Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 203

Full-Text Articles in Law

Explaining Criminal Sanctions In Intellectual Property Law, Irina D. Manta Mar 2021

Explaining Criminal Sanctions In Intellectual Property Law, Irina D. Manta

Journal of Law & Innovation

No abstract provided.


The “New Madison” Approach To Antitrust And Intellectual Property Law, Makan Delrahim Mar 2021

The “New Madison” Approach To Antitrust And Intellectual Property Law, Makan Delrahim

Journal of Law & Innovation

No abstract provided.


The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo Jan 2021

The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo

All Faculty Scholarship

Recent prominent judicial opinions have assumed that common carriers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A review of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial …


Administrative Law In The Automated State, Cary Coglianese Jan 2021

Administrative Law In The Automated State, Cary Coglianese

All Faculty Scholarship

In the future, administrative agencies will rely increasingly on digital automation powered by machine learning algorithms. Can U.S. administrative law accommodate such a future? Not only might a highly automated state readily meet longstanding administrative law principles, but the responsible use of machine learning algorithms might perform even better than the status quo in terms of fulfilling administrative law’s core values of expert decision-making and democratic accountability. Algorithmic governance clearly promises more accurate, data-driven decisions. Moreover, due to their mathematical properties, algorithms might well prove to be more faithful agents of democratic institutions. Yet even if an automated state were …


Self-Actualization And The Need To Create As A Limit On Copyright, Christopher S. Yoo Jan 2021

Self-Actualization And The Need To Create As A Limit On Copyright, Christopher S. Yoo

All Faculty Scholarship

Personhood theory is almost invariably cited as one of the primary theoretical bases for copyright. The conventional wisdom views creative works as the embodiment of their creator’s personality. This unique connection between authors and their works justifies giving authors property interests in the results of their creative efforts.

This Chapter argues that the conventional wisdom is too limited. It offers too narrow a vision of the ways that creativity can develop personality by focusing exclusively on the results of the creative process and ignoring the self-actualizing benefits of the creative process itself. German aesthetic theory broadens the understanding of the …


Did The America Invents Act Change University Technology Transfer?, Cynthia L. Dahl Jan 2021

Did The America Invents Act Change University Technology Transfer?, Cynthia L. Dahl

All Faculty Scholarship

University technology transfer offices (TTOs) are the gatekeepers to groundbreaking innovations sparked in research laboratories around the U.S. With a business model reliant on patenting and licensing out for commercialization, TTOs were positioned for upheaval when the America Invents Act (AIA) transformed U.S. patent law in 2011. Now almost ten years later, this article examines the AIA’s actual effects on this patent-centric industry. It focuses on the five key areas of most interest to TTOs: i) first to file priority; ii) broadening of the universe of prior art; iii) carve-out to the prior commercial use defense; iv) micro-entity fees; and …


Privacy In The Age Of Contact Tracing: An Analysis Of Contact Tracing Apps In Different Statutory And Disease Frameworks, Christopher S. Yoo, Apratim Vidyarthi Jan 2021

Privacy In The Age Of Contact Tracing: An Analysis Of Contact Tracing Apps In Different Statutory And Disease Frameworks, Christopher S. Yoo, Apratim Vidyarthi

All Faculty Scholarship

The Covid-19 pandemic is a historic pandemic that has affected the lives of virtually everyone on the globe. One approach to slowing the spread of the disease is to use contact tracing, facilitated by our internet-connected smartphones. Different nations and states have partnered to develop a variety of contact tracing apps that use different technologies and architectures.

This paper investigates how five contact tracing apps—Germany’s Corona-Warn-App, Israel’s HaMagen, North Dakota’s Care19 Diary and Alert apps, and India’s Aarogya Setu—fare in privacy-oriented statutory frameworks to understand the design choices and public health implications shaped by these statutes. The three statutes—the Health …


Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell Jun 2020

The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell

All Faculty Scholarship

Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Prods., Inc. v. McDonald’s Corp., ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonaldland characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding software …


When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl Jun 2020

When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl

All Faculty Scholarship

Technology lawyers, intellectual property (IP) lawyers, or even any corporate lawyer with technology clients must understand standard essential patents (SEPs) and how their licensing works to effectively counsel their clients. Whether the client’s technology is adopted into a voluntary standard or not may be the most important factor in determining whether the company succeeds or is left behind in the market. Yet even though understanding SEPs is critical to a technology or IP practice, voluntary standards and specifically SEPs are generally not taught in law school.

This article aims to address this deficiency and create more practice-ready law school graduates. …


An Essay On Pluralism In Financial Market Infrastructure Design: The Case Of Securities Holding In The United States, Charles W. Mooney Jr. Apr 2020

An Essay On Pluralism In Financial Market Infrastructure Design: The Case Of Securities Holding In The United States, Charles W. Mooney Jr.

All Faculty Scholarship

This essay will appear as a chapter in a forthcoming edited volume published by Oxford University Press. It builds on the earlier article, Beyond Intermediation: A New (FinTech) Model for Securities Holding Infrastructures, 22 U. Pa. J. Bus. L. 386 (2020), which argues that serious consideration should be given to modifications of the deeply intermediated securities holding systems in the United States and elsewhere. Many of the costs and risks imposed by the intermediated holding systems fall within the domain of the regulation of securities markets (internal costs), such as impairments of shareholder voting and bondholder claims against issuers. …


Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai Jan 2020

Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai

All Faculty Scholarship

Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …


Reviewing Inter Partes Review Five Years In: The View From University Technology Transfer Offices, Cynthia L. Dahl Jan 2020

Reviewing Inter Partes Review Five Years In: The View From University Technology Transfer Offices, Cynthia L. Dahl

All Faculty Scholarship

With the implementation of the inter partes review (IPR) proceeding under the America Invents Act in 2012, university technology transfer offices (TTOS) were worried that the value of their patents might be irreparably harmed. With IPR proceedings making patent challenges easy, relatively inexpensive, and a threat extending over the lifetime of a patent, TTOs wondered if IPRs might do nothing short of undermining their licensing business model.

However, although IPRs have irreparably changed the patent infringement landscape outside of the university setting, the effect on university patents has not been nearly as severe. This chapter explores why that might be …


Frand And Antitrust, Herbert J. Hovenkamp Jan 2020

Frand And Antitrust, Herbert J. Hovenkamp

All Faculty Scholarship

This paper considers when a patentee’s violation of a FRAND commitment also violates the antitrust laws. It warns against two extremes. First, is thinking that any violation of a FRAND obligation is an antitrust violation as well. FRAND obligations are contractual, and most breaches of contract do not violate antitrust law. The other extreme is thinking that, because a FRAND violation is a breach of contract, it cannot also be an antitrust violation.

Every antitrust case must consider the market environment in which conduct is to be evaluated. SSOs operated by multiple firms are joint ventures. Antitrust’s role is to …


Beyond Intermediation: A New (Fintech) Model For Securities Holding Infrastructures, Charles W. Mooney Jr. Jan 2020

Beyond Intermediation: A New (Fintech) Model For Securities Holding Infrastructures, Charles W. Mooney Jr.

All Faculty Scholarship

Publicly traded securities generally are held by investors in securities accounts with intermediaries such as stockbrokers and central securities depositories—intermediated securities. For many investors this is the only practical means of holding and dealing with securities. These intermediated holding systems (IHSs) impose a variety of risks and costs. Investors are exposed to intermediary risk (default or insolvency of an intermediary holding securities) as well as impediments to the exercise of rights such as voting and asserting claims against securities issuers. The nontransparency of IHSs imposes other social costs, such as obstacles to anti-money laundering enforcement. The emergence of FinTech and …


Redefining Leadership In The Age Of The Sdgs: Accelerating And Scaling Up Delivery Through Innovation And Inclusion, Phumzile Mlambo-Ngcuka, Rangita De Silva De Alwis Aug 2019

Redefining Leadership In The Age Of The Sdgs: Accelerating And Scaling Up Delivery Through Innovation And Inclusion, Phumzile Mlambo-Ngcuka, Rangita De Silva De Alwis

All Faculty Scholarship

In 2015 the United Nations adopted seventeen Sustainable Development Goals (SDGs) to promote prosperity while protecting the environment. Our research examines how the SDGs, considered the grandest vision for sustainable development for the world, can be accelerated by ambitious leaders in the field of innovation. Through careful selection based on the type of industry, scale, impact, and diversity, we study a cohort of bold leaders who are shaping a brave new world. In turn, the urgent charge of the SDGs provides a platform and an innovation lab to incubate new ideas for inclusion and technologies.


Regulating E-Cigarettes: Why Policies Diverge, Eric A. Feldman Apr 2019

Regulating E-Cigarettes: Why Policies Diverge, Eric A. Feldman

All Faculty Scholarship

This paper, part of a festschrift in honor of Professor Malcolm Feeley, explores the landscape of e-cigarette policy globally by looking at three jurisdictions that have taken starkly different approaches to regulating e-cigarettes—the US, Japan, and China. Each of those countries has a robust tobacco industry, government agencies entrusted with protecting public health, an active and sophisticated scientific and medical community, and a regulatory structure for managing new pharmaceutical, tobacco, and consumer products. All three are signatories of the World Health Organization’s Framework Convention on Tobacco Control, all are signatories of the Agreement on Trade-Related Aspects of Intellectual Property Rights, …


Coin-Operated Capitalism, Shaanan Cohney, David A. Hoffman, Jeremy Sklaroff, David A. Wishnick Jan 2019

Coin-Operated Capitalism, Shaanan Cohney, David A. Hoffman, Jeremy Sklaroff, David A. Wishnick

All Faculty Scholarship

This Article presents the legal literature’s first detailed analysis of the inner workings of Initial Coin Offerings. We characterize the ICO as an example of financial innovation, placing it in kinship with venture capital contracting, asset securitization, and (obviously) the IPO. We also take the form seriously as an example of technological innovation, where promoters are beginning to effectuate their promises to investors through computer code, rather than traditional contract. To understand the dynamics of this shift, we first collect contracts, “white papers,” and other contract-like documents for the fifty top-grossing ICOs of 2017. We then analyze how such projects’ …


5g And Net Neutrality, Christopher S. Yoo, Jesse Lambert Jan 2019

5g And Net Neutrality, Christopher S. Yoo, Jesse Lambert

All Faculty Scholarship

Industry observers have raised the possibility that European network neutrality regulations may obstruct the deployment of 5G. To assess those claims, this Chapter describes the key technologies likely to be incorporated into 5G, including millimeter wave band radios, massive multiple input/multiple output (MIMO), ultra-densification, multiple radio access technologies (multi-RAT), and support for device-to-device (D2D) and machine-to-machine (M2M) connectivity. It then reviews the business models likely to be associated with 5G, including network management through biasing and blanking, an emphasis on business-to-business (B2B) communications, and network function virtualization/network slicing. It then lays out the network neutrality regulations created by the EU …


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Back To The Future Of Cyber Insurance, Tom Baker Jan 2019

Back To The Future Of Cyber Insurance, Tom Baker

All Faculty Scholarship

Written for an insurance trade publication, this brief essay identifies five ways that insurers manage uncertainty in selling cyber insurance: (1) providing valuable services beyond risk transfer; (2) contract design, (3) rapid iteration of pricing and forms, (4) limits management and reinsurance, and (5) claims disputing. Cyber insurers provide easy-to-price loss prevention and mitigation services so that the value proposition includes more than the (difficult to price) risk transfer. Cyber insurers design their contracts to include narrowly defined categories of coverage, typically with separate limits and with claims-made coverage for liability risks, and traditional insurers design their contracts to limit …


Neurohype And The Law: A Cautionary Tale, Stephen J. Morse Jan 2019

Neurohype And The Law: A Cautionary Tale, Stephen J. Morse

All Faculty Scholarship

This chapter suggests that for conceptual, empirical, and practical reasons, neuroscience in general and non-invasive brain imaging in particular are not likely to revolutionize the law and our conception of ourselves, but may make modest contributions to legal policy and case adjudication if the legal relevance of the science is properly understood.


In The Shadow Of The Law: The Role Of Custom In Intellectual Property, Jennifer E. Rothman Jan 2019

In The Shadow Of The Law: The Role Of Custom In Intellectual Property, Jennifer E. Rothman

All Faculty Scholarship

Custom, including industry practices and social norms, has a tremendous influence on intellectual property (“IP”) law, from affecting what happens outside of the courts in the trenches of the creative, technology, and science-based industries, to influencing how courts analyze infringement and defenses in IP cases. For decades, many scholars overlooked or dismissed the impact of custom on IP law in large part because of a belief that the dominant statutory frameworks that govern IP left little room for custom to play a role. In the last ten years, however, the landscape has shifted and more attention has been given to …


Behavioral Finance, Decumulation, And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert Jan 2019

Behavioral Finance, Decumulation, And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert

All Faculty Scholarship

This working paper surveys the decumulation services offered by investment robo-advisors as a case study with which to examine regulatory and market structure issues raised by automated financial advice. We provide a short introduction to decumulation, describing some of the uncertainties involved in identifying optimal decumulation strategies and sketching a few of the ‘rules of thumb’ that financial advisors have developed in this area in the face of this uncertainty. Next we describe behavioral effects that could inhibit consumers from following an optimal decumulation strategy, concluding that, left to their own devices, consumers are likely to make sub-optimal decumulation decisions. …


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

All Faculty Scholarship

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert Jan 2018

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

All Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that …


Bias In, Bias Out, Sandra G. Mayson Jan 2018

Bias In, Bias Out, Sandra G. Mayson

All Faculty Scholarship

Police, prosecutors, judges, and other criminal justice actors increasingly use algorithmic risk assessment to estimate the likelihood that a person will commit future crime. As many scholars have noted, these algorithms tend to have disparate racial impacts. In response, critics advocate three strategies of resistance: (1) the exclusion of input factors that correlate closely with race; (2) adjustments to algorithmic design to equalize predictions across racial lines; and (3) rejection of algorithmic methods altogether.

This Article’s central claim is that these strategies are at best superficial and at worst counterproductive because the source of racial inequality in risk assessment lies …


When Whispers Enter The Cloud, Heidi H. Liu Jan 2018

When Whispers Enter The Cloud, Heidi H. Liu

All Faculty Scholarship

With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.