Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Intellectual Property Law

Technology

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 369

Full-Text Articles in Law

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Downstreaming, Rachel Landy Apr 2024

Downstreaming, Rachel Landy

Articles

Spotify and its competitors all offer the same product at the same price. Why? Scholars have argued that relationships can be designed in a way that naturally promotes innovation. By “braiding” certain formal contracting practices with informal enforcement norms, parties develop a frame-work that supports trust and positive, long-term collaboration. This Article takes on this consensus and shows that not all braiding is good. Using the multibillion-dollar subscription music streaming business as an illustration, it demonstrates just how industry forces can, and do, overcome braiding’s positive slant. In that industry, the major record labels (Universal, Warner, and Sony) weaponize braiding …


Open Source Perfume, Amanda Levendowski Jan 2024

Open Source Perfume, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …


Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen Dec 2023

Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen

Articles

In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …


Defragging Feminist Cyberlaw, Amanda Levendowski Nov 2023

Defragging Feminist Cyberlaw, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.

In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …


Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray Oct 2023

Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray

Akron Law Review

This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …


Security In The Digital Age, Michael Gentithes Oct 2023

Security In The Digital Age, Michael Gentithes

Akron Law Review

Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …


Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson Oct 2023

Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson

Dickinson Law Review (2017-Present)

In this Essay, we analyze the arguments in favor of, and against, viewing the use of copyrighted works in training sets for AI as fair use. We call this form of fair use “fair training.” We identify both strong and spurious arguments on both sides of this debate. In addition, we attempt to take a broader perspective, weighing the societal costs (e.g., replacement of certain forms of human employment) and benefits (e.g., the possibility of novel AI-based approaches to global issues such as environmental disruption) of allowing AI to make easy use of copyrighted works as training sets to facilitate …


Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina May 2023

Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Dystopian Trademark Revelations, Amanda Levendowski May 2023

Dystopian Trademark Revelations, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Uncovering dystopian technologies is challenging. Nondisclosure agreements, procurement policies, trade secrets, and strategic obfuscation collude to shield the development and deployment of these technologies from public scrutiny until it is too late to combat them with law or policy. But occasionally, exposing dystopian technologies is simple. Corporations choose technology trademarks inspired by dystopian philosophies and novels or similar elements of real life—all warnings that their potential uses are dystopian as well. That pronouncement is not necessarily trumpeted on social media or corporate websites, however. It is revealed in a more surprising place: trademark registrations at the U.S. Patent and Trademark …


Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel Mar 2023

Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel

Joint PIJIP/TLS Research Paper Series

The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.


The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga Jan 2023

Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga

Law Faculty Publications

While patents, patent litigation, and patent pools have been part of the automotive industry since the late-1800s, the prevalence of technology covered by standards and accompanying standard essential patents (SEPs) is much more recent. Today’s smart cars and the widespread incorporation of telecommunication and Internet of Things standards in vehicles raise concerns about how well the automotive industry will be able to adapt to this new SEP-laden future. This article predicts that predatory infringement of SEPs for two related reasons. First, although some industries, such as telecommunications, have long dealt with SEPs, the incorporation of standardized technology is more recent …


How Santa Clara Law's "Tech Edge Jd" Program Improves The School's Admissions Yield, Diversity, & Employment Outcomes, Laura Lee Norris, Eric Goldman Jan 2023

How Santa Clara Law's "Tech Edge Jd" Program Improves The School's Admissions Yield, Diversity, & Employment Outcomes, Laura Lee Norris, Eric Goldman

Marquette Intellectual Property & Innovation Law Review

No abstract provided.


The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry Jan 2023

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry

Seattle University Law Review

If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …


Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin Jan 2023

Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin

Georgetown Law Faculty Publications and Other Works

Legal discourse in the digital public square is driven by memoranda, motions, briefs, contracts, legislation, testimony, and judicial opinions. And as lawyers are taught from their first day of law school, the strength of these genres of legal communication is built on authority. But finding that authority often depends on a duopoly of for-profit legal research resources: Westlaw and Lexis. Although contemporary legal practice relies on these databases, they are far from ethically neutral. Not only are these “data cartels” expensive-- creating significant access to justice challenges--they also are controlled by parent companies that profit by providing information to Immigration …


Highly Automated Vehicles & Discrimination Against Low-Income Persons, William H. Widen Oct 2022

Highly Automated Vehicles & Discrimination Against Low-Income Persons, William H. Widen

Articles

Law reform in the United States often reflects a structural bias that advances narrow business interests without addressing broader public interest concerns.' This bias may appear by omitting protective language in laws or regulations which address a subject matter area, such as permitting the testing of highly automated vehicles ("HA Vs") on public roads, while omitting a requirement for a reasonable level of insurance as a condition to obtain a testing permit.2 This Article explores certain social and economic justice implications of laws and regulations governing the design, testing, manufacture, and deployment of HA Vs which might advance a business …


Teaching Doctrine For Justice Readiness, Amanda Levendowski Oct 2022

Teaching Doctrine For Justice Readiness, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Clinics strive to teach students lawyering skills. But clinics should also teach students how to use those skills to confront injustice and promote justice, an approach Jane Aiken refers to as “justice readiness.” Casework for clients presents many opportunities for students to become justice ready, but not all matters do so equally. Clinics come with built-in limitations. Some matters involve injustices in one area of law while leaving others untouched. And others don’t require creative advocacy for justice. Casework remains a powerful driver of justice readiness, but it cannot do the job alone.

Teaching students doctrine through a social justice …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Competition And Innovation: The Breakup Of Ig Farben, Felix Poege Aug 2022

Competition And Innovation: The Breakup Of Ig Farben, Felix Poege

Faculty Scholarship

The relationship between competition and innovation is difficult to disentangle, as exogenous variation in market structure is rare. The 1952 breakup of Germany’s leading chemical company, IG Farben, represents such a disruption. After the Second World War, the Allies occupying Germany imposed the breakup because of IG Farben’s importance for the German war economy instead of standard antitrust concerns. In technology areas where the breakup reduced concentration, patenting increased strongly, driven by domestic firms unrelated to IG Farben. An analysis of patent texts shows that an increased propensity to patent does not drive the effect. Descriptively, IG Farben’s successors increased …


Resisting Face Surveillance With Copyright Law, Amanda Levendowski May 2022

Resisting Face Surveillance With Copyright Law, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …


Reconstruction Of The Reasonable Person Standard Under Chinese Patent Law, Weihong Yao, Robert H. Hu Jan 2022

Reconstruction Of The Reasonable Person Standard Under Chinese Patent Law, Weihong Yao, Robert H. Hu

Faculty Articles

The standard of a Reasonable Person is the common basis for determining the duty of care of a patent infringer. Under the Chinese patent law, the standards for Reasonable Manufacturer and Reasonable Importer are among the highest standards in the world; such high Chinese standards impose an excessive duty of care for Chinese manufacturing enterprises, importers, and distributors, which hinder the development of those enterprises. We should reconstruct the Chinese patent law's Reasonable Person standard based on the characteristics of the patent system and the status quo of China's economic production. A Reasonable Manufacturer should be defined as an ordinary …


Games Without Frontiers: The Increasing Importance Of Intellectual Property Rights In The People’S Republic Of China, James M. Cooper Oct 2021

Games Without Frontiers: The Increasing Importance Of Intellectual Property Rights In The People’S Republic Of China, James M. Cooper

Faculty Scholarship

Intellectual property (“IP”) protection in the People's Republic of China has been murky and amorphous. The country is currently enjoying a historic era with significant infrastructure and investment projects occurring as the Chinese consumer society substantially expands. These simultaneous trends require that China commit to the securitization and protection of IP rights to sustain its rapid economic growth.


Tangibility As Technology, Joao Marinotti Aug 2021

Tangibility As Technology, Joao Marinotti

Georgia State University Law Review

Property law has traditionally relied on tangible boundaries to delineate legal thinghood and to inform the bounds of in rem rights and duties. Unfortunately, property doctrines have fossilized around tangibility, causing fragmentation in the legal treatment of digital assets. In the United States, for example, cryptocurrencies and non-fungible tokens (NFTs) may simultaneously be classified as commodities, securities, currencies, assets, or not property at all, depending on the jurisdiction, domain, or specific asset in question. This fragmented system of overlapping legal treatments increases the information cost of using digital assets, decreases efficiency, and ultimately hinders future innovation. In this Article, I …


Code Ownership : Plagiarism And Use, Alexis Nicole Amore May 2021

Code Ownership : Plagiarism And Use, Alexis Nicole Amore

Theses, Dissertations and Culminating Projects

Technology is moving at unmeasurable rates to that of law. Ownership rights and legality become harder to grasp distant theories. With community code-sharing and limiting language structures, when does code become plagiarized or entity-owned? The disciplines of Cyberlaw and computer science are used to provide a better understanding.

The Cyberlaw discipline explores how jurisdiction views cyberspace, source code, and source code’s placement within legislation. Due to cyberspace’s ever-evolving nature, litigation struggles to encompass the possibilities within it. Computer science delves into theory-based excursions that define the law’s shape in the cyber realm. It bolsters the possibility of implementing progressive legislation …


A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan Jan 2021

A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …


Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan Jan 2021

Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer "without authorization or exceeding authorized access," has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals split on the proper construction and the Supreme Courtset to consider the law in its current October Term 2020.

This article considers the CFAA in a new light, namely its effects on competition. Rather than merely preventing injurious trespass upon computers, …


Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson Jan 2021

Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson

Catholic University Journal of Law and Technology

The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.


To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard Jan 2021

To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard

Catholic University Journal of Law and Technology

The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.