Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan
Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan
Articles in Law Reviews & Other Academic Journals
It was certainly an odd thing for the Department of Justice attorney arguing for the United States to appear before the Ninth Circuit to tell the appellate judges that a federal agency was wrong. This was what happened in a Federal Trade Commission enforcement action against Qualcomm Inc., a semiconductor technology company. As a substantial holder of patents on mobile communications technologies and also a leading manufacturer of chips used in that same industry, the FTC charged Qualcomm with anticompetitive conduct; the district court agreed and enjoined Qualcomm from certain patent licensing practices. It was that award of injunctive relief …
Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor
Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor
Articles in Law Reviews & Other Academic Journals
In Sorerejgntyin Cyberspace: Lex Lata Vel Non?, Michael Schmitt and Liis Vihul argue that territorial sovereignty is a primary rule of international law that limits cyber activities. They recognize, however, that not all cyber effects constitute violations of territorial sovereignty, and like Rule 4 in the Tallinn Manual 2.0 and its commentary, they acknowledge a distinct lack of consensus among the Tallinn participants on the critical question of applicable thresholds. Problematically, they do not identify the necessary state practice and opinio juris that would be required to establish either the primary rule that they proffer or the existence and contours …
Sovereignty In The Age Of Cyber, Gary Corn
Sovereignty In The Age Of Cyber, Gary Corn
Articles in Law Reviews & Other Academic Journals
International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.