Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Legislation

University of Michigan Law School

2016

Third parties

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Improving Patent Quality Through Post-Grant Claim Amendments: A Comparison Of European Opposition Proceedings And U.S. Post-Grant Proceedings, Jennifer Turchyn Jun 2016

Improving Patent Quality Through Post-Grant Claim Amendments: A Comparison Of European Opposition Proceedings And U.S. Post-Grant Proceedings, Jennifer Turchyn

Michigan Law Review

Congress enacted the Leahy-Smith America Invents Act to encourage innovation, strengthen U.S. patents, and achieve greater uniformity with foreign patent systems. The America Invents Act introduced two new post-grant patent validity proceedings: inter partes review and post-grant review. The new U.S. proceedings are similar to European opposition proceedings, but there are significant differences in the extent of the patent owner’s ability to amend claims, the patent’s claim construction, the patent owner’s evidentiary burden, and the procedural requirements. The U.S. proceedings result in a very limited opportunity for amendment and a high percentage of invalidated patents. In contrast, European opposition proceedings …


Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers Jan 2016

Protecting Personal Information: Achieving A Balance Between User Privacy And Behavioral Targeting, Patrick Myers

University of Michigan Journal of Law Reform

Websites and mobile applications provide immeasurable benefits to both users and companies. These services often collect vast amounts of personal information from the individuals that use them, including sensitive details such as Social Security numbers, credit card information, and physical location. Personal data collection and dissemination leave users vulnerable to various threats that arise from the invasion of their privacy, particularly because users are often ignorant of the existence or extent of these practices. Current privacy law does not provide users with adequate protection from the risks attendant to the collection and dissemination of their personal information. This Note advocates …