Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (11)
- Pepperdine University (8)
- American University Washington College of Law (7)
- SelectedWorks (6)
- University of San Diego (5)
-
- Maurer School of Law: Indiana University (3)
- University of Pennsylvania Carey Law School (3)
- University of Richmond (3)
- Golden Gate University School of Law (2)
- Marquette University Law School (2)
- Schulich School of Law, Dalhousie University (2)
- St. John's University School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Miami Law School (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- Vanderbilt University Law School (2)
- Florida International University College of Law (1)
- Fordham Law School (1)
- Singapore Management University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Washington School of Law (1)
- Western University (1)
- Publication
-
- Pepperdine Law Review (5)
- San Diego Law Review (5)
- Faculty Publications (4)
- Intellectual Property Brief (4)
- All Faculty Scholarship (3)
-
- Law Student Publications (3)
- Andrew Popper (2)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- IP Theory (2)
- Marquette Intellectual Property Law Review (2)
- Molly K. Land (2)
- Peter Jaszi (2)
- Scholarly Works (2)
- The Journal of Business, Entrepreneurship & the Law (2)
- Andrew Beckerman Rodau (1)
- Boyd Briefs / Road Scholars (1)
- Dalhousie Law Journal (1)
- David S. Olson (1)
- Electronic Thesis and Dissertation Repository (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- Indiana Law Journal (1)
- Intellectual Property Law (1)
- Ira Steven Nathenson (1)
- Jessica Silbey (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of Business & Technology Law (1)
- Justine Pila (1)
- Law Faculty Scholarship (1)
- Lisa A Dolak (1)
- Publication Type
Articles 61 - 73 of 73
Full-Text Articles in Law
One Work, Three Infringers: Calculating The Correct Number Of Separate Awards Of Statutory Damages In A Copyright Infringement Action, Timothy L. Warnock
One Work, Three Infringers: Calculating The Correct Number Of Separate Awards Of Statutory Damages In A Copyright Infringement Action, Timothy L. Warnock
Vanderbilt Journal of Entertainment & Technology Law
Columbia Pictures provides the most persuasive analysis of the correct number of separate awards of statutory damages available to a plaintiff. Lime Group recognized that the question was a particularly close one, and the court erred in reaching the opposite result from Columbia Pictures. The Lime Group analysis is based on a fundamentally flawed earlier decision and relies, in the end, on an approach as likely to reward infringers rather than defend the rights of copyright holders: determining whether the potential result in any given case is absurd. Regarding the hypothetical case provided at the beginning of this Essay, Warren …
Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper
Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper
Articles in Law Reviews & Other Academic Journals
Stolen information technology (IT) is a domestic and global problem. Theft of IT by upstream producers has a pernicious effect on the competitive market and violates fundamental policies designed to protect those who create and invent such assets. Companies profiting from stolen IT are not just free-riding on the successes of those who design and produce the products and ideas that are a driving force in the U.S. economy – they are destabilizing rational pricing and distorting lawful competition by virtue of outright theft. Current legal recourse is insufficient to address such misconduct; new approaches are needed at the state …
Sex Exceptionalism In Intellectual Property, Jennifer E. Rothman
Sex Exceptionalism In Intellectual Property, Jennifer E. Rothman
All Faculty Scholarship
The state regulates sexual activity through a combination of criminal and civil sanctions and the award of benefits, such as marriage and First Amendment protections, for acts and speech that conform with the state’s vision of acceptable sex. Although the penalties for non-compliance with the state’s vision of appropriate sex are less severe in intellectual property law than those, for example, in criminal or family law, IP law also signals the state’s views of sex. In this Article written for the Stanford symposium on the Adult Entertainment industry, I extend my consideration of the law’s treatment of sex after Lawrence …
I 4 An I: Why Changing The Standard For Overcoming The Presumption Of Patent Validity Will Cause More Harm Than Good, John A. Morrissett
I 4 An I: Why Changing The Standard For Overcoming The Presumption Of Patent Validity Will Cause More Harm Than Good, John A. Morrissett
Law Student Publications
First, this paper describes the interests behind the presumption of patent validity and the historical treatment of the burden of proof required to overcome that presumption. While precedent does not bind the Supreme Court, it is important to consider how and why a particular standard has been applied in addition to Congress’s inaction in implementing a new standard. Second, this paper examines arguments in support of maintaining the status quo, changing to a preponderance of the evidence standard, and adopting a dual standard where some evidence must rise to the level of clear and convincing evidence while other evidence need …
Taxing Facebook Code: Debugging The Tax Code And Software, Xuan-Thao Nguyen, Jeffrey A. Maine
Taxing Facebook Code: Debugging The Tax Code And Software, Xuan-Thao Nguyen, Jeffrey A. Maine
Faculty Publications
This article sets out to analyze both intellectual property laws and tax systems as applied to software. The article also analyzes software within the intellectual property doctrinal framework, and examines both the federal and state tax systems governing software.
Bearing Down On Trademark Bullies, Irina D. Manta
Bearing Down On Trademark Bullies, Irina D. Manta
Fordham Intellectual Property, Media and Entertainment Law Journal
Trademark bullying has become a persistent problem, with large companies intimidating smaller entities with cease and desist campaigns and achieving anti-competitive results. A number of tactics exist to deal with bullying behavior. One of them is the imposition of judicial sanctions, but the standards in that area are unclear and the defendants often do not have the financial means to engage in litigation at all. Other, extralegal measures such as shaming have shown some success, but also present numerous drawbacks and prove insufficient when used against powerful actors. This symposium contribution proposes a new model that draws on the existing …
Madisonian Fair Use, Michael J. Madison
Madisonian Fair Use, Michael J. Madison
Articles
This short essay reflects on developments in the law, scholarship, and practice of fair use since the publication in 2004 of an earlier article on patterns in fair use practice and adjudication. It synthesizes many of those developments in the idea of “Madisonian” fair use, borrowing the separation of powers metaphor from James Madison’s work on the US Constitution and applying it, lightly and in a preliminary way, to copyright.
Untangling Jurisdiction And Contract Scope Issues Within Intellectual Property Licenses, Brandon Beam
Untangling Jurisdiction And Contract Scope Issues Within Intellectual Property Licenses, Brandon Beam
University of Arkansas at Little Rock Law Review
Copyright license cases pose difficult issues regarding the mixture of federal copyright law and state contract law for courts and commentators alike. Specifically, a split exists over which cases "arise under" federal copyright law. This complication is compounded by the difficulty in predicting federal preemption of state contract law.
In an effort to stabilize these complications, this comment recommends an approach of split sovereignty that would empower different systems to control the areas they are designated to regulate. In particular, the author suggests that procedural issues in copyright license cases should be clarified by (1) governing exclusive federal jurisdiction under …
Scaling The Patent System, Christina Mulligan, Timothy B. Lee
Scaling The Patent System, Christina Mulligan, Timothy B. Lee
Scholarly Works
Why do firms in some industries ignore patents when developing new products? This paper posits a simple but novel answer to this long-puzzling question: firms ignore patents because they are unable to discover the patents their activities might infringe. The costs of finding relevant patents, which we call discovery costs, are prohibitively high.
Not all industries face high patent discovery costs. Chemical patents are "indexable," meaning that relevant patents can be efficiently retrieved by chemical formula. As a result, discovery costs in the chemical and pharmaceutical industries are low, and inadvertent infringement by firms in these industries is rare. But …
Region Codes And Human Rights, Molly Land
Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper
Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper
Andrew Popper
Stolen information technology (IT) is a domestic and global problem. Theft of IT by upstream producers has a pernicious effect on the competitive market and violates fundamental policies designed to protect those who create and invent such assets. Companies profiting from stolen IT are not just free-riding on the successes of those who design and produce the products and ideas that are a driving force in the U.S. economy – they are destabilizing rational pricing and distorting lawful competition by virtue of outright theft. Current legal recourse is insufficient to address such misconduct; new approaches are needed at the state …
Rebalancing Trips, Molly K. Land
Rebalancing Trips, Molly K. Land
Molly K. Land
In recent years, global intellectual property scholarship has been preoccupied with “rehabilitating” the Agreement on Trade-Related Aspects of Intellectual Property (TRIPS). With some distance from the polarizing rhetoric that accompanied the early years of TRIPS, contemporary accounts laud the treaty as far more flexible and sensitive to the needs of developing countries than had previously been believed. This article argues that, contrary to these accounts, the fears of developing countries concerning TRIPS have indeed been realized—just not in the manner they imagined at the time of its conclusion. Although TRIPS does contain significant flexibilities, states have largely failed to take …
Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper
Beneficiaries Of Misconduct: A Direct Approach To It Theft, Andrew Popper
Andrew Popper
Stolen information technology (IT) is a domestic and global problem. Theft of IT by upstream producers has a pernicious effect on the competitive market and violates fundamental policies designed to protect those who create and invent such assets. Companies profiting from stolen IT are not just free-riding on the successes of those who design and produce the products and ideas that are a driving force in the U.S. economy – they are destabilizing rational pricing and distorting lawful competition by virtue of outright theft. Current legal recourse is insufficient to address such misconduct; new approaches are needed at the state …