Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Law

Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


The Final Impression Counts - Seeking Common Ground In Design Patent Infringement, Dana Beldiman, Paolo Beconcini Aug 2015

The Final Impression Counts - Seeking Common Ground In Design Patent Infringement, Dana Beldiman, Paolo Beconcini

Dana Beldiman

THE FINAL IMPRESSION COUNTS – Seeking Common Ground in Design Patent Infringement

Dana Beldiman*and Paolo Beconcini

Abstract

The visual appearance of products has become an asset of considerable economic value. Litigation surrounding it is increasingly common and has focused IP law on certain tensions that relate to the visual nature of IP assets.

One such area is design patent infringement. Policy mandates that comparison of two similar designs for purposes of evaluating infringement be performed by a notional purchaser, based on the overall impression of a design as whole. However, in performing the analysis courts are tempted to …


The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez Apr 2015

The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez

Christopher McElwain

Just as China’s factories disrupted the economics of IT hardware, its research labs have the potential to disrupt the economics of the technology itself. In 2014, China’s patent office received nearly 2.4 million patent applications, 93% from domestic applicants. China has also climbed to third place in terms of international applications, with over 21,000 WIPO PCT applications. Meanwhile, China has taken an assertive role in setting technology standards, both at the national and international levels. In the past, this has included developing and promoting alternatives to important IT standards as a means of challenging perceived monopolies by certain (foreign-dominated) technologies. …


Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno Feb 2015

Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno

Constance E. Bagley

In 2014, the European Commission announced the launch of a study of knowledge transfer by public research organizations and other institutes of higher learning “to determine which additional measures might be needed to ensure an optimal flow of knowledge between the public research organisations and business thereby contributing to the development of the knowledge based economy.” As the European Commission has recognized, the EU needs to take action to “unlock the potential of IPRs [intellectual property rights] that lie dormant in universities, research institutes and companies.” This article builds on our earlier work on structuring efficient pharmaceutical public-private partnerships (PPPPs) …


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood Sep 2014

One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood

Jonathan R. K. Stroud

Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett May 2014

The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett

Jonathan M Barnett

Voluntary forfeiture of intellectual assets—often, exceptionally valuable assets--is surprisingly widespread in information technology markets. A simple economic rationale can account for these practices. By giving away access to core technologies, a platform holder commits against expropriating (and thereby induces) user investments that support platform value. To generate revenues that cover development and maintenance costs, the platform holder must regulate access to other goods and services within the total consumption bundle. The tradeoff between forfeiting access (to induce adoption) and regulating access (to recover costs) anticipates the substantial convergence of open and closed innovation models. Organizational patterns in the software and …


From Patent Thickets To Patent Networks: The Legal Infrastructure Of The Digital Economy, Jonathan M. Barnett May 2014

From Patent Thickets To Patent Networks: The Legal Infrastructure Of The Digital Economy, Jonathan M. Barnett

Jonathan M Barnett

Scholarly and popular commentary often assert that markets characterized by intensive patent issuance and enforcement suffer from “patent thickets” that suppress innovation. This assertion is difficult to reconcile with continuous robust levels of R&D investment, coupled with declining prices, in technology markets that have operated under intensive patent issuance and enforcement for several decades. Using network visualization software, I show that information and communication technology markets rely on patent pools and other cross-licensing structures to mitigate or avoid patent thickets and associated inefficiencies. Based on the composition, structure, terms and pricing of selected leading patent pools in the ICT market, …


To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …


The Infringement Continuum, Bernard H. Chao Apr 2014

The Infringement Continuum, Bernard H. Chao

Bernard H Chao

For many years, patent law has struggled with the issue of permissible claim scope. A patent’s specification and its claims often suffer from a surprising disconnect. The specification generally describes an invention in terms of one or more specific implementations; suggesting a relatively narrow invention. But claims are drafted far more broadly. They frequently encompass unforeseen variations and even cover after arising technology.

Although there are numerous existing doctrines that try to prevent claims from straying too far from their specification, these doctrines offer binary outcomes ill-suited for patent law. Under these doctrines, as a claim encompasses subject matter further …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Social Innovation, Peter Lee Jan 2014

Social Innovation, Peter Lee

Peter Lee

This Article provides the first legal examination of the immensely valuable but underappreciated phenomenon of social innovation. Innovations such as cognitive behavioral therapy, microfinance, and strategies to reduce hospital-based infections greatly enhance social welfare yet operate completely outside of the patent system, the primary legal mechanism for promoting innovation. This Article draws on empirical evidence to elucidate this significant kind of innovation and explore its divergence from the classic model of technological innovation championed by the patent system. In so doing, it illustrates how patent law exhibits a rather crabbed, particularistic conception of innovation. Among other characteristics, innovation in the …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock Jan 2014

An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock

Ferris K Nesheiwat

This article seeks to provide a socio-legal framework for the examination of the attitude of a section of the Jordanian public towards intellectual property rights (IPRs), using copyright protected software as an example; it provides an overview of perceptions of IPRs within an Arabic and predominantly Muslim society, and examines how such perceptions impact attitudes towards abiding with, and enforcement of, IPRs. Through its analytical value and empirical research, this paper fills a void in the availability of reliable empirical data in Jordan as part of the analysis to gauge the impact of intellectual property (IP) laws. A review of …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski May 2013

A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Michael J. Malinowski

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


Game Over For First Sale, Stephen J. Mcintyre Mar 2013

Game Over For First Sale, Stephen J. Mcintyre

Stephen J McIntyre

Video game companies have long considered secondhand game retailers a threat to their bottom lines. With the next generation of gaming consoles on the horizon, some companies are experimenting with technological tools to discourage and even prevent gamers from buying and selling used games. Most significantly, a recent patent application describes a system for suppressing secondhand sales by permanently identifying game discs with a single video game console. This technology flies in the face of copyright law’s “first sale” doctrine, which gives lawful purchasers the right to sell, lease, and lend DVDs, CDs, and other media. This Article answers a …


The World As Our Technologist: Visualizing Worldwide Sources Of Technologies Patented In The United States, Richard S. Gruner Mar 2013

The World As Our Technologist: Visualizing Worldwide Sources Of Technologies Patented In The United States, Richard S. Gruner

Richard S. Gruner

The World as Our Technologist: Visualizing Worldwide Sources

of Technologies Patented in the United States

by

Richard Gruner

Emeritus Professor of Law

John Marshall Law School

ABSTRACT

Patent rewards in the United States incentivize and attract the overseas development of many new technologies used in this country. The United States – as the world’s largest economy – is the primary driver of technology development worldwide. The strength of United States patent laws, court systems, and civil law enforcement processes ensure that parties who produce new inventions of commercial value and who patent and popularize the inventions in the United States …


Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou Feb 2013

Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou

Hong Lou

In China, the amount of copyright infringement disputes cases related to ISPs is rapid increasing, and current legislation seems to be insufficient to regulate these problems. Moreover, there is a chaos in different courts around China using different approaches and standards on search engines' secondary liability.Therefore, how to improved Chinese copyright legislation and unite relevant judgments with reasonable approaches has become an urgent task. The purpose of this essay is to compare legislation and legal practice in China and the US, to point out the tendency of ISPs' secondary copyright liability in these two countries, and to make useful suggestions …


Patents And The University, Peter Lee Feb 2013

Patents And The University, Peter Lee

Peter Lee

This Article advances two novel claims about the internalization of academic science within patent law and the concomitant evolution of “academic exceptionalism.” Historically, relations between patent law and the university were characterized by mutual exclusion, based in part on normative conflicts between academia and exclusive rights. These normative distinctions informed “academic exceptionalism”—the notion that the patent system should exclude the fruits of academic science or treat academic entities differently than other actors—in patent doctrine. As universities began to embrace patents, however, academic science has become internalized within the traditional commercial narrative of patent protection. Contemporary courts frequently invoke universities’ commercial …


Intellectual Property, Ag-Biotech And The Right To Adequate Food: A Critical African Perspective, Chidi Oguamanam Jan 2013

Intellectual Property, Ag-Biotech And The Right To Adequate Food: A Critical African Perspective, Chidi Oguamanam

Chidi Oguamanam

Recent transformations in agricultural innovations have resulted in the consolidation of intellectual property rights in the agricultural arena resulting in an ongoing struggle for the control of plant genetic resources. For many developing countries, especially in Africa, traditional and communal-based artisanal farmers are the producers of over three quarters of regional food supply. But contemporary techno-legal transformations in agriculture undermine the critical role of these informal actors in a manner that aggravates the state of regional food insecurity in Africa. The aspirations of African countries to implement their obligations in regard to the right to adequate food under the International …


What Should Be Patentable? A Proposal For Determining The Existence Of Statutory Subject Matter Under 35 U.S.C. Sec. 101, Andrew Beckerman Rodau Jan 2013

What Should Be Patentable? A Proposal For Determining The Existence Of Statutory Subject Matter Under 35 U.S.C. Sec. 101, Andrew Beckerman Rodau

Andrew Beckerman Rodau

The question of what type of inventions should be protectable under patent law is a controversial issue that has received significant attention. Recent Supreme Court decisions reject a bright line test in favor of a more-opened ended approach to determining patent eligibility. Unfortunately, this provides limited guidance to lower courts and consequently the issue remains unsettled. Most inventions fit within the statutory requirements defining patent-eligible inventions. This article will examine the scope of patent-eligible subject matter defined by patent law section 101. It will look at judicial interpretation of the statute including exceptions judicially engrafted onto the statute by the …


Formalism And Pragmatism In The Analysis Of Damages For Indirect Patent Infringement, Dmitry Karshtedt Jan 2013

Formalism And Pragmatism In The Analysis Of Damages For Indirect Patent Infringement, Dmitry Karshtedt

Dmitry Karshtedt

No abstract provided.