Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

Journal

2005

Institution
Keyword
Publication

Articles 91 - 113 of 113

Full-Text Articles in Law

Patent Tying Agreements: Presumptively Illegal?, 5 J. Marshall Rev. Intell. Prop. L. 94 (2005), Alison K. Hayden Jan 2005

Patent Tying Agreements: Presumptively Illegal?, 5 J. Marshall Rev. Intell. Prop. L. 94 (2005), Alison K. Hayden

UIC Review of Intellectual Property Law

On January 25, 2005, the CAFC decided the case of Independent Ink, Inc. v. Illinois Tool Works, Inc., holding that market power will be presumed in a tying agreement whenever a tying product is patented. This rule puts patent holders at a disadvantage, and will increase the amount of antitrust lawsuits brought against patent holders and holders of other exclusive intellectual property rights. Indeed, this rule conflicts with the intended effect of antitrust law. This comment proposes that tying agreements involving a patented product be evaluated the same way as all other tying agreements, and that the presumption of market …


Claim Preambles And The Unassailable Patent Claim, 5 J. Marshall Rev. Intell. Prop. L. 121 (2005), Kyle D. Petaja Jan 2005

Claim Preambles And The Unassailable Patent Claim, 5 J. Marshall Rev. Intell. Prop. L. 121 (2005), Kyle D. Petaja

UIC Review of Intellectual Property Law

In order to diminish the extensive confusion surrounding claim preambles, one must not consider what a preamble should do; rather, it is helpful to consider what a preamble should not do. Traditionally, a preamble is defined as an introduction to a statute or deed stating the document’s basis, purpose, aim, justification, and objective. However, in patents, a claim preamble does not serve this purpose. While a preamble undeniably functions as an introduction to the rest of the claim, that claim is limited in scope and therefore, so too, is the preamble. The basis, purpose, aim, justification, and objective of the …


Forensic Science Or Forgettable Science?, Craig M. Cooley Jan 2005

Forensic Science Or Forgettable Science?, Craig M. Cooley

Indiana Law Journal

Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.


Technology For Justice Customers: Bridging The Digital Divide Facing Self-Represented Litigants, Rondald W. Staudt Jan 2005

Technology For Justice Customers: Bridging The Digital Divide Facing Self-Represented Litigants, Rondald W. Staudt

University of Maryland Law Journal of Race, Religion, Gender and Class

No abstract provided.


Ethics, Science, And The Law Of Capital Punishment, Fredrick R. Bieber Jan 2005

Ethics, Science, And The Law Of Capital Punishment, Fredrick R. Bieber

Indiana Law Journal

Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.


A Scientist's Perspective On Forensic Science, Carl M. Selavka Jan 2005

A Scientist's Perspective On Forensic Science, Carl M. Selavka

Indiana Law Journal

Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.


Open Discussion: Role Of Scientific Evidence Jan 2005

Open Discussion: Role Of Scientific Evidence

Indiana Law Journal

Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.


Unintended Consequences Of The Scientific Evidence Requirement, Jeffrey J. Pokorak Jan 2005

Unintended Consequences Of The Scientific Evidence Requirement, Jeffrey J. Pokorak

Indiana Law Journal

Symposium: Toward A Model Death Penalty Code: The Massachusetts Governor's Council Report.


Regulating Minors' Access To Pornography Via The Internet: What Options Do Congress Have Left?, 23 J. Marshall J. Computer & Info. L. 453 (2005), Jacob A. Sosnay Jan 2005

Regulating Minors' Access To Pornography Via The Internet: What Options Do Congress Have Left?, 23 J. Marshall J. Computer & Info. L. 453 (2005), Jacob A. Sosnay

UIC John Marshall Journal of Information Technology & Privacy Law

As with most innovations that have world-altering capabilities, the Internet is not without its very own dark side. This Internet's ugly side represented by are the thousands of Web sites devoted to the procurement and dissemination of pornographic material. Although, undoubtedly, in a free society, people are entitled to have access to such material if they so desire it is also generally accepted there is not only a great need, but an uncompromisable duty to protect minors from, and prevent access to, this potentially harmful imagery. This Comment discusses the several recent attempts made by Congress to regulate the accessibility …


Foreword, 23 J. Marshall J. Computer & Info. L. 485 (2005), Leslie Ann Reis Jan 2005

Foreword, 23 J. Marshall J. Computer & Info. L. 485 (2005), Leslie Ann Reis

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 2000 Presidential Election Shattered The Myth That Every Vote Is Counted, 23 J. Marshall J. Computer & Info. L. 491 (2005), Richard C. Balough Jan 2005

The 2000 Presidential Election Shattered The Myth That Every Vote Is Counted, 23 J. Marshall J. Computer & Info. L. 491 (2005), Richard C. Balough

UIC John Marshall Journal of Information Technology & Privacy Law

A lot of things have changed since the early memories of going into the voting booth, which at that time was the old mechanical machines, and pulled those levers down. It was taught that you have to vote because each vote was going to make a difference, each vote was going to be recorded and tallied. The voting which was done on Election Day, the way one voted was going to affect our democracy. Of course during that time there were also a lot of other things happening that ran counter to this ideal, stories including police intimidation especially in …


Florida's Post 2000 Voting Systems Overhaul: The Road To Perdition, 23 J. Marshall J. Computer & Info. L. 497 (2005), Lida Rodriguez-Taseff Jan 2005

Florida's Post 2000 Voting Systems Overhaul: The Road To Perdition, 23 J. Marshall J. Computer & Info. L. 497 (2005), Lida Rodriguez-Taseff

UIC John Marshall Journal of Information Technology & Privacy Law

In early 2001, after the disastrous election of 2000, Florida decided to revamp its voting systems, as well as its elections laws, because it did not want another disaster. The “Electronic Voting Systems Act” (the “Act”), ostensibly modernized Florida’s outdated voting machines by authorizing the use of “electronic and electromechanical voting systems in which votes are registered electronically or are tabulated on automatic tabulating equipment or data processing equipment” prohibiting any apparatus or device “for the piercing of ballots by the voter”. Central to the recount process overhaul was the introduction in Florida of a whole new type of voting …


"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long Jan 2005

"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to …


The Machinery Of Democracy: Voting Technology In November 2004, 23 J. Marshall J. Computer & Info. L. 553 (2005), Doug Chapin Jan 2005

The Machinery Of Democracy: Voting Technology In November 2004, 23 J. Marshall J. Computer & Info. L. 553 (2005), Doug Chapin

UIC John Marshall Journal of Information Technology & Privacy Law

In general Election Day of 2004 proceeded surprisingly smoothly and although some problems were reported, by and large they were best characterized as “no big and lots of littles.” In the end, the margins of victory in most races during the 2004 election exceeded the margin of litigation, meaning the trouble that arose in many states would most likely not have changed the outcome. In the immediate aftermath of Election Day, however, a closer look at experiences around the country revealed widespread problems that, while immaterial to the outcome of the election, nonetheless indicate that much remains to be done …


2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 23 J. Marshall J. Computer & Info. L. 563 (2005), Patricia Gerdes, Tim Scahill, Otto Shragal, Richard C. Balough, Leslie Ann Reis Jan 2005

2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 23 J. Marshall J. Computer & Info. L. 563 (2005), Patricia Gerdes, Tim Scahill, Otto Shragal, Richard C. Balough, Leslie Ann Reis

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 23 J. Marshall J. Computer & Info. L. 633 (2005), Ashley S. Kamphaus, Michelle M. Prince, Jon Paul Carroll Jan 2005

2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 23 J. Marshall J. Computer & Info. L. 633 (2005), Ashley S. Kamphaus, Michelle M. Prince, Jon Paul Carroll

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


No Place To Hide, 24 J. Marshall J. Computer & Info. L. 35 (2005), Robert J. O'Harrow Jr. Jan 2005

No Place To Hide, 24 J. Marshall J. Computer & Info. L. 35 (2005), Robert J. O'Harrow Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

Robert O’Harrow, Jr., a reporter on the financial and investigative team of the Washington Post, recipient of the 2003 Carnegie Melon and Cyber Security Reporting Award, and Pulitzer Prize finalist, lectures on topics from his recent book, No Place to Hide. He discusses how data mining began as a way for marketing companies to gain information about consumers and, as technology evolved, developed into a way for the government to monitor its citizens. O’Harrow contends that since the government is using private companies to collect this data, it skirts regulation and accountability for privacy infringements. After discussing the problems concerning …


Do We Really Have No Place To Hide?, 24 J. Marshall J. Computer & Info. L. 57 (2005), Matthew Hector Jan 2005

Do We Really Have No Place To Hide?, 24 J. Marshall J. Computer & Info. L. 57 (2005), Matthew Hector

UIC John Marshall Journal of Information Technology & Privacy Law

This article is a book review of No Place to Hide, by Robert O’Harrow. The author begins his analysis of No Place to Hide by addressing concerns raised by O’Harrow regarding the balance between the private data aggregators like ChoicePoint and Acxiom and government investigators in reference to the goal of informational privacy policies. The author then goes into a detailed discussion of O’Harrow’s examination of the reasons for drafting the U.S. Patriot Act. Finally, the author discusses the central issue raised in No Place to Hide, and that is the unlimited ability to access certain information on the Internet …


2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 69 (2005), Richard C. Balough, Pirya Krishnamoorthy Venkat, Douglas Maclean, Larisa V. Morgan, Michael Rogalski Jan 2005

2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 69 (2005), Richard C. Balough, Pirya Krishnamoorthy Venkat, Douglas Maclean, Larisa V. Morgan, Michael Rogalski

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 133 (2005), Cherish M. Keller, Elaine Wyder-Harshman Jan 2005

2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 133 (2005), Cherish M. Keller, Elaine Wyder-Harshman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Planting A Standard: Proposing A Broad Reading Of In Re Elsner, Alicia L. Frostick Jan 2005

Planting A Standard: Proposing A Broad Reading Of In Re Elsner, Alicia L. Frostick

Michigan Law Review

This Note will show that one can read Elsner broadly to encompass both plant-type and widget-type inventions, and that applying Elsner to both plants and widgets is within the current statutory framework and case law. Such a reading would change the § 102 bar for inventions patentable under § 10i29 (hereinafter referred to as "widgets") as well as for plants. Part I of this Note argues that congressional sources require a flexible test-one that does not prejudice any objects under the Patent Act. Part II discusses the judicial interpretation of the Patent Act prior to Elsner in order to argue …


A Proposed Quick Fix To The Dmca Overprotection Problem That Even A Content Provider Could Love . . . Or At Least Live With, Devon Thurtle Jan 2005

A Proposed Quick Fix To The Dmca Overprotection Problem That Even A Content Provider Could Love . . . Or At Least Live With, Devon Thurtle

Seattle University Law Review

This article explains the evolution of the fair use doctrine, which historically prevented copyright holders from having too much control over their works by allowing certain legal and non-infringing fair uses of protected works. Part II explains how the United States Supreme Court developed the Betamax standard to apply the doctrine of fair use to a new technology: home video recorders. Part II also addresses how fair use and the Betamax standard might apply to digital technologies. Part III explains how the DMCA effectively abolished the defense of fair use and its application under the Betamax standard. Finally, Part IV …


Voice Over Internet Protocol And The Wiretap Act: Is Your Conversation Protected?, Daniel B. Garrie, Matthew J. Armstrong, Donald P. Harris Jan 2005

Voice Over Internet Protocol And The Wiretap Act: Is Your Conversation Protected?, Daniel B. Garrie, Matthew J. Armstrong, Donald P. Harris

Seattle University Law Review

10101101: Is this sequence of digits voice or data? To a computer, voice is a sequence of digits and data is a sequence of digits. The law has defined 10101101 to be data, and 10101001 to be voice communications. Courts have constructed a distinction between data, 10101101, and voice, 10101001. However, that distinction is blurred when voice and data are simultaneously transmitted through the same medium. The courts forbid third parties to tap or monitor voice communications, yet permit data packets to be tracked, stored, and sold by third parties with the implied consent of either party engaged in the …