Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

PDF

2012

Intellectual property

Institution
Publication
Publication Type

Articles 61 - 73 of 73

Full-Text Articles in Law

One Work, Three Infringers: Calculating The Correct Number Of Separate Awards Of Statutory Damages In A Copyright Infringement Action, Timothy L. Warnock Jan 2012

One Work, Three Infringers: Calculating The Correct Number Of Separate Awards Of Statutory Damages In A Copyright Infringement Action, Timothy L. Warnock

Vanderbilt Journal of Entertainment & Technology Law

Columbia Pictures provides the most persuasive analysis of the correct number of separate awards of statutory damages available to a plaintiff. Lime Group recognized that the question was a particularly close one, and the court erred in reaching the opposite result from Columbia Pictures. The Lime Group analysis is based on a fundamentally flawed earlier decision and relies, in the end, on an approach as likely to reward infringers rather than defend the rights of copyright holders: determining whether the potential result in any given case is absurd. Regarding the hypothetical case provided at the beginning of this Essay, Warren …


Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper Jan 2012

Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper

Articles in Law Reviews & Other Academic Journals

Stolen information technology (IT) is a domestic and global problem. Theft of IT by upstream producers has a pernicious effect on the competitive market and violates fundamental policies designed to protect those who create and invent such assets. Companies profiting from stolen IT are not just free-riding on the successes of those who design and produce the products and ideas that are a driving force in the U.S. economy – they are destabilizing rational pricing and distorting lawful competition by virtue of outright theft. Current legal recourse is insufficient to address such misconduct; new approaches are needed at the state …


Sex Exceptionalism In Intellectual Property, Jennifer E. Rothman Jan 2012

Sex Exceptionalism In Intellectual Property, Jennifer E. Rothman

All Faculty Scholarship

The state regulates sexual activity through a combination of criminal and civil sanctions and the award of benefits, such as marriage and First Amendment protections, for acts and speech that conform with the state’s vision of acceptable sex. Although the penalties for non-compliance with the state’s vision of appropriate sex are less severe in intellectual property law than those, for example, in criminal or family law, IP law also signals the state’s views of sex. In this Article written for the Stanford symposium on the Adult Entertainment industry, I extend my consideration of the law’s treatment of sex after Lawrence …


I 4 An I: Why Changing The Standard For Overcoming The Presumption Of Patent Validity Will Cause More Harm Than Good, John A. Morrissett Jan 2012

I 4 An I: Why Changing The Standard For Overcoming The Presumption Of Patent Validity Will Cause More Harm Than Good, John A. Morrissett

Law Student Publications

First, this paper describes the interests behind the presumption of patent validity and the historical treatment of the burden of proof required to overcome that presumption. While precedent does not bind the Supreme Court, it is important to consider how and why a particular standard has been applied in addition to Congress’s inaction in implementing a new standard. Second, this paper examines arguments in support of maintaining the status quo, changing to a preponderance of the evidence standard, and adopting a dual standard where some evidence must rise to the level of clear and convincing evidence while other evidence need …


Taxing Facebook Code: Debugging The Tax Code And Software, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2012

Taxing Facebook Code: Debugging The Tax Code And Software, Xuan-Thao Nguyen, Jeffrey A. Maine

Faculty Publications

This article sets out to analyze both intellectual property laws and tax systems as applied to software. The article also analyzes software within the intellectual property doctrinal framework, and examines both the federal and state tax systems governing software.


Bearing Down On Trademark Bullies, Irina D. Manta Jan 2012

Bearing Down On Trademark Bullies, Irina D. Manta

Fordham Intellectual Property, Media and Entertainment Law Journal

Trademark bullying has become a persistent problem, with large companies intimidating smaller entities with cease and desist campaigns and achieving anti-competitive results. A number of tactics exist to deal with bullying behavior. One of them is the imposition of judicial sanctions, but the standards in that area are unclear and the defendants often do not have the financial means to engage in litigation at all. Other, extralegal measures such as shaming have shown some success, but also present numerous drawbacks and prove insufficient when used against powerful actors. This symposium contribution proposes a new model that draws on the existing …


Madisonian Fair Use, Michael J. Madison Jan 2012

Madisonian Fair Use, Michael J. Madison

Articles

This short essay reflects on developments in the law, scholarship, and practice of fair use since the publication in 2004 of an earlier article on patterns in fair use practice and adjudication. It synthesizes many of those developments in the idea of “Madisonian” fair use, borrowing the separation of powers metaphor from James Madison’s work on the US Constitution and applying it, lightly and in a preliminary way, to copyright.


Untangling Jurisdiction And Contract Scope Issues Within Intellectual Property Licenses, Brandon Beam Jan 2012

Untangling Jurisdiction And Contract Scope Issues Within Intellectual Property Licenses, Brandon Beam

University of Arkansas at Little Rock Law Review

Copyright license cases pose difficult issues regarding the mixture of federal copyright law and state contract law for courts and commentators alike. Specifically, a split exists over which cases "arise under" federal copyright law. This complication is compounded by the difficulty in predicting federal preemption of state contract law.

In an effort to stabilize these complications, this comment recommends an approach of split sovereignty that would empower different systems to control the areas they are designated to regulate. In particular, the author suggests that procedural issues in copyright license cases should be clarified by (1) governing exclusive federal jurisdiction under …


Scaling The Patent System, Christina Mulligan, Timothy B. Lee Jan 2012

Scaling The Patent System, Christina Mulligan, Timothy B. Lee

Scholarly Works

Why do firms in some industries ignore patents when developing new products? This paper posits a simple but novel answer to this long-puzzling question: firms ignore patents because they are unable to discover the patents their activities might infringe. The costs of finding relevant patents, which we call discovery costs, are prohibitively high.

Not all industries face high patent discovery costs. Chemical patents are "indexable," meaning that relevant patents can be efficiently retrieved by chemical formula. As a result, discovery costs in the chemical and pharmaceutical industries are low, and inadvertent infringement by firms in these industries is rare. But …


Region Codes And Human Rights, Molly Land Dec 2011

Region Codes And Human Rights, Molly Land

Molly K. Land

No abstract provided.


Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper Dec 2011

Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper

Andrew Popper

Stolen information technology (IT) is a domestic and global problem. Theft of IT by upstream producers has a pernicious effect on the competitive market and violates fundamental policies designed to protect those who create and invent such assets. Companies profiting from stolen IT are not just free-riding on the successes of those who design and produce the products and ideas that are a driving force in the U.S. economy – they are destabilizing rational pricing and distorting lawful competition by virtue of outright theft. Current legal recourse is insufficient to address such misconduct; new approaches are needed at the state …


Rebalancing Trips, Molly K. Land Dec 2011

Rebalancing Trips, Molly K. Land

Molly K. Land

In recent years, global intellectual property scholarship has been preoccupied with “rehabilitating” the Agreement on Trade-Related Aspects of Intellectual Property (TRIPS). With some distance from the polarizing rhetoric that accompanied the early years of TRIPS, contemporary accounts laud the treaty as far more flexible and sensitive to the needs of developing countries than had previously been believed. This article argues that, contrary to these accounts, the fears of developing countries concerning TRIPS have indeed been realized—just not in the manner they imagined at the time of its conclusion. Although TRIPS does contain significant flexibilities, states have largely failed to take …


Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper Dec 2011

Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper

Andrew Popper

Stolen information technology (IT) is a domestic and global problem. Theft of IT by upstream producers has a pernicious effect on the competitive market and violates fundamental policies designed to protect those who create and invent such assets. Companies profiting from stolen IT are not just free-riding on the successes of those who design and produce the products and ideas that are a driving force in the U.S. economy – they are destabilizing rational pricing and distorting lawful competition by virtue of outright theft. Current legal recourse is insufficient to address such misconduct; new approaches are needed at the state …