Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons Sep 2015

Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons

Lawrence J. Trautman Sr.

New business formation is a powerful economic engine that creates jobs. Diverse legal issues are encountered as a start-up entity approaches formation, initial capitalization and fundraising, arrangements with employees and independent contractors, and relationships with other third parties. The endeavors of a typical start-up in the United States will likely implicate many of the following areas of law: intellectual property; business organizations; tax laws; employment and labor laws; securities regulation; contracts and licensing agreements; commercial sales; debtor-creditor relations; real estate law; health and safety laws/codes; permits and licenses; environmental protection; industry specific regulatory laws and approval processes; tort/personal injury, products …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest Aug 2015

Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest

Sean Pager

INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?

Sean A. Pager Michigan State University College of Law

Eric Priest University of Oregon School of Law

ABSTRACT

This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …


Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman Jul 2015

Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman

Shlomit Yanisky-Ravid Professor of Law

Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden Jul 2015

Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden

Rob Frieden

This paper will examine the FCC’s March, 2015 Open Internet Order with an eye to assessing whether and how the Commission can successfully defend its decision in an appellate court. On two prior occasions, the FCC failed to convince a reviewing court that proposed regulatory safeguards do not unlawfully impose common carrier duties on private carriers. The Commission now has opted to reclassify broadband Internet access as common carriage, a decision sure to trigger a third court appeal. The FCC Open Internet Order offers several, possibly contradictory, justifications for its decision to apply Title II of the Communications Act, subject …


Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden May 2015

Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden

Rob Frieden

This paper assesses whether and how ISPs can offer quality of service enhancements, at premium prices for full motion video, while still complying with the new rules and regulations established by the Federal Communications Commission (“FCC”) in March, 2015. The paper explains that having made the controversial decision to reclassify all forms of Internet access as a telecommunications service, the FCC increases regulatory uncertainty. In particular, the FCC has failed to identify instances where “retail ISPs,” serving residential broadband subscribers, can offer quality of service enhancements that serve real consumer wants without harming competition and the ability of most content …


Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey Apr 2015

Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey

Andrew Leahey

No abstract provided.


The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris Apr 2015

The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris

Emily Michiko Morris

Once the stuff of science fiction, nanotechnology is now expected to be the next technological revolution, but despite millions of dollars of investment, we still have yet to see the brave new world of cheap energy, cell-specific drug delivery systems, and self-replicating nanobots that nanotechnology promises. Instead, nanotechnology seems to be in a holding pattern, perpetually stuck in the status of “emerging science,” “immature field,” and “new technology” for over three decades now. Why? Professor Mark Lemley and a number of others have suggested that the answer to this puzzling question is simple: nanotechnology differs from the all of the …


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Apr 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Julian Dibbell

When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …


Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter Mar 2015

Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter

Megan M Carpenter

This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …


Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele Feb 2015

Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele

Layne S. Keele

In Apple, Inc. v. Motorola, Inc., 757 F.3d 1286 (Fed. Cir. 2014), the four federal judges who considered the case—Judge Posner by designation at the trial level, and three Federal Circuit judges on appeal—all expressed differing opinions on the question of whether and to what extent extraordinary patent remedies should be available for the infringement of standard-essential patents. This article aims to simplify this muddled and confusing topic.

The article employs a teleological approach, examining the purposes behind remedies in general, the purposes of extraordinary remedies in patent law, and the purposes of RAND commitments (commitments to license standard-essential …


Bowman V. Monsanto: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman Feb 2015

Bowman V. Monsanto: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman

Christopher M Holman

The inherent tendency of patented seeds to self-replicate has led to fears that farmers might face liability for inadvertent patent infringement. To address the perceived problem, some have proposed severely limiting the availability of effective patent protection for self-replicating technologies, for example by denying patent rights to “second generation” self-replicating products, or even by broadly declaring such technologies ineligible for patent protection. The fact is, lawsuits against inadvertently infringing farmers remain of largely hypothetical concern. However, changes in the market could soon render such lawsuits a reality. In addressing the resulting policy concerns, the courts and/or Congress have at their …


Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort Jan 2015

Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort

Scott Shackelford

According to Frank Montoya, the U.S. National Counterintelligence Chief, “We’re an information-based society now. Information is everything. That makes . . . company executives, the front line – not the support mechanism, the front line – in [determining] what comes.”[1] Chief Montoya’s remarks underscore the central role played by the private sector in ongoing efforts aimed at enhancing cybersecurity, much like the increasingly vital role firms are playing in fostering sustainability. For example, according to Accenture surveys, the number of managers who consider sustainability to be critical to the future success of their organizations jumped from fifty to more …


Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler Jan 2015

Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler

Brandon C. Butler

The Supreme Court has said that copyright’s fair use doctrine is a “First Amendment safety valve” because it ensures that certain crucial cultural activities are not unduly burdened by copyright. While many such activities (criticism, commentary, parody) have benefited from the courts’ increased attention to first amendment values, one such activity, education, has been mired for years in a minimalist, market-based vision of fair use that is largely out of touch with mainstream fair use jurisprudence. The latest installment in the history of educational fair use, the 11th Circuit’s opinion in the Georgia State e-reserves case, may be the last …


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Cases For Lecture 3; Trademarks, Macerata 17 March 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 3; Trademarks, Macerata 17 March 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Cases For Lecture 4 - Copyright In Cyberspace, Macerata, 8 April 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 4 - Copyright In Cyberspace, Macerata, 8 April 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Cases For Lecture 5; Private International Law And The Internet, Macerata 15 April 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 5; Private International Law And The Internet, Macerata 15 April 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Copyright Porn Trolls, Wasting Taxi Medallions, And The Propriety Of ‘Property’, Tom W. Bell Dec 2014

Copyright Porn Trolls, Wasting Taxi Medallions, And The Propriety Of ‘Property’, Tom W. Bell

Tom W. Bell

What happens when the government creates privileges that have powers rivaling those that the common law accords to property? Recent events in two seemingly unrelated areas suggest a troubling answer to that question. First, in copyright, porn trolls have sued thousands of John Does for allegedly participating in illegal file sharing. These suits evidently seek not judicial vindication but merely the defendants' identities, which the plaintiffs then use to reap settlement payments from guilty and innocent alike. Second, taxi drivers in cities across the world have launched legal, political, and physical attacks against Uber and other networked transportation services, accusing …