Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 14 of 14
Full-Text Articles in Entire DC Network
Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook
ExpressO
This Comment assesses the use of the Alien Tort Statute (“ATS”) as a jurisdictional basis for claims of international copyright infringement occurring outside of the United States. Under the ATS, aliens may sue in United States district courts for torts that amount to violations of treaties or the law of nations.
Given that copyright infringement is a tort, an alien may only be able to establish ATS jurisdiction in a suit of extraterritorial infringement if the infringement violated a treaty or the law of nations. This comment argues that extraterritorial copyright infringement does indeed amount to a violation of the …
Space Program And Business In India - Legal Perspectives, Shashi Sharma
Space Program And Business In India - Legal Perspectives, Shashi Sharma
ExpressO
No abstract provided.
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
ExpressO
This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …
Global Pharmaceutical Patent Law In Developing Countries- Amending Trips To Promote Access For All, Angela J. Anderson
Global Pharmaceutical Patent Law In Developing Countries- Amending Trips To Promote Access For All, Angela J. Anderson
ExpressO
This comment will analyze the need to amend and revise the current global pharmaceutical patent system under TRIPS to take into account the needs of developing countries and overall public health. This comment will emphasize that the current international trade rules, which although administered by the WTO, are dictated by developed country governments and powerful pharmaceutical companies, and therefore, without reform will further diminish the access of poor people in developing countries to vital medicines. Part II of this comment will provide a general overview of the international trade law governing patents on pharmaceuticals focusing specifically on the development of …
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson
ExpressO
“Privacy” is one of the fastest growing areas of the law, due in part to the explosion of the Internet over the past decade. When we speak of privacy in the Internet age, we typically mean data protection, the regulation of the use of personal information about individuals by private interests, such as corporations. Unfortunately, much of the discourse on the subject adopts a framework more suitable to traditional privacy, an inviolable “right to be let alone” by the state. Rather than create a sacrosanct right against the government, the modern incarnation of privacy actually creates a quasi-property right, where …
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
ExpressO
As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …
Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding
Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding
ExpressO
Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens
Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens
ExpressO
The article discusses broadly the music piracy problem in Russia, the current state of Russia’s copyright laws, and how its laws and problems compare to the U.S. and the rest of the world. In particular, the article focuses on music piracy through the Internet and how it has exploded in Russia. One of the websites I target is the infamous Allofmp3.com, which has attracted a large amount of U.S. attention in recent times by consumers as well as lawmakers. The article analyzes the legislative and enforcement deficiencies in Russia that led to the enormous problem with traditional music piracy and …
Sharing Potential And The Potential For Sharing: Open Source Licensing As A Legal And Economic Modality For The Dissemination Of Renewable Energy Technology, Jason Wiener
ExpressO
No abstract provided.
The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton
The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton
ExpressO
The Digital Millennium Copyright Act (‘DMCA’) prevents unauthorized copying and distribution of digital copyright works by regulating devices that can be used to circumvent Digital Rights Management (‘DRM’) measures that are used to restrict access to those works. A significant problem is that those devices, like many new technologies, have the potential to be used for both socially harmful and socially beneficial purposes. There is no obvious way for Congress to regulate circumvention devices to prevent the social harms, while at the same time facilitating the social benefits they might provide. Recent judicial interpretations of the DMCA have unsurprisingly erred …
Communication Breakdown?: The Future Of Global Connectivity After The Privatization Of Intelsat, Kenneth D. Katkin
Communication Breakdown?: The Future Of Global Connectivity After The Privatization Of Intelsat, Kenneth D. Katkin
ExpressO
In 1971, 85 nations (including the United States) formed the International Telecommunications Satellite Organization “INTELSAT,” a public intergovernmental treaty organization. INTELSAT was charged with operating the world’s first global telecommunications satellite system, in order to guarantee the interconnectedness of the world’s communications systems and the availability of international telecommunications service to every nation on earth. By the late 1980s, however, INTELSAT’s operations began to experience substantial competition from the private sector. In 2000, the proliferation of privately-owned telecommunications satellites and transoceanic fiber optic cables led the U.S. Congress to mandate the privatization of INTELSAT. That privatization process began in 2001, …