Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Patents & Technology (6)
- Scientific Evidence (4)
- Technology (4)
- Vaccines (4)
- Biodefense (3)
-
- Biotechnology (3)
- Bioethics (2)
- Capital Cases (2)
- Case comment (2)
- Copyright (2)
- E-commerce (2)
- Ethics (2)
- Expert evidence (2)
- Forensic Science (2)
- Informed consent (2)
- Injuries (2)
- Intellectual property (2)
- Internet (2)
- Law (2)
- Science (2)
- Smallpox (2)
- Academic freedom (1)
- Access to justice (1)
- Adequate compensation (1)
- Administrative Procedure Act (1)
- Admissibility (1)
- Affirmative defenses (1)
- Agreement on trade-related aspects of intellectual property rights (1)
- Animal law (1)
- Anthrax (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (27)
- UIC Review of Intellectual Property Law (27)
- Canadian Journal of Law and Technology (17)
- Journal of Health Care Law and Policy (7)
- Duke Law & Technology Review (6)
-
- UIC Law Review (6)
- Indiana Law Journal (5)
- Indiana Journal of Global Legal Studies (3)
- Seattle University Law Review (3)
- Michigan Telecommunications & Technology Law Review (2)
- Sustainable Development Law & Policy (2)
- University of Michigan Journal of Law Reform (2)
- Animal Law Review (1)
- Michigan Law Review (1)
- The Journal of Appellate Practice and Process (1)
- University of Maryland Law Journal of Race, Religion, Gender and Class (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- William Mitchell Law Review (1)
Articles 91 - 113 of 113
Full-Text Articles in Law
Patent Tying Agreements: Presumptively Illegal?, 5 J. Marshall Rev. Intell. Prop. L. 94 (2005), Alison K. Hayden
Patent Tying Agreements: Presumptively Illegal?, 5 J. Marshall Rev. Intell. Prop. L. 94 (2005), Alison K. Hayden
UIC Review of Intellectual Property Law
On January 25, 2005, the CAFC decided the case of Independent Ink, Inc. v. Illinois Tool Works, Inc., holding that market power will be presumed in a tying agreement whenever a tying product is patented. This rule puts patent holders at a disadvantage, and will increase the amount of antitrust lawsuits brought against patent holders and holders of other exclusive intellectual property rights. Indeed, this rule conflicts with the intended effect of antitrust law. This comment proposes that tying agreements involving a patented product be evaluated the same way as all other tying agreements, and that the presumption of market …
Claim Preambles And The Unassailable Patent Claim, 5 J. Marshall Rev. Intell. Prop. L. 121 (2005), Kyle D. Petaja
Claim Preambles And The Unassailable Patent Claim, 5 J. Marshall Rev. Intell. Prop. L. 121 (2005), Kyle D. Petaja
UIC Review of Intellectual Property Law
In order to diminish the extensive confusion surrounding claim preambles, one must not consider what a preamble should do; rather, it is helpful to consider what a preamble should not do. Traditionally, a preamble is defined as an introduction to a statute or deed stating the document’s basis, purpose, aim, justification, and objective. However, in patents, a claim preamble does not serve this purpose. While a preamble undeniably functions as an introduction to the rest of the claim, that claim is limited in scope and therefore, so too, is the preamble. The basis, purpose, aim, justification, and objective of the …
Forensic Science Or Forgettable Science?, Craig M. Cooley
Forensic Science Or Forgettable Science?, Craig M. Cooley
Indiana Law Journal
Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.
Technology For Justice Customers: Bridging The Digital Divide Facing Self-Represented Litigants, Rondald W. Staudt
Technology For Justice Customers: Bridging The Digital Divide Facing Self-Represented Litigants, Rondald W. Staudt
University of Maryland Law Journal of Race, Religion, Gender and Class
No abstract provided.
Ethics, Science, And The Law Of Capital Punishment, Fredrick R. Bieber
Ethics, Science, And The Law Of Capital Punishment, Fredrick R. Bieber
Indiana Law Journal
Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.
A Scientist's Perspective On Forensic Science, Carl M. Selavka
A Scientist's Perspective On Forensic Science, Carl M. Selavka
Indiana Law Journal
Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.
Open Discussion: Role Of Scientific Evidence
Open Discussion: Role Of Scientific Evidence
Indiana Law Journal
Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.
Unintended Consequences Of The Scientific Evidence Requirement, Jeffrey J. Pokorak
Unintended Consequences Of The Scientific Evidence Requirement, Jeffrey J. Pokorak
Indiana Law Journal
Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.
Regulating Minors' Access To Pornography Via The Internet: What Options Do Congress Have Left?, 23 J. Marshall J. Computer & Info. L. 453 (2005), Jacob A. Sosnay
Regulating Minors' Access To Pornography Via The Internet: What Options Do Congress Have Left?, 23 J. Marshall J. Computer & Info. L. 453 (2005), Jacob A. Sosnay
UIC John Marshall Journal of Information Technology & Privacy Law
As with most innovations that have world-altering capabilities, the Internet is not without its very own dark side. This Internet's ugly side represented by are the thousands of Web sites devoted to the procurement and dissemination of pornographic material. Although, undoubtedly, in a free society, people are entitled to have access to such material if they so desire it is also generally accepted there is not only a great need, but an uncompromisable duty to protect minors from, and prevent access to, this potentially harmful imagery. This Comment discusses the several recent attempts made by Congress to regulate the accessibility …
Foreword, 23 J. Marshall J. Computer & Info. L. 485 (2005), Leslie Ann Reis
Foreword, 23 J. Marshall J. Computer & Info. L. 485 (2005), Leslie Ann Reis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 2000 Presidential Election Shattered The Myth That Every Vote Is Counted, 23 J. Marshall J. Computer & Info. L. 491 (2005), Richard C. Balough
The 2000 Presidential Election Shattered The Myth That Every Vote Is Counted, 23 J. Marshall J. Computer & Info. L. 491 (2005), Richard C. Balough
UIC John Marshall Journal of Information Technology & Privacy Law
A lot of things have changed since the early memories of going into the voting booth, which at that time was the old mechanical machines, and pulled those levers down. It was taught that you have to vote because each vote was going to make a difference, each vote was going to be recorded and tallied. The voting which was done on Election Day, the way one voted was going to affect our democracy. Of course during that time there were also a lot of other things happening that ran counter to this ideal, stories including police intimidation especially in …
Florida's Post 2000 Voting Systems Overhaul: The Road To Perdition, 23 J. Marshall J. Computer & Info. L. 497 (2005), Lida Rodriguez-Taseff
Florida's Post 2000 Voting Systems Overhaul: The Road To Perdition, 23 J. Marshall J. Computer & Info. L. 497 (2005), Lida Rodriguez-Taseff
UIC John Marshall Journal of Information Technology & Privacy Law
In early 2001, after the disastrous election of 2000, Florida decided to revamp its voting systems, as well as its elections laws, because it did not want another disaster. The “Electronic Voting Systems Act” (the “Act”), ostensibly modernized Florida’s outdated voting machines by authorizing the use of “electronic and electromechanical voting systems in which votes are registered electronically or are tabulated on automatic tabulating equipment or data processing equipment” prohibiting any apparatus or device “for the piercing of ballots by the voter”. Central to the recount process overhaul was the introduction in Florida of a whole new type of voting …
"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long
UIC John Marshall Journal of Information Technology & Privacy Law
Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to …
The Machinery Of Democracy: Voting Technology In November 2004, 23 J. Marshall J. Computer & Info. L. 553 (2005), Doug Chapin
The Machinery Of Democracy: Voting Technology In November 2004, 23 J. Marshall J. Computer & Info. L. 553 (2005), Doug Chapin
UIC John Marshall Journal of Information Technology & Privacy Law
In general Election Day of 2004 proceeded surprisingly smoothly and although some problems were reported, by and large they were best characterized as “no big and lots of littles.” In the end, the margins of victory in most races during the 2004 election exceeded the margin of litigation, meaning the trouble that arose in many states would most likely not have changed the outcome. In the immediate aftermath of Election Day, however, a closer look at experiences around the country revealed widespread problems that, while immaterial to the outcome of the election, nonetheless indicate that much remains to be done …
2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 23 J. Marshall J. Computer & Info. L. 563 (2005), Patricia Gerdes, Tim Scahill, Otto Shragal, Richard C. Balough, Leslie Ann Reis
2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 23 J. Marshall J. Computer & Info. L. 563 (2005), Patricia Gerdes, Tim Scahill, Otto Shragal, Richard C. Balough, Leslie Ann Reis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 23 J. Marshall J. Computer & Info. L. 633 (2005), Ashley S. Kamphaus, Michelle M. Prince, Jon Paul Carroll
2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 23 J. Marshall J. Computer & Info. L. 633 (2005), Ashley S. Kamphaus, Michelle M. Prince, Jon Paul Carroll
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
No Place To Hide, 24 J. Marshall J. Computer & Info. L. 35 (2005), Robert J. O'Harrow Jr.
No Place To Hide, 24 J. Marshall J. Computer & Info. L. 35 (2005), Robert J. O'Harrow Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
Robert O’Harrow, Jr., a reporter on the financial and investigative team of the Washington Post, recipient of the 2003 Carnegie Melon and Cyber Security Reporting Award, and Pulitzer Prize finalist, lectures on topics from his recent book, No Place to Hide. He discusses how data mining began as a way for marketing companies to gain information about consumers and, as technology evolved, developed into a way for the government to monitor its citizens. O’Harrow contends that since the government is using private companies to collect this data, it skirts regulation and accountability for privacy infringements. After discussing the problems concerning …
Do We Really Have No Place To Hide?, 24 J. Marshall J. Computer & Info. L. 57 (2005), Matthew Hector
Do We Really Have No Place To Hide?, 24 J. Marshall J. Computer & Info. L. 57 (2005), Matthew Hector
UIC John Marshall Journal of Information Technology & Privacy Law
This article is a book review of No Place to Hide, by Robert O’Harrow. The author begins his analysis of No Place to Hide by addressing concerns raised by O’Harrow regarding the balance between the private data aggregators like ChoicePoint and Acxiom and government investigators in reference to the goal of informational privacy policies. The author then goes into a detailed discussion of O’Harrow’s examination of the reasons for drafting the U.S. Patriot Act. Finally, the author discusses the central issue raised in No Place to Hide, and that is the unlimited ability to access certain information on the Internet …
2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 69 (2005), Richard C. Balough, Pirya Krishnamoorthy Venkat, Douglas Maclean, Larisa V. Morgan, Michael Rogalski
2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 69 (2005), Richard C. Balough, Pirya Krishnamoorthy Venkat, Douglas Maclean, Larisa V. Morgan, Michael Rogalski
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 133 (2005), Cherish M. Keller, Elaine Wyder-Harshman
2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 133 (2005), Cherish M. Keller, Elaine Wyder-Harshman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Planting A Standard: Proposing A Broad Reading Of In Re Elsner, Alicia L. Frostick
Planting A Standard: Proposing A Broad Reading Of In Re Elsner, Alicia L. Frostick
Michigan Law Review
This Note will show that one can read Elsner broadly to encompass both plant-type and widget-type inventions, and that applying Elsner to both plants and widgets is within the current statutory framework and case law. Such a reading would change the § 102 bar for inventions patentable under § 10i29 (hereinafter referred to as "widgets") as well as for plants. Part I of this Note argues that congressional sources require a flexible test-one that does not prejudice any objects under the Patent Act. Part II discusses the judicial interpretation of the Patent Act prior to Elsner in order to argue …
A Proposed Quick Fix To The Dmca Overprotection Problem That Even A Content Provider Could Love . . . Or At Least Live With, Devon Thurtle
A Proposed Quick Fix To The Dmca Overprotection Problem That Even A Content Provider Could Love . . . Or At Least Live With, Devon Thurtle
Seattle University Law Review
This article explains the evolution of the fair use doctrine, which historically prevented copyright holders from having too much control over their works by allowing certain legal and non-infringing fair uses of protected works. Part II explains how the United States Supreme Court developed the Betamax standard to apply the doctrine of fair use to a new technology: home video recorders. Part II also addresses how fair use and the Betamax standard might apply to digital technologies. Part III explains how the DMCA effectively abolished the defense of fair use and its application under the Betamax standard. Finally, Part IV …
Voice Over Internet Protocol And The Wiretap Act: Is Your Conversation Protected?, Daniel B. Garrie, Matthew J. Armstrong, Donald P. Harris
Voice Over Internet Protocol And The Wiretap Act: Is Your Conversation Protected?, Daniel B. Garrie, Matthew J. Armstrong, Donald P. Harris
Seattle University Law Review
10101101: Is this sequence of digits voice or data? To a computer, voice is a sequence of digits and data is a sequence of digits. The law has defined 10101101 to be data, and 10101001 to be voice communications. Courts have constructed a distinction between data, 10101101, and voice, 10101001. However, that distinction is blurred when voice and data are simultaneously transmitted through the same medium. The courts forbid third parties to tap or monitor voice communications, yet permit data packets to be tracked, stored, and sold by third parties with the implied consent of either party engaged in the …