Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Law

Copy Game For High Score: The First Video Game Lawsuit, 20 J. Intell. Prop. L. 1 (2012), William K. Ford Jan 2012

Copy Game For High Score: The First Video Game Lawsuit, 20 J. Intell. Prop. L. 1 (2012), William K. Ford

UIC Law Open Access Faculty Scholarship

Commentators and industry historians generally agree that the multi-billion dollar video game industry began forty years ago in November 1972 with Atari's release of Pong. Pong is among the simplest of video games: a version of ping pong or tennis requiring little more to play than a ball, two paddles, a scoring indicator, and a couple of memorable sounds. While it was not the first video game, Pong was the first video game hit. With unauthorized copying of a successful product occurring, it is not surprising that a lawsuit resulted in the fall of 1973, one that predates the more …


Hotfile, Megaupload, And The Future Of Copyright On The Internet: What Can Cyberlockers Tell Us About Dmca Reform?, 12 J. Marshall Rev. Intell. Prop. L. 205 (2012), Ross Drath Jan 2012

Hotfile, Megaupload, And The Future Of Copyright On The Internet: What Can Cyberlockers Tell Us About Dmca Reform?, 12 J. Marshall Rev. Intell. Prop. L. 205 (2012), Ross Drath

UIC Review of Intellectual Property Law

More than a decade ago, Napster brought the issue of copyright infringement by file-sharing to the center of the public stage. How would a body of copyright law built to regulate tangible objects apply in the digital realm? The safe harbor provisions of the Digital Millennium Copyright Act, intended as a compromise between the interests of copyright owners and webhosts, have instead introduced legal uncertainty and allocated the costs of online enforcement both inefficiently and disproportionately. While Napster and several other major peer-to-peer services have been shuttered in the intervening period, the scope of online copyright infringement continues to grow …


Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler Jan 2012

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler

UIC Law Open Access Faculty Scholarship

Are games more like coffee mugs, posters, and T-shirts, or are they more like books, magazines, and films? For purposes of the right of publicity, the answer matters. The critical question is whether games should be treated as merchandise or as expression. Three classic judicial decisions, decided in 1967, 1970, and 1973, held that the defendants needed permission to use the plaintiffs' names in their board games. These decisions judicially confirmed that games are merchandise, not something equivalent to more traditional media of expression. As merchandise, games are not like books; instead, they are akin to celebrity-embossed coffee mugs. To …


Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham Jan 2012

Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis Jan 2012

"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher Jan 2012

World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin Jan 2012

The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur Jan 2012

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Jan 2012

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia Jan 2012

Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe Jan 2012

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jan 2012

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill Jan 2012

Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon Jan 2012

What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore Jan 2012

Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni Jan 2012

A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni

UIC John Marshall Journal of Information Technology & Privacy Law

In a large and complex society, anti-social behavior cannot be restrained by government intervention alone—without it becoming a police state. Informal social controls are necessary to keep deviance from societal norms and values at a socially acceptable level, and one of the levers of this social pressure is the observation of and reaction to the personal conduct of members of one’s community.

This article argues that in several areas of contemporary American life decreasing privacy by strengthening informal social controls will lessen the need for state surveillance and regulation, which tends to be act with a heavier hand and is …


Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr. Jan 2012

Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver Jan 2012

The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit Jan 2012

The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg Jan 2012

Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg

UIC John Marshall Journal of Information Technology & Privacy Law

Inspired by the famous Warren and Brandeis conceptualization of the “right to privacy,” this article tries to answer a modern, conceptual lacuna and presents the argument for the need to conceptualize and recognize a new, independent legal principle of a “right to information identity.” This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways …


The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada Jan 2012

The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin Jan 2012

The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


(Dis)Service Of Process: The Need To Amend Rule 4 To Comply With Modern Usage Of Technology, 45 J. Marshall L. Rev. 459 (2012), Svetlana Gitman Jan 2012

(Dis)Service Of Process: The Need To Amend Rule 4 To Comply With Modern Usage Of Technology, 45 J. Marshall L. Rev. 459 (2012), Svetlana Gitman

UIC Law Review

No abstract provided.


Fair For Whom? Amazon Kindles The Fight Over Internet Sales Tax, 46 J. Marshall L. Rev. 357 (2012), Matthew Martin Jan 2012

Fair For Whom? Amazon Kindles The Fight Over Internet Sales Tax, 46 J. Marshall L. Rev. 357 (2012), Matthew Martin

UIC Law Review

No abstract provided.


Cybersex: Protecting Sexual Content In The Digital Age, 11 J. Marshall Rev. Intell. Prop. L. 815 (2012), Nicole Chaney Jan 2012

Cybersex: Protecting Sexual Content In The Digital Age, 11 J. Marshall Rev. Intell. Prop. L. 815 (2012), Nicole Chaney

UIC Review of Intellectual Property Law

Advertisers employ bare-skinned models and sex appeal to seduce American consumers with every magazine, billboard, and television advertisement. The ubiquity of sexual gratification has reached a tangible quality in American culture, but sex is still somehow taboo in our legal system. Despite the vast market for online adult entertainment, obscenity laws have been used to strike down claims for adult content copyright owners. These content owners are producing creative sexual expression for the public benefit, but they are being denied the same economic incentives granted to their mainstream counterparts. Ironically, Playboy Co. is an outlier in the adult entertainment industry …


The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes Jan 2012

The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes

UIC Review of Intellectual Property Law

Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …


Fostering Web 2.0 Innovation: The Role Of The Judicial Interpretation Of The Dmca Safe Harbor, Secondary Liability And Fair Use, 12 J. Marshall Rev. Intell. Prop. L. 70 (2012), Susanna Monseau Jan 2012

Fostering Web 2.0 Innovation: The Role Of The Judicial Interpretation Of The Dmca Safe Harbor, Secondary Liability And Fair Use, 12 J. Marshall Rev. Intell. Prop. L. 70 (2012), Susanna Monseau

UIC Review of Intellectual Property Law

Web 2.0 has generated a surplus of creativity, encouraging innovation of new technologies and further creative expansion of the internet. Social media platforms have demonstrated a significant growth during this time and have been used to create and disseminate a wealth of information and cultural material. While it is important that copyright owners receive legal protection of the content they create, it is necessary not to simultaneously stifle the creativity of end-users. Copyright owners have more power in bargaining for their rights, and their rights are well established through statutory protections. However, internet innovators and end-users, who may have a …