commerce and Trade (PROTECT) Act of 1999, S. 798, 106th Cong. 1999
  3. Cyberspace Electronic Security Act (CESA), S. 854, 106th Cong. (1999)
  4. K. Shehadeh, The Wassenaar Arrangement and Encryption Exports: An Ineffective Export Control Regime that Compromises United States' Economic Interests, 15 Am. U. Int'l L. Rev. 271 (1999)
  5. Encryption: Impact on Law Enforcement, FBI Policy Report (June 3, 1999)

[Top]

 

 

Part 10. UCITA v. the UCC: Why the Controversy?

Please Read

  1. Micro Data Base Systems, Inc. v. Dharma Systems, Inc., 148 F.3d 649 (7th Cir. 1998)
  2. Advent Systems, Ltd. v. Unisys Corp., 925 F.2d 670 (3rd Cir. 1991)
  3. What's Happening to UCITA in the States, http://www.ucitaonline.com/whathap.html
  4. Va. Code. Ann. §§ 59.1-501.1, et seq.
  5. H.A. 8232, 78th General Assembly (Iowa 2000)
  6. UCITA § 103(a) & (b) (2000) (scope)

  7. UCITA § 102(a)(10) & (11) (definitions of computer information and transactions)

  8. Compare UCC § 2-312(3) with UCITA § 401
  9. Compare UCC § 2-209(2) with UCITA § 303(b), 112(a) and 304(b)
  10. Compare UCC § 2-601 with UCITA § 704(b)
  11. Compare UCC § 9-503 with UCITA §§ 815 and 816
  12. UCITA § 209
  13. UCITA § 110
  14. UCITA § 105

 

Recommended Reading

  1. Rodney J. Petersen, Review and Discussion of UCITA (Spring 2000), http:// www.arl.org/info/frn/copy/petersen.html
  2. ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996)
  3. Applied Information Mgmt., Inc. v. Icart, 976 F. Supp. 149 (E.D.N.Y. 1997)
  4. M.A. Mortenson Co., Inc. v. Timberline Software Corp., 998 P.2d 305 (Wash. 2000)
  5. Fred H. Miller & Carlyle C. Ring, Article 2B's New Uniform: A Free-Standing Computer Information Transactions Act, http://www.2bguide.com/docs/nuaa.html
  6. Pratik A. Shah, Berkeley Technology Law Journal Annual Review of Law and Technology: Intellectual Property; A. Copyright: The Uniform Computer Information Transactions Act, 15 Berkeley Tech. L.J. 85 (2000)
  7. Carol Kunze, UCITA: The New Law on Software and Other Computer Information Transactions, http://www.prstar.net /cumbreMilenio /presentaciones /ucitapr2.htm

[Top]

 

 

Part 11. Privacy: E-mail and Children's Privacy Issues

Please Read

  1. U.S. v. Hambrick, 55 F. Supp. 2d 504 (W.D. Va. 1999)
  2. U.S. v. Charbonneau, 979 F. Supp. 1177 (S.D. Ohio 1997)
  3. Children's Online Privacy Protection Act (COPPA), 15 U.S.C. §§ 6501, et seq. (1998)
  4. Smyth v. Pillsbury, 914 F. Supp. 97 (E.D. Pa. 1996)
  5. McVeigh v. Cohen, 983 F. Supp. 215 (D.D.C. 1998)
  6. Jessup-Morgan v. America Online, Inc., 20 F. Supp. 2d 1105 (E.D. Mich. 1998)

 

Recommended Reading

  1. Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510-2711
  2. FTC's Children's Online Privacy Protection Rule (COPPR)
  3. Privacy Rights Clearinghouse, Privacy in Cyberspace: Rules of the Road for the Information Superhighway, http://www. privacyrights.org/FS/fs18-cyb.htm

[Top]

 

 

Part 12. Privacy: Financial, Health and Consumer Issues

Please Read

  1. Federal Trade Commission, June 2000 Online Profiling: A Report to Congress (June 2000)
  2. Proposed legislation:
  3. Testimony of Prof. Michael O'Neill, George Mason University School of Law on The Carnivore Diagnostic Utilitiy, Before the Subcommittee on the Constitution of the House Committee on the Judiciary (Sept. 6, 2000)
  4. Testimony of Dep. Asst. Attorney General Kevin DiGregory on The Carnivore Diagnostic Utilitiy, Before the Subcommittee on the Constitution of the House Committee on the Judiciary (Sept. 6, 2000)
  5. Testimony of Dep. Asst. Attorney General Kevin DiGregory on The Carnivore Diagnostic Utilitiy, Before the Subcommittee on the Constitution of the House Committee on the Judiciary (July 24, 2000)
  6. Testimony of Dep. Asst. Attorney General Kevin DiGregory, on H.R. 5018 and H.R.4987, Before the Subcommittee on the Constitution of the House Committee on the Judiciary (Sept. 6, 2000)

Recommended Reading

  1. Graham-Leach-Blily Financial Modernization Act ("GLBA") Title 5, Pub. L. No. 106-102, Sec. 5 (1999)
  2. Privacy of Consumer Financial Information Rule ("GLBR"), 16 C.F.R. Class 313 (2000)

[Top]

 

 

Part 13. Digital Millennium Copyright Act

Please Read

  1. Digital Millennium Copyright Act, Pub. L. No. 105-304, 112 Stat. 2860 (1998), 17 U.S.C. §§ 1201 - 1205, 17 U.S.C. § 512
  2. Universal City Studios, Inc. v. Reimerdes, 82 F. Supp. 2d 211 (S.D.N.Y. 2000)
  3. CSC Holdings, Inc. v. Greenleaf Electronics, Inc., 2000 WL 715601 (N.D. Ill. 2000)
  4. Realnetworks, Inc. v. Streambox, Inc., 2000 WL 127311 (W. D. Wash. 2000)
  5. Kelly v. Arriba Soft Corp., 77 F. Supp. 2d 1116 (C.D. Cal. 1999)

 

Recommended Reading

  1. Playboy Enterprises, Inc. v. Frena , 839 F. Supp. 1552 (M.D. Fla. 1993)
  2. Religious Technology Center v. Netcom Online Publications, Inc., 907 F. Supp. 1361 (N.D. Cal. 1995)
  3. Sony Computer Entertainment America, Inc. v. Gamemasters, 87 F. Supp. 2d 976 (N.D. Cal. 1999)
  4. Sega Enterprises Ltd. v. Maphia, 857 F. Supp. 679 (N.D. Cal. 1994)
  5. Sony Corp. of America v. Universal City Studios, Inc. , 464 U.S. 417 (1984)
  6. Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259 (9th Cir. 1996)
  7. Jesse Walker, Copycat Fight, Reason (March 2000)

[Top]

 

 

Part 14. Online Piracy

Please Read

  1. A&M Records, Inc. v. Napster, Inc., 114 F. Supp.2d 896, 55 U.S.P.Q.2d 1780, 2000 U.S. Dist. Lexis 11862 (N.D. Calif. Aug. 10, 2000)
  2. A&M Records, Inc. v. Napster, Inc., 54 U.S.P.Q. 2d 1746, 2000 WL 573136 (N.D. Cal. 2000)
  3. UMG Recordings, Inc. v. MP3.com, Inc., No. 00 Civ. 472 (S.D.N.Y. 2000)
  4. UMG Recordings, Inc. v. MP3.com, Inc., 2000 U.S. Dist. Lexis 13293 (Sept. 6, 2000)

Recommended

  1. Sega Enterprises Ltd. v. Sabella, 1996 U.S. Dist. Lexis 20470 (N.D. Cal. 1996)
  2. Perry v. Sonic Graphic Systems, Inc., 94 F. Supp. 2d 616 (E.D. Pa. 2000)

[Top]