Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Cleveland State Law Review (2)
- Washington Journal of Law, Technology & Arts (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- American University International Law Review (1)
- Brooklyn Journal of International Law (1)
-
- Catholic University Journal of Law and Technology (1)
- Fordham Journal of Corporate & Financial Law (1)
- Indiana Journal of Global Legal Studies (1)
- Indiana Law Journal (1)
- Journal of Digital Forensics, Security and Law (1)
- Northwestern Journal of International Law & Business (1)
- Pepperdine Law Review (1)
- Richmond Journal of Law & Technology (1)
Articles 1 - 15 of 15
Full-Text Articles in Law
“This Artwork Is Always On Sale”: The Need For A U.S. Resale Royalty Right For Digital Visual Artists In This Technological Age, And Proof Of Concept Through The Blockchain And Nfts Explosion, Janae Camacho
Washington Journal of Law, Technology & Arts
With the explosion of the internet, social media, non-fungible tokens (“NFTs”), and blockchain technology, there has been a shift in how people consume and commercialize art, thus resulting in the increased use of digital visual mediums to create, purchase, and receive payment for visual artwork. This increase has renewed the question of whether the United States should implement a resale royalty right for visual work artists. This question is of concern, especially in this digital age where it has become more difficult for digital visual artists to receive equitable compensation for their work, like that of their musical and written …
Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh
Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh
American University International Law Review
The continued increase in the use of ransomware by cyber criminals has had a costly impact on businesses and organizations around the world. Ransomware groups continue to initiate attacks on businesses and organizations, and states have become increasingly concerned over the potential impact it may have on their critical infrastructure and economies. The United States’ recent acknowledgement of cyber operations against ransomware groups highlights the seriousness of the issue and exposes areas of international law that are complicated when applied to cyber operations against these groups. This Comment explores the relevant international law as it applies to the United States …
New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya
New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya
Catholic University Journal of Law and Technology
A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …
Aransemen Kontemporer Musik Tradisional Sebagai Inovasi Pemajuan Kebudayaan Dalam Lingkup Hak Kekayaan Intelektual, Mohammad Ryan Hernandi
Aransemen Kontemporer Musik Tradisional Sebagai Inovasi Pemajuan Kebudayaan Dalam Lingkup Hak Kekayaan Intelektual, Mohammad Ryan Hernandi
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Traditional Knowledge and Traditional Cultural Expressions are traditional forms of intellectual property that are closely related to copyright within the scope of Intellectual Property Rights (IPR). Among the various types of Expressions of Folklore in Indonesia, traditional music and songs are one of them. Traditional music is music or sound art found in various regions of Indonesia that is born and develops and is passed down from one generation to the next. Traditional music usually uses the language, style, and traditions of the region it originates from. The traditional music of each region has its own characteristics, for example, the …
Patents And The Pandemic: Intellectual Property, Social Contracts, And Access To Vaccines, Peter Lee
Patents And The Pandemic: Intellectual Property, Social Contracts, And Access To Vaccines, Peter Lee
Washington Journal of Law, Technology & Arts
Through enormous public support and private initiative, biopharmaceutical firms developed safe and effective COVID-19 vaccines in record time. These remarkable vaccines represent humanity’s best chance to end the devastating pandemic. However, difficult questions about ownership and access have arisen alongside the development and deployment of these vaccines. Biopharmaceutical companies have patented many of the technologies underlying these vaccines, thus seeming to pit intellectual property rights against the objective of wide and rapid dissemination of these critical resources. While prevailing debates have been framed in the language of intellectual property, this Article suggests that contract principles can help break the impasse …
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Brooklyn Journal of International Law
In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …
Kill The Dinosaurs, And Other Tips For Achieving Technical Competence In Your Law Practice, Antigone Peyton
Kill The Dinosaurs, And Other Tips For Achieving Technical Competence In Your Law Practice, Antigone Peyton
Richmond Journal of Law & Technology
It is a challenge to practice law in the digital age. This is particularly true when a practice involves significant e-Discovery, Intellectual Property, and technology law—areas in which technical issues merge with legal ones. One of the major challenges of bringing a law practice up to twenty-first-century standards relates to dinosaur thoughts, a.k.a. an “old ways are best” mentality.
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Pepperdine Law Review
No abstract provided.
It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr.
It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr.
Fordham Journal of Corporate & Financial Law
This Article asserts that the move from the industrial age to the
information age represents a fundamental change to our society on
such a widespread basis that the legal order must reexamine the
premises about how our society functions, assessing whether
foundational elements of U.S. Common Law remain valid. This
Article first confronts briefly the continuing acceptance of certain
foundational premises in contract and intellectual property law,
illustrating that such premises are no longer supported by the
realities of modern society. With fundamental change challenging
multiple areas of law in the information age, this problem is worthy
of widespread inquiry …
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Journal of Digital Forensics, Security and Law
The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …
Capturing Ideas: Copyright And The Law Of First Possession, Abraham Drassinower
Capturing Ideas: Copyright And The Law Of First Possession, Abraham Drassinower
Cleveland State Law Review
Part II of this paper, entitled “Wish and Deed,” sets forth an account of the law of first possession through an analysis of the classic case of Pierson v. Post. Part III, entitled “Idea and Expression,” briefly sets forth an account of the idea/expression dichotomy in copyright law through discussion of the classic case of Nichols v. Universal Pictures Corporation. On that basis, Part III unfolds a correspondence between animus and factum in property law and idea and expression in copyright law. Part IV, entitled “Things and Speech,” suggests through discussion of the classic case of Feist that central doctrines …
Exporting Dmca Lockouts, Anupam Chander
Exporting Dmca Lockouts, Anupam Chander
Cleveland State Law Review
My goal here is limited. I do not attack the anti-circumvention provisions of the DMCA as wholly misguided; the desire to prevent widespread piracy of copyrighted works is understandable. At the same time, I do not mean to suggest that the critique I offer here is the sum of the adverse consequences of that statute, including for speech and education. My argument is limited to the threat posed by the export of the DMCA anti-circumvention rules, which do not explicitly guard against the anti-competitive use of those rules.Part I briefly sketches the difficulties created domestically by a DMCA inattentive to …
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
Northwestern Journal of International Law & Business
The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …
Considering Multiple And Overlapping Sovereignties: Liberalism, Libertarianism, National Sovereignty, "Global" Intellectual Property, And The Internet, Keith Aoki
Indiana Journal of Global Legal Studies
No abstract provided.
Copyright And Software Technology Infringement: Defining Third Party Development Rights, Raymond T. Nimmer, Patricia A. Krauthaus
Copyright And Software Technology Infringement: Defining Third Party Development Rights, Raymond T. Nimmer, Patricia A. Krauthaus
Indiana Law Journal
No abstract provided.