LAW6455 Winter 2009
Syllabus

Syllabus – eCommerce Law – DRT 6455 – Master of Laws (LL.M.) Business Law in a Global Context

The following course is made of eight different themes teach in June 2008 from June 3rd to June 26th. Each of these lessons is suppose to be treating in about 3 hours but some overlaps may be made.
The present document is also available in a pdf version.

LESSON 1 – Introduction to eCommerce Law

Preliminary Paragraph – Course Presentation

1 – Definitions
1-1-A – Law
1-1-A-1 – Law is not …
1-1-A-1-1 – Law is not just a social norm

1-1-A-1-2 – Law is different from Morality

1-1-A-1-3 – Law is different from Justice

1-1-A-1-4 – Law is different from Equity

1-1-A-1-5 – Law is not just Law

1-1-A-2 – Law is …
1-1-A-2-1 – Law Functions

1-1-A-2-2 – Law characteristics

1-1-A-2-3 – Law categories

1-1-A-2-4 – Political organization

1-1-B-1 – eCommerce

1-1-B-2 – Security

2 – Legal instruments
1-2-A – Constitution
1-2-B – Treaties
1-2-B-1 – “Real” Treaties
1-2-B-2 – “False” Treaties
1-2-C – Laws

1-2-D – Regulations

1-2-E – Jurisprudence

1-2-F – Usages (and the notion of lex electronica)
1-2-F-1 – An old legal instrument …

1-2-F-2 – … and its rebirth !

1-2-F-3 – Vague legal recognition

1-2-G – Doctrine

3 – is eCommerce law different ?
1-3-A – Evolution or Revolution ?

1-3-B – Conceptual perspectives

1-3-C – Our position

LESSON 2 – Legal Security Management and Analysis of An Act to establish a legal framework for information technology (Quebec)

1 – Illustrations of Innovation
2-1-A – New Risks
2-1-B – New Technologies
2-1-C – New Advantages
2-1-D – New Inconvenients
2-1-E – New Objectives
2-1-F – New Words
2-1-G – New Laws
2 – Guiding Principles
2-2-A – Technological Neutrality

2-2-B – Functional Equivalent

2-2-C – Integrity

2-2-D – Writing

2-2-E – Signature

2-2-F – Original

3 – Managing Technology-Based Documents in a Secure Manner
2-3-A – How to transfer a technology-based document to another medium ?

2-3-B – How to retain a technology-based document ?

2-3-C – How to ensure that a technology-based document is accessible at all times ?

2-3-D – How to ensure the transmission of a technology-based document is accessible at all times ?

4 – Using Technology-Based Documents as Evidence
2-4-A – Main Principles

2-4-B – Example of email as Legal Evidence

2-4-C – Conclusions

5 – Legal Management of Digital Signature
2-5-A – Different Legal Regime
2-5-B – Different Kind of Signatures
2-5-C – Different Actors involve in Signature Process
2-5-D – Different Documentations need for Digital Signature Management
2-5-E – Conclusion

LESSON 3 – eCommerce and Liability

1 – Hosting Services Provider Liability
3-1-A – General Principle : Intermediaries Non-Liability

3-1-B – Other Intermediaries Liability

2 – Editor Liability
3-2-A – Traditional Media Rules
3-2-B – Traditional Liability Rules
3-2-C – Examples
3 – Transmission provider Liability
3-3-A – General Principle : Intermediaries Non-Liability

3-3-B – Examples
4 – Blogger Liability
3-4-A – Blogger Liability

3-4-B – Commentaries Liability

5 – Certification Services Provider Liability
3-5-A – Certification Authority Liability
3-5-B – Subscriber Liability
3-5-C – Relying Party Liability
3-5-D – Others Liability Consideration
6 – Electronic Payment Process Liabilities : Example of Credit Card Organization
3-6-A – Bank Liabilities
3-6-B – Merchant Liabilities
3-6-C – Consumer Liability
3-6-D – Possible Future Obligations

LESSON 4 – eContract

1 – Generality
4-1-A – Definition
4-1-B – References
4-1-C –Historical Perspectives
2 – Formalism and eContract
4-2-A – UNCITRAL Convention (United Nations Convention on the Use of Electronic Communications in International Contracts (2005) (CUECIC))

4-2-B – eContract Formation

3 – eConsent
4-3-A – Communication

4-3-B – Acceptance
4-3-B-1 – « Shrinkwrap »
4-3-B-2 – « Signwrap » or interference between Pape rand Electronic
4-3-B-3 – « Clickwrap »
4-3-B-4 – « Linkwrap » or Dell Case
4-3-B-5 – « Changewrap »
4-3-B-6 – « Browsewrap »
4-3-B-7 – « Rollingwrap »

LESSON 5 – IT and Privacy

1 – Internet and Privacy in General
5-1-A – Generality
5.1.A.1 – Legal References about Internet and Privacy

5.1.A.2 – New Situations and old Laws
5.1.A.3 – Definitions
5.1.A.4 – International Situation
5-1-B – Main Principles
5-1-B-1 – 10 General Principles

5-1-B-2 – 10 Specific Principles

2 – IT and Privacy at Workplace
5-2-A – Presentation of Internet and Email Usage in Workplace

5-2-B – Practical Solutions

LESSON 6 – IT and Intellectual Property

1 – Internet and Copyright
6-1-A – Uncertain Copyright Fundaments
6-1-A-1 – Uncertainty

6-1-A-2 – Certainty : Search for a Balance
6-1-B – Copyright Conditions
6-1-B-1 – Originality
6-1-B-2 – Fixation
6-1-C – Copyright Protection
6-1-C-1 – Patrimonial Rights

6-1-C-2 – Moral Rights
6-1-C-3 – Protection Modalities

6-1-D – Copyright and New Technologies : Who will pay ?

6-1-E – Future Changes to Canadian Copyright Act

2 – Internet and Trademark
6-2-A – Trademark Fundaments

6-2-B – Trademark and Domain Names
6-2-B-1 – Presentation

6-2-B-2 – Dispute Resolution about “Cybersquatting“

6-2-C – Trademark and Metatag

3 – Internet and Patent
6-3-A – Generality
6-3-B – Business Method Patent Problematic

LESSON 7 – Law and Web 2.0

1 – Web 2.0 Presentation
7-1-A – Definition
7-1-B – Characteristics

2 – Legal Risks
7-2-A – Facebook Example : List of Potential Legal Risks

7-2-B – Libel

7-2-C – Right to one’s image

7-2-D – Advertising Law

7-2-E – Hate Propaganda
7-2-F – Special Situations

LESSON 8 – Electronic Dispute Resolution

1 – Electronic ADR (Alternative Dispute Resolution)
8-1-A – Justifications for Electronic ADR

8-1-A – CyberMediation
8-1-A-1 – Main Experiences

8-1-A-2 – Changes in Comparison of Traditional Mediation

8-1-A-3 – Cybermediation in the Future
8-1-B – Cyberarbitration
8-1-B-1 – Justifications of Arbitration Popularity

8-1-B-2 – Main Experiences

8-1-B-3 – Material Limits

8-1-B-4 – Formal Limits

2 – International Private Law and Internet
8-2-A-1 – Generality
8-2-A-2 – Canadian Approach
8-2-A-3 – Quebec Approach

8-2-A-4 – American Approach
8-2-A-5 – European Approach
8-2-A-6 – International Approach
8-2-A-6 – Specific Approaches
 

Ce contenu a été mis à jour le 22 janvier 2014 à 14 h 45 min.