Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- BLR (27)
- Fordham Law School (23)
- UIC School of Law (21)
- Schulich School of Law, Dalhousie University (17)
- Marquette University Law School (14)
-
- Northwestern Pritzker School of Law (14)
- University of Michigan Law School (12)
- UC Law SF (11)
- University of Richmond (11)
- Chicago-Kent College of Law (10)
- Columbia Law School (10)
- Maurer School of Law: Indiana University (10)
- Boston University School of Law (9)
- Santa Clara Law (9)
- University of Pennsylvania Carey Law School (9)
- Mitchell Hamline School of Law (8)
- SelectedWorks (8)
- University of New Hampshire (8)
- American University Washington College of Law (7)
- Selected Works (7)
- Texas A&M University School of Law (7)
- Duke Law (6)
- Brigham Young University Law School (4)
- Georgetown University Law Center (4)
- University at Buffalo School of Law (4)
- University of Washington School of Law (4)
- Vanderbilt University Law School (4)
- Villanova University Charles Widger School of Law (4)
- William & Mary Law School (4)
- Mercer University School of Law (3)
- Keyword
-
- Copyright (40)
- Intellectual Property Law (32)
- Intellectual property (32)
- Internet (15)
- Patent (15)
-
- Patents (15)
- Patent law (14)
- Trademark (14)
- Copyright law (11)
- Law (11)
- Technology (11)
- Copyright infringement (10)
- International Law (10)
- Journal (10)
- Legal (10)
- NJTIP (10)
- Northwestern Journal of Technology and Intellectual Property (10)
- Federal Circuit (9)
- Google (9)
- Science and Technology (9)
- Software (8)
- Trademarks (8)
- Adwords (7)
- Biotechnology (7)
- International Trade (7)
- Law and Society (7)
- Copyright Law (6)
- Infringement (6)
- Intellectual Property (6)
- Law and Economics (6)
- Publication
-
- Faculty Scholarship (31)
- ExpressO (26)
- Fordham Intellectual Property, Media and Entertainment Law Journal (23)
- UIC Review of Intellectual Property Law (17)
- Canadian Journal of Law and Technology (16)
-
- Marquette Intellectual Property Law Review (14)
- All Faculty Scholarship (11)
- Chicago-Kent Journal of Intellectual Property (10)
- Northwestern Journal of Technology and Intellectual Property (10)
- Articles (9)
- UC Law SF Communications and Entertainment Journal (9)
- Gabriel Martinez Medrano (8)
- Richmond Journal of Law & Technology (8)
- Rosetta Stone v. Google (Joint Appendix) (8)
- William Mitchell Law Review (7)
- Law Faculty Scholarship (6)
- Michigan Telecommunications & Technology Law Review (6)
- Articles by Maurer Faculty (5)
- Duke Law & Technology Review (5)
- Faculty Publications (5)
- Scholarly Works (5)
- American University Law Review (4)
- Buffalo Intellectual Property Law Journal (4)
- Georgetown Law Faculty Publications and Other Works (4)
- Jeffrey S. Moorad Sports Law Journal (4)
- Northwestern Journal of International Law & Business (4)
- William & Mary Law Review (4)
- Brigham Young University Education and Law Journal (3)
- Mercer Law Review (3)
- UIC Law Review (3)
- Publication Type
Articles 1 - 30 of 337
Full-Text Articles in Law
United States Antitrust Policy In An Age Of Ip Expansion, Herbert J. Hovenkamp
United States Antitrust Policy In An Age Of Ip Expansion, Herbert J. Hovenkamp
All Faculty Scholarship
The idea that there is a tension between antitrust and the intellectual property laws is readily exaggerated. The tension that exists results mainly from our uncertainty about the optimal amount and scope of IP protection. In general, antitrust draws clearer lines than intellectual property law does, although one should not push the point too far. Antitrust policy as manifested in the courts has achieved a fair amount of consensus today. By contrast, deep uncertainty remains about fundamental questions concerning the socially optimal outcome of IP disputes. In addition, while the antitrust statutes are for the most part public regarding provisions …
An Introduction To Lessigian Thought, Russ Taylor
An Introduction To Lessigian Thought, Russ Taylor
Federal Communications Law Journal
Book Review: Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity, Lawrence Lessig, New York: Penguin Press, 2004, 306 pages.
A review of Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity by Lawrence Lessig. Lawrence Lessig is a frequent commentator and prolific writer on media and communications topics. His body of work touches copyright issues, radio spectrum policy, media ownership issues, and legal ownership and control of the physical platforms that deliver broadband content. In this 2004 publication, he focuses on copyright policy. …
Tasini And Its Progeny: The New Exclusive Right Or Fair Use On The Electronic Publishing Frontier?, Lateef Mtima
Tasini And Its Progeny: The New Exclusive Right Or Fair Use On The Electronic Publishing Frontier?, Lateef Mtima
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Switzerland's Patent Law History , Dominique S. Ritter
Switzerland's Patent Law History , Dominique S. Ritter
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Human Rights And Copyright: The Introduction Of Natural Law Considerations Into American Copyright Law , Orit Fischman Afori
Human Rights And Copyright: The Introduction Of Natural Law Considerations Into American Copyright Law , Orit Fischman Afori
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Operation Blackbeard: Is Government Prioritization Enough To Deter Intellectual Property Criminals?, Lauren E. Abolsky
Operation Blackbeard: Is Government Prioritization Enough To Deter Intellectual Property Criminals?, Lauren E. Abolsky
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Amateur-To-Amateur, Dan Hunter, F. Gregory Lastowka
Amateur-To-Amateur, Dan Hunter, F. Gregory Lastowka
William & Mary Law Review
Copyright, it is commonly said, matters in society because it encourages the production of socially beneficial, culturally significant expressive content. Our focus on copyright's recent history, however, blinds us to the social information practices that have always existed. In this Article, we examine these social information practices, and query copyright's role within them. We posit a functional model of what is necessary for creative content to move from creator to user. These are the functions dealing with the creation, selection, production, dissemination, promotion, sale, and use of expressive content. We demonstrate how centralized commercial control of information content has been …
The Impact Of Pro-Football Inc. V. Harjo On Trademark Protection Of Other Marks, Rachel Clark Hughey
The Impact Of Pro-Football Inc. V. Harjo On Trademark Protection Of Other Marks, Rachel Clark Hughey
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Doing Their Jobs: An Argument For Greater Media Access To Settlement Agreements, Suzanna M. Meyers
Doing Their Jobs: An Argument For Greater Media Access To Settlement Agreements, Suzanna M. Meyers
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz
Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz
ExpressO
No abstract provided.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Laura Quilter
Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Amicus Briefs
Amicus on behalf of the Internet Archive and the CCIA, requesting the Supreme Court of the United States to deny the petition for certiorari in the MGM v. Grokster case.
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Mgm V. Grokster, Brief Amici Curiae Of The Computer & Communications Industry Association And Internet Archive, In Opposition To The Writ Of Certiorari, To The United States Supreme Court, Laura Quilter, Peter Jaszi
Peter Jaszi
Re-Reifying Data, James Gibson
Re-Reifying Data, James Gibson
Law Faculty Publications
There's a war on between those who view digital technology as a reason to expand intellectual property law and those who oppose this expansion. One front in the war is technological: the pro-expansionists enclose their products in restrictive code, which the anti-expansionists circumvent and hack. A second is legislative: the pro-expansionists seek extended copyright duration, favorable changes to contract law, and other new legal entitlements, while the anti-expansionists lobby for the opposite. And a third front is a combination of the first two: it is technological. On this battlefield, the pro-expansionists use the law to fortify their technological protections. But …
Copyright's Communications Policy, Timothy Wu
Copyright's Communications Policy, Timothy Wu
Michigan Law Review
There is something for everyone to dislike about early twenty-first century copyright. Owners of content say that newer and better technologies have made it too easy to be a pirate. Easy copying, they say, threatens the basic incentive to create new works; new rights and remedies are needed to restore the balance. Academic critics instead complain that a growing copyright gives content owners dangerous levels of control over expressive works. In one version of this argument, this growth threatens the creativity and progress that copyright is supposed to foster; in another, it represents an "enclosure movement" that threatens basic freedoms …
Hyperownership In A Time Of Biotechnological Promise: The International Conflict To Control The Building Blocks Of Life, Sabrina Safrin
Hyperownership In A Time Of Biotechnological Promise: The International Conflict To Control The Building Blocks Of Life, Sabrina Safrin
Rutgers Law School (Newark) Faculty Papers
This article addresses the corrosive interplay between the patent-based and the sovereign- based systems of ownership of genetic material. In patent-based systems, genetic material is increasingly “owned” by corporations or research institutions which obtain patents over such material. In sovereign-based systems, the national government owns or extensively controls such material. As more patents issue for synthesized genes in developed countries through the patent system, more raw genetic material is legally enclosed by the governments of developing nations, which house most of the world’s wild or raw genetic material. This interactive spiral of increased enclosure results in the sub-optimal utilization, conservation …
Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola
Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola
Michigan Telecommunications & Technology Law Review
Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …
The Experimental Purpose Doctrine And Biomedical Research, Tao Huang
The Experimental Purpose Doctrine And Biomedical Research, Tao Huang
Michigan Telecommunications & Technology Law Review
The experimental use doctrine is a common law rule in patent law that until a few years ago excused accused infringers who made and used patented products or processes on the basis of an experimental, educational, or nonprofit purpose when there was de minimis economic injury to the patent owner and de minimis economic gain to the infringer. While the application of the experimental purpose doctrine was always narrow, two recent Federal Circuit decisions indicate that there is not much left under its aegis. In Madey v. Duke University, the Federal Circuit strictly limited the application of the experimental purpose …
Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine
Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine
Michigan Telecommunications & Technology Law Review
Some inventions never see the light of day. Others enter the spotlight after long delays and the factors that slowed the arrival of that innovation are ignored. Technology suppression is a real occurrence involving well known and widely used products. In this Article, we examine the topic of technology suppression, seeking to reveal the tactics of suppression and the patterns and conditions under which it occurs. Current examples of US technologies are used to highlight the significance of this phenomenon. We consider related factors, including market and innovation forces, and we identify suppressive tactics, using illustrative cases where patent nonuse …
Are Decss T-Shirts Dirty Laundry? Wearable, Non-Executable Computer Code As Protected Speech, Sara Crasson
Are Decss T-Shirts Dirty Laundry? Wearable, Non-Executable Computer Code As Protected Speech, Sara Crasson
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
How Do You Say “Big Media” In Spanish? Spanish-Language Media Regulation And The Implications Of The Univision-Hispanic Broadcasting Merger On The Public Interest, Nicole Serratore
How Do You Say “Big Media” In Spanish? Spanish-Language Media Regulation And The Implications Of The Univision-Hispanic Broadcasting Merger On The Public Interest, Nicole Serratore
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Post-Grant Patent Invalidation In China And In The United States, Europe, And Japan: A Comparative Study, Haito Sun
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
An Examination Of Patents, Licensing, Research Tools, And The Tragedy Of The Anticommons In Biotechnology Innovation, Michael S. Mireles
An Examination Of Patents, Licensing, Research Tools, And The Tragedy Of The Anticommons In Biotechnology Innovation, Michael S. Mireles
University of Michigan Journal of Law Reform
The continued development of and affordable access to potentially life saving pharmaceuticals, gene therapies and diagnostics is unquestionably a socially important issue. However, crafting government policy to encourage the development of and allowing affordable access to those services and products is difficult. On one hand, the development of those services and products requires a large investment of funds because of the complexity, collaborative nature, and uncertainty of the development of those products and services. Accordingly, investors require the safety of strong and stable patent rights to ensure a return on their investment in the development of a commercial end-product or …
An Industrial Organization Approach To Copyright Law, Michael Abramowicz
An Industrial Organization Approach To Copyright Law, Michael Abramowicz
William & Mary Law Review
No abstract provided.
Nickled And Dimed: The Dispute Over Intellectual Property Rights In The Bluenose Ii, Teresa Scassa
Nickled And Dimed: The Dispute Over Intellectual Property Rights In The Bluenose Ii, Teresa Scassa
Dalhousie Law Journal
The Bluenose Schooner forms part of the folk history of Nova Scotia, and is a Canadian icon. Popular assumptions that Its name and image formed part of the public domain were put to the test in 2003 when the Bluenose II Preservation Trust Society brought suit against a Halifax business for Infringement of its official marks, trademarks and copyrights relating to the ship and its name. The litigation garnered local and national media attention, and the provincial government soon became involved in the dispute In this article, the author provides some background to the dispute before moving on to consider …
Voyeur War? The First Amendment, Privacy & Images From The War On Terrorism, Clay Calvert
Voyeur War? The First Amendment, Privacy & Images From The War On Terrorism, Clay Calvert
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Speaking With A Forked Tongue In The Global Debate On Traditional Knowledge And Genetic Resources: Is U.S. Intellectual Property Law And Policy Really Aimed At Meaningful Protection For Native American Cultures?, Nancy Kremers
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Intellectual Property At A Crossroads: Why History Matters, Peter K. Yu
Intellectual Property At A Crossroads: Why History Matters, Peter K. Yu
Faculty Scholarship
Intellectual property is at a crossroads today. As the Commission on Intellectual Property Rights noted in its final report, “[o]ver the last twenty years or so there has been an unprecedented increase in the level, scope, territorial extent and role of IP right protection.” From the rapid privatization and commodification of information to the creation of property rights in bioengineered microorganisms and lifeforms, recent developments in the intellectual property field have sparked major controversies, calling into questions our values, worldviews, and the way society protects and incentivizes human creations and innovations. To grapple with these difficult questions, courts and commentators …
Currents And Crosscurrents In The International Intellectual Property Regime, Peter K. Yu
Currents And Crosscurrents In The International Intellectual Property Regime, Peter K. Yu
Faculty Scholarship
Since the establishment of the TRIPs Agreement, intellectual property protection has been expanding rapidly, and many less developed countries have become dissatisfied with the international intellectual property regime. From bilateral free trade agreements to the increasing use of technological protection measures, many commentators fear that the recent "one-way ratchet" will roll back the substantive and strategic gains made by less developed countries during the negotiation of the TRIPS Agreement. Interestingly, intellectual property rightsholders feel equally threatened by the recent developments, in particular the development of the Doha Declaration, the World Summit on the Information Society, the WIPO Development Agenda, and …
The Origins Of Cctld Policymaking, Peter K. Yu
The Origins Of Cctld Policymaking, Peter K. Yu
Faculty Scholarship
Extract:
A long time ago in a galaxy not so far away, there was a decentralized global network of computers. These computers shared information with each other regardless of how far apart they were and whether there was any direct line of communication between them. In the very beginning, this network was used exclusively by government and military agencies, educational and research institutions, government contractors, scientists, and technology specialists. Instead of the domain names we use today, such as “www. amazon.com,” users typed in numeric addresses, such as “123.45.67.89,” and, later, host names to send information to other computers.
This …