Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Journal

2013

Institution
Keyword
Publication

Articles 1 - 29 of 29

Full-Text Articles in Entire DC Network

Pretending Without A License: Intellectual Property And Gender Implications In Online Games, Casey Fiesler Oct 2013

Pretending Without A License: Intellectual Property And Gender Implications In Online Games, Casey Fiesler

Buffalo Intellectual Property Law Journal

No abstract provided.


Hero With A Thousand Copyright Violations: Modern Myth And An Argument For Universally Transformative Fan Fiction, Natalie H. Montano Sep 2013

Hero With A Thousand Copyright Violations: Modern Myth And An Argument For Universally Transformative Fan Fiction, Natalie H. Montano

Northwestern Journal of Technology and Intellectual Property

Copyright law is designed to protect the ownership and financial rights of the original author of a literary work. However, the internet has created new opportunities for amateur writers to create their own fan fiction based on such literary works. Borrowing from the ideas and characters of a work, fan fiction authors build upon and re-imagine these stories. Such fan works should be protected under the Fair Use Defense, but the power imbalance between amateur fan fiction authors and successful published authors often leads to the eradication of fan stories from the public domain.

This Comment argues that fan fiction …


Heavyweight Bots In The Clouds: The Wrong Incentives And Poorly Crafted Balances That Lead To The Blocking Of Information Online, Anjanette H. Raymond Aug 2013

Heavyweight Bots In The Clouds: The Wrong Incentives And Poorly Crafted Balances That Lead To The Blocking Of Information Online, Anjanette H. Raymond

Northwestern Journal of Technology and Intellectual Property

The United States and the European Union have long recognized the need to protect ISPs from potential liability from customers using their services to infringe intellectual property rights. These protections arise from a long-standing belief that intellectual property right holders should bear the burden of protecting their property, even in the quick moving Internet environment. However, a recent series of cases has called into question the ISPs’ liability protections as their technology is often the only real means to prevent wide scale infringing activity. This series has caused courts to revisit ISPs’ liability and to impose a ‘cooperative burden’ requiring …


Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie Jun 2013

Social Media: The Law Simply Stated, Steve Coughlan, Robert J. Currie

Canadian Journal of Law and Technology

It is a challenge to simply state the law about social media, because there is no such thing as “social media law.” Rather, the law bumps up against social media in many ways. In some cases, existing law can be seamlessly applied to new technologies and means of interaction. In other cases, entirely new paradigms will likely need to be adopted to handle new challenges. Many other cases will fall somewhere in between.

Our goal in this Law Simply Stated is to provide some background on the nature of social media themselves, and then to state the basic law in …


Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell Jun 2013

Implementing Technology In The Justice Sector: A Canadian Perspective, Jane Bailey, Jacquelyn Burkell

Canadian Journal of Law and Technology

Despite the many technological advances that could benefit the court system, the use of computers and network technology to facilitate court procedures is still in its infancy, and court procedures largely remain attached to paper documents and to the physical presence of the parties at all stages. More and more research is focusing on the use of technology to make the legal system more efficient and to reduce excessive legal costs and delays. The goal of this exploratory research project is to examine the experience of justice sector technology implementation from the perspective of individuals involved first-hand in the implementation …


A Dual Track Approach To Challenging Chinese Censorship In The Wto: The (Future) Case Of Google And Facebook, Anonymous Jun 2013

A Dual Track Approach To Challenging Chinese Censorship In The Wto: The (Future) Case Of Google And Facebook, Anonymous

Michigan Journal of International Law

As economic and trade policies continue to affect more facets of society, the World Trade Organization’s (WTO) impact on government policy and citizens’ lives has grown. Since its creation on January 1, 1995, the WTO has fostered trade liberalization negotiations and served as a forum where member countries can discuss economic concerns with one another. The WTO is perhaps best known for its dispute settlement mechanism. When countries cannot reach a mutual resolution to a conflict governed by a trade agreement, they can initiate formal legal proceedings against one another by asking for a panel to be appointed. The panel …


Signs And Portents In Cyberspace: The Rise Of Jus Internet As New Order In International Law, Roy Balleste, Joanna Kulesza May 2013

Signs And Portents In Cyberspace: The Rise Of Jus Internet As New Order In International Law, Roy Balleste, Joanna Kulesza

Fordham Intellectual Property, Media and Entertainment Law Journal

Today, having sufficient access to the Internet's information has arguably become a prerequisite for the enjoyment of human life. The Internet has become a center for human literacy and has the potential to offer numerous kinds of instruction at lower costs and with higher quality than previous media could offer. This Article will argue that the concept of a "cybered Westphalian age," as a cure to all threats in the Internet, has the potential to do more harm than good. The international community is now faced with a possible policy shift from the current state of the Internet, which is …


Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski Apr 2013

Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski

Fordham Intellectual Property, Media and Entertainment Law Journal

The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …


Shopping For Reversals: How Accuracy Differs Across Patent Litigation Forums, Teresa Lii Apr 2013

Shopping For Reversals: How Accuracy Differs Across Patent Litigation Forums, Teresa Lii

Chicago-Kent Journal of Intellectual Property

This study analyzes the rate of reversal on appeal of each district court for the most popular patent litigation forums in the United States. Alarmingly, this study finds that district courts which have been shopped for by litigants may also be the courts that are most often applying patent law erroneously. Among these districts is the notoriously patentee-friendly Eastern District of Texas, which has attracted huge volumes of litigants to its dockets in recent years.

Although forum shopping has always antagonized the fairness of civil proceedings, it is of special problem in the context of patent litigation. Where billions of …


Icann’S New Generic Top-Level Domain Programand Appication Results, Amer Raja Mar 2013

Icann’S New Generic Top-Level Domain Programand Appication Results, Amer Raja

Intellectual Property Brief

No abstract provided.


Ultramercial And Prometheus: How Transformation Analysis After Bilski Is Changing To Accommodate Modern Technologies, Sarah Beth Smith Mar 2013

Ultramercial And Prometheus: How Transformation Analysis After Bilski Is Changing To Accommodate Modern Technologies, Sarah Beth Smith

Intellectual Property Brief

No abstract provided.


Unchanging E-Discovery In The Patent Courts, Daniel B. Garrie, Yoav M. Griver Feb 2013

Unchanging E-Discovery In The Patent Courts, Daniel B. Garrie, Yoav M. Griver

Washington Journal of Law, Technology & Arts

This Article analyzes the Federal Circuit’s Model Order Regarding E-Discovery in Patent Cases (the “Model Order”). The Article briefly describes the purpose behind the Model Order, describes its key provisions, analyzes the Model Order to identify some areas of continuing concern, and defines predictive coding to examine the impact, or lack thereof, on the Model Order. The Author concludes that, while it is beyond refute that the Model Order is an appropriate step toward controlling and managing e-discovery, the Model Order is only the first step. In this regard, several problems, as set forth below, can potentially arise when counsel …


Graduated Response American Style: “Six Strikes” Measured Against Five Norms, Annemarie Bridy Jan 2013

Graduated Response American Style: “Six Strikes” Measured Against Five Norms, Annemarie Bridy

Fordham Intellectual Property, Media and Entertainment Law Journal

In 2008, in recognition of the DMCA’s inadequacy in the face of P2P file sharing, and with the high-profile case of Arista Records v. Lime Group pending in federal district court in New York, then New York State Attorney General Andrew Cuomo began pressuring broadband providers to agree voluntarily to play a greater role in fighting online infringement. Subsequently, the Obama administration, represented nationally by the Office of the Intellectual Property Enforcement Coordinator (IPEC) and internationally by the Office of the United States Trade Representative (USTR), expressly endorsed the concept of privately negotiated anti-piracy collaborations between corporate rights owners and …


Litigation Following A Cyber Attack: Possible Outcomes And Mitigation Strategies Utilizing The Safety Act, Brian E. Finch, Leslie H. Spiegel Jan 2013

Litigation Following A Cyber Attack: Possible Outcomes And Mitigation Strategies Utilizing The Safety Act, Brian E. Finch, Leslie H. Spiegel

Santa Clara High Technology Law Journal

Liability for a cyber attack is not limited to the attackers. An attack may be foreseeable in some circumstances, and the failure of the target or the other entities to take steps to prevent the attack can constitute a breach of duty to injured victims. In the absence of the protections provided by the Support Anti-Terrorism By Fostering Effective Technologies (SAFETY) Act, a cyber attack on a chemical facility could give rise to a number of common-law tort and contract claims against the target of the attack and other entities, potentially including the target’s cyber security vendors. This article discusses …


Information Governance: It’S A Duty And It’S Smart Business, Charles R. Ragan Jan 2013

Information Governance: It’S A Duty And It’S Smart Business, Charles R. Ragan

Richmond Journal of Law & Technology

A scant generation ago (twenty-five years), the World Wide Web—“an internet-based hypermedia initiative for global information sharing” —was largely a laboratory phenomenon. In 1994, the Clinton Administration urged world leaders to develop a global information superhighway, and the Information Age raced upon us. Now, Facebook has more than one billion accounts and most of us are constantly deluged by volumes of electronic information through e-mail, texts, social media, the Internet, cable systems, and others.


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Smashing The Copyright Act To Make Room For The Mashup Artist: How A Four-Tiered Matrix Better Accommodates Evolving Technology And Needs Of The Entertainment Industry, Caroline Kinsey Jan 2013

Smashing The Copyright Act To Make Room For The Mashup Artist: How A Four-Tiered Matrix Better Accommodates Evolving Technology And Needs Of The Entertainment Industry, Caroline Kinsey

UC Law SF Communications and Entertainment Journal

With the rise of online blogging, social networking platforms, and videosharing sites such as YouTube and Yahoo Video, it is now possible for one individual to rival the span of entire media empires from one's basement computer. Commonly known as the Web 2.0 phenomenon, the combination of these technological advancements with video platforms that encourage users to "engage, create, and share content online" has fundamentally transformed the music industry. No longer are fans passive listeners, but instead, with the click of a mouse and access to the Internet, they become "publisher[s], TV network[s], radio station[s], movie studio[s], record label[s], and …


Internet Freedom And Computer Abuse, Lothar Determann Jan 2013

Internet Freedom And Computer Abuse, Lothar Determann

UC Law SF Communications and Entertainment Journal

The Computer Fraud and Abuse Act ("CFAA") has a bad reputation. It is associated with constitutional law challenges and community outrage. It played a role in the tragic suicide of Aaron Swartz, computer programmer, Internet activist and CFAA defendant. It has been decried as a basis for abuse of justice, which is ironic, given its title and focus on punishing abuse. It has been called "the worst law in technology" and "the most outrageous criminal law you've never heard of." It is loathed and feared as a threat to Internet freedom.

A particular concern is that the law could criminalize …


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


Internet Outlaws: Knowingly Placing Ads On Parked Domain Names Invokes Contributory Trademark Liability, Ariane C. Strombom Jan 2013

Internet Outlaws: Knowingly Placing Ads On Parked Domain Names Invokes Contributory Trademark Liability, Ariane C. Strombom

Marquette Intellectual Property Law Review

None.


Volume 4 Issue 2 (2013), Case Western Reserve Journal Of Law, Technology And The Internet Jan 2013

Volume 4 Issue 2 (2013), Case Western Reserve Journal Of Law, Technology And The Internet

Journal of Law, Technology, & the Internet

No abstract provided.


Crowdfunding: Fleecing The American Masses, Zachary J. Griffin Jan 2013

Crowdfunding: Fleecing The American Masses, Zachary J. Griffin

Journal of Law, Technology, & the Internet

No abstract provided.


Cyber-Terrorism: Finding A Common Starting Point, Jeffrey Thomas Biller Jan 2013

Cyber-Terrorism: Finding A Common Starting Point, Jeffrey Thomas Biller

Journal of Law, Technology, & the Internet

No abstract provided.


Imposing A Duty In An Online World: Holding The Webhost Liable For Cyberbullying, Elizabeth M. Jaffe Jan 2013

Imposing A Duty In An Online World: Holding The Webhost Liable For Cyberbullying, Elizabeth M. Jaffe

UC Law SF Communications and Entertainment Journal

In light of fettle attempts by state legislatures to subdue the growing cyberbullying epidemic, the time has come to create a civil duty upon those who can control the problem-web hosts and webservers. While the general "foreseeable plaintiff' duty set forth by then-Chief Judge Cardozo in PaIsgraf v. Long Island Railroad Co. has controlled the duty of care owed to the person of another for the last century, Judge Andrews' dissent may hold the key to unlock this new societal problem: "Every one owes to the world at large the duty of refraining from those acts that may unreasonably threaten …


Cyberattacks On Medical Devices And Hospital Networks: Legal Gaps And Regulatory Solutions, Katherine Booth Wellington Jan 2013

Cyberattacks On Medical Devices And Hospital Networks: Legal Gaps And Regulatory Solutions, Katherine Booth Wellington

Santa Clara High Technology Law Journal

Cyberattacks on medical devices and hospital networks are a real and growing threat. Malicious actors have the capability to hack pacemakers and insulin pumps, shut down hospital networks, and steal personal health information. This Article analyzes the laws and regulations that apply to cyberattacks on medical devices and hospital networks and argues that the existing legal structure is insufficient to prevent these attacks. While the Computer Fraud and Abuse Act and the Federal Anti-Tampering Act impose stiff penalties for cyberattacks, it is often impossible to identify the actor behind a cyberattack—greatly decreasing the deterrent power of these laws. Few laws …


Corporate Cyber-Censorship: The Problems With Freedom Of Expression Online, Max Rothschild Jan 2013

Corporate Cyber-Censorship: The Problems With Freedom Of Expression Online, Max Rothschild

Canadian Journal of Law and Technology

This article will explore the problem of the applicability of human rights law to the corporate entities that own and enable the operation of the Internet. The focus will be the status of the right to freedom of expression online, and the different possibilities that have been suggested in order to ensure that users have and are able to exercise this right. As the Internet is a communicative tool that allows for an unprecedented global discourse, freedom of expression is naturally of primary importance in the online context.


Patent Law Is, At Best, Not Worth Keeping, Richard Stallman Jan 2013

Patent Law Is, At Best, Not Worth Keeping, Richard Stallman

Loyola University Chicago Law Journal

No abstract provided.


“Cyberanarchy” In The Digital Age: Developing A System Of Human (Copy)Rights, 12 J. Marshall Rev. Intell. Prop. L. 424 (2013), Michael L. Boyle Jan 2013

“Cyberanarchy” In The Digital Age: Developing A System Of Human (Copy)Rights, 12 J. Marshall Rev. Intell. Prop. L. 424 (2013), Michael L. Boyle

UIC Review of Intellectual Property Law

“Cyberanarchy,” broadly refers to the idea that legal regulation of the Internet is an infeasible objective. One prime example is current online enforcement mechanisms’ inability to quell copyright infringement. These mechanisms do little more than perpetuate a technological arms race between copyright holders and infringers. Moreover, with notable public relations failures, such as the RIAA lawsuits and digital rights management schemes, society has taken on a nonchalant attitude towards online infringement. Examining traditional justifications behind obedience to the law, this blasé attitude takes root in societal feelings of inadequacy both in “normative” and “instrumental” perspectives of justice. Normatively, there lacks …


Outspoken: Social Media And The Modern College Athlete, 12 J. Marshall Rev. Intell. Prop. L. 509 (2013), Meg Penrose Jan 2013

Outspoken: Social Media And The Modern College Athlete, 12 J. Marshall Rev. Intell. Prop. L. 509 (2013), Meg Penrose

UIC Review of Intellectual Property Law

The First Amendment to the United States Constitution grants American citizens the right to free speech. However, in the case of college athletes, this right is not without limitation. In exchange for the privilege of participating in college level athletics, college athletes voluntarily agree to terms that restrict their abilities to speak freely, specifically in the context of social media platforms. This article details situations in which college athletes have made offensive statements via social media for which they later needed to delete, explain, and apologize. These examples support the notion that restrictions on college athletes’ speech are not only …