Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

What's Wrong With The Patent System? Fuzzy Boundaries And The Patent Tax, James Bessen, Michael J. Meurer Jun 2007

What's Wrong With The Patent System? Fuzzy Boundaries And The Patent Tax, James Bessen, Michael J. Meurer

Faculty Scholarship

The annual number of patent lawsuits filed in the U.S. has roughly tripled from 1970 to 2004. The number of suits was more or less steady in the 1970s, climbed slowly in the 1980s, and exploded in the 1990s. Why? The usual answers point to (1) the growth of the “new economy” and the concomitant explosion of patenting, (2) the failure of the Patent Office to reject patents on old or obvious inventions, or (3) the rise of the patent troll. There is an element of truth in all these answers, but even collectively they do a poor job explaining …


When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry Jan 2007

When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry

ExpressO

As research has advanced, technologies have become more closely knit, and the relationships between them—both complementary and competitive—have become increasingly important. Unfortunately, the patent system’s use of monopoly power to reward innovators creates inefficient results by overly encouraging the development of substitute technologies and discouraging the development of complementary technologies. This paper explains how an optional patent purchase system could help ameliorate such problems and discusses the implications of such a system.


What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George Jan 2007

What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George

Michigan Telecommunications & Technology Law Review

Importantly, at least a few relevant patent holders are inevitably left out of an industry organization's collection of patents. These left-out patent holders, known as "holdouts," can undermine the collective arrangement with demand letters and infringement suits.[...] The first part of this Note explains why holdouts exist in the first place, given the benefits of joining an organization of collected patents. In the second part of this Note, I explore the lack of legal protections against holdout demands offered by pre-eBay patent law. The third part of this Note introduces the eBay decision as revolutionary addition to list of legal …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


Technology, Competition, And Values, Frank Pasquale Jan 2007

Technology, Competition, And Values, Frank Pasquale

Faculty Scholarship

Law can advance or retard the distributive effects of innovation and its diffusion in many ways. Certain technologies merit special monitoring because they promote the leveraging of economic advantage into social or cultural advantage without substantially increasing overall social welfare. Others threaten to undermine collective values and perceptions commonly used to evaluate technology. A final category threatens to do both, creating unfair or wasteful competition while blunting our capacity to recognize its morally dubious character.

As new sectors of life become more game-like and competitive, methods of leveling the playing field developed in sports and college admissions might become more …


Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …