Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 83

Full-Text Articles in Law

Collateral Damage: The Effect Of The Database Debate On Other Acts Of Congress, 5 J. Marshall Rev. Intell. Prop. L. 78 (2005), Christopher A. Mohr Jan 2005

Collateral Damage: The Effect Of The Database Debate On Other Acts Of Congress, 5 J. Marshall Rev. Intell. Prop. L. 78 (2005), Christopher A. Mohr

UIC Review of Intellectual Property Law

Under the reasoning in Unied States v. Martingon, declaring the federal bootlegging statute unconstitutional, databases, as “non-writings,” could not be protected under Congress’s copyright power or commerce power. In other words, Congress’s power under Article I, Section 8, Clause 8 serves to limit its ability to act under Article I, Section 8, Clause 3. Marignon’s rationale raises questions about a variety of prospective and existing legislation that protects “non-writings” for an unlimited time, such as the trademark dilution statute. This article examines the merits of this contention, arguing that the manner in which the Supreme Court has handled overlapping Article …


Fifth Avenue And The Patent Lawyer: Strategies For Using Design Patents To Increase The Value Of Fashion And Luxury Goods Companies, 5 J. Marshall Rev. Intell. Prop. L. 40 (2005), Scott D. Locke Jan 2005

Fifth Avenue And The Patent Lawyer: Strategies For Using Design Patents To Increase The Value Of Fashion And Luxury Goods Companies, 5 J. Marshall Rev. Intell. Prop. L. 40 (2005), Scott D. Locke

UIC Review of Intellectual Property Law

Design patents occupy a peculiar niche in intellectual property law. For instance, they are different from copyrights in that an accused infringer has no defense of independent creation, different from utility patents in that there is no prerequisite of a useful function, and different from trade dress in that there is no issue of secondary meaning. Design patents also contain only one claim, which makes the applicant’s drafting task particularly challenging—she must strike a delicate balance between claiming broad protection and establishing novelty. Furthermore, in litigation, the design patent plaintiff must satisfy two tests of infringement: the ordinary observer and …


To Be Presumed Or Not To Be Presumed . . . That Is The Enablement Question, 5 J. Marshall Rev. Intell. Prop. L. 140 (2005), Kristina A. Walker Jan 2005

To Be Presumed Or Not To Be Presumed . . . That Is The Enablement Question, 5 J. Marshall Rev. Intell. Prop. L. 140 (2005), Kristina A. Walker

UIC Review of Intellectual Property Law

In 2003, the Federal Circuit in Amgen Inc. v. Hoechst Marion Roussel, Inc. placed the burden of proving a prior art patent’s § 112 nonenablement on the patentee instead of the accused infringer. The patentee even bears this burden when the unclaimed subject matter is asserted to anticipate the patent at issue. This comment focuses on three questions that were created by the decision in Amgen. First, is material in a printed publication equivalent to unclaimed material in a patent? Second, is the holding in Amgn based on a false premise because it may accord a presumption of § 112 …


How We Lost Our Moral Rights And The Door Closed On Non-Economic Values In Copyright, 5 J. Marshall Rev. Intell. Prop. L. 1 (2005), Susan P. Liemer Jan 2005

How We Lost Our Moral Rights And The Door Closed On Non-Economic Values In Copyright, 5 J. Marshall Rev. Intell. Prop. L. 1 (2005), Susan P. Liemer

UIC Review of Intellectual Property Law

The Visual Artists Rights Act (“VARA”) is a piece of modern legislation preceded by a rich history, with a significant gap. As early as the 1400’s, patents were offered as economic incentive to develop new processes in the trades and applied arts. By the 1700’s, the Statute of Anne became the first statute to protect the literary work of individual creators. The Engravers’ Act of 1735 soon followed, expanding this protection to include the first works of visual art and providing the precursor to the modern right of integrity. Millar v. Taylor was the landmark case that alluded to moral …


The Failure Of The Rule Of Law In Cyberspace?: Reorienting The Normative Debate On Borders And Territorial Sovereignty, 24 J. Marshall J. Computer & Info. L. 1 (2005), H. Brian Holland Jan 2005

The Failure Of The Rule Of Law In Cyberspace?: Reorienting The Normative Debate On Borders And Territorial Sovereignty, 24 J. Marshall J. Computer & Info. L. 1 (2005), H. Brian Holland

UIC John Marshall Journal of Information Technology & Privacy Law

The purpose of this article is to suggest a different perspective on the issue of extraterritorial regulation in cyberspace. The article begins by outlining the Johnson-Post-Goldsmith debate which addressed the significance and legitimacy of physical, geographically-defined borders and territorial sovereignty in the regulation of cyberspace. The debate focused primarily on two areas of disagreement: First, whether and to what extent the architecture of the Internet is borderless or boundary-destroying, so as to be resistant to regulatory regimes grounded in territorial authority; and second, whether and to what extent a nation may legitimately exercise its regulatory power extraterritorially, particularly in the …


2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 24 J. Marshall J. Computer & Info. L. 97 (2005), Allyson Bennett, Christina Dallen, David Kestenbaum Jan 2005

2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 24 J. Marshall J. Computer & Info. L. 97 (2005), Allyson Bennett, Christina Dallen, David Kestenbaum

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Law And Order In Cyberspace: A Case Study Of Cyberspace Governance In Hong Kong, 23 J. Marshall J. Computer & Info. L. 249 (2005), Kam C. Wong, Georgiana Wong Jan 2005

Law And Order In Cyberspace: A Case Study Of Cyberspace Governance In Hong Kong, 23 J. Marshall J. Computer & Info. L. 249 (2005), Kam C. Wong, Georgiana Wong

UIC John Marshall Journal of Information Technology & Privacy Law

Hong Kong, an international finance center, has been enjoying great benefits generated by computer-mediated communication ("CMC") in the new Information Age. On the other hand with the rapid and advanced development in technology, Hong Kong's economy is increasingly and irreversibly relying, and made dependent upon CMC and the Internet to operate, because the Internet has become a catalyst of reform and development in other arenas including social, cultural, and public policy. The Information Age raises new criminality concerns as it aggregates traditional criminal problems since great amounts of data are transmitted by and stored on computers is beyond imagination and …


Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer Jan 2005

Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer

UIC John Marshall Journal of Information Technology & Privacy Law

Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …


The Convention On Cybercrime: A Harmonized Implementation Of International Penal Law: What Prospects For Procedural Due Process?, 23 J. Marshall J. Computer & Info. L. 329 (2005), Miriam F. Miquelon-Weismann Jan 2005

The Convention On Cybercrime: A Harmonized Implementation Of International Penal Law: What Prospects For Procedural Due Process?, 23 J. Marshall J. Computer & Info. L. 329 (2005), Miriam F. Miquelon-Weismann

UIC John Marshall Journal of Information Technology & Privacy Law

The CoE Convention on cybercrime provides a treaty-based framework that imposes on the participating nations the obligation to enact legislation criminalizing certain conduct related to computer systems, create investigative procedures and ensure their availability to domestic law enforcement authorities to investigate cybercrime offenses, including procedures to obtain electronic evidence in all of its forms and create a regime of broad international cooperation, including assistance in extradition of fugitives sought for crimes identified under the CoE Convention. Since there is no internationally recognized legal definition of computer crime, this article briefly presents the generally recognized categories of cybercrime and then proceeds …


Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence Jan 2005

Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence

UIC John Marshall Journal of Information Technology & Privacy Law

The rapid expansion of information technology in the past few years has left states and the Federal government struggling desperately to keep up and many of the laws attempting to regulate the Internet and information technology show a lack of understanding how the affected technology actually works and could possibly the growth and distribution of new ideas and inventions even incapacitate the Internet. One area in particular that has been the subject of widespread concern and attention is online pornography, a business that few people only realize just how big it truly is. This article focuses on the recent District …


Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross Jan 2005

Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross

UIC John Marshall Journal of Information Technology & Privacy Law

Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is …


European Spectrum Management Principles, 23 J. Marshall J. Computer & Info. L. 277 (2005), Patrick S. Ryan Jan 2005

European Spectrum Management Principles, 23 J. Marshall J. Computer & Info. L. 277 (2005), Patrick S. Ryan

UIC John Marshall Journal of Information Technology & Privacy Law

Any discussion of European policies is a complicated one, in part because the word "Europe" means different things to different people. At the present time, the European Union has expanded to twenty-five countries and more countries may become provisional members within the next years. These countries represent a multitude of cultures, languages, and legal traditions so talking about a "European" approach to a given matter is to risk making inherently flawed generalizations about diverse peoples, cultures, and systems. However, one generalization is rather safe to assert: the traditional regulatory model in Europe has been based on a state-run monopoly structure …


E-Voting: A Tale Of Lost Votes, 23 J. Marshall J. Computer & Info. L. 509 (2005), Lillie Coney Jan 2005

E-Voting: A Tale Of Lost Votes, 23 J. Marshall J. Computer & Info. L. 509 (2005), Lillie Coney

UIC John Marshall Journal of Information Technology & Privacy Law

In order for the United States to avoid another Constitutional crisis due to the failure of voting technology it must address the weaknesses of paperless direct recording electronic (“DRE”) voting machines. Many policymakers hold the belief that the Help America Vote Act (“HAVA”) would save the nation from the threat of another election-sponsored Constitutional crisis because it would, among other objectives, replace outdated voting machines with new electronic voting technology. This belief was disproved a number of times during the 2002 and 2004 primary and general election seasons. As it was revealed by the Carteret County, North Carolina November 2, …


Software Patents On Both Sides Of The Atlantic, 23 J. Marshall J. Computer & Info. L. 815 (2005), Jack George Abid Jan 2005

Software Patents On Both Sides Of The Atlantic, 23 J. Marshall J. Computer & Info. L. 815 (2005), Jack George Abid

UIC John Marshall Journal of Information Technology & Privacy Law

This comment addresses and analyzes the state of software patentability in the United States (“U.S.”) and European Union (“E.U.”). This comment discusses policies that drive changes and developments in patent law, the technical background of software, and the non-patent intellectual property protection for software. The comment further addresses the judicial precedent and the situation surrounding software patents in the U.S. and the legal situation in the E.U., including proposed changes in the Software Patent Directive. Finally, the article discusses common criticisms of current U.S. policies on software patentability by exposing the problems created by these policies and suggests corrective policies …


Distributed Security: Preventing Cybercrime, 23 J. Marshall J. Computer & Info. L. 659 (2005), Susan W. Brenner, Leo L. Clarke Jan 2005

Distributed Security: Preventing Cybercrime, 23 J. Marshall J. Computer & Info. L. 659 (2005), Susan W. Brenner, Leo L. Clarke

UIC John Marshall Journal of Information Technology & Privacy Law

This article focuses on the modern development of cybercrime and how the current law enforcement model is inadequate to prevent and enforce computer-mediated crime. Specifically the article argues that the nation-states can better control the problem of cybercrime by replacing the current law enforcement model with that of a system of “distributed” security that uses criminal sanctions to employ reasonable measures to prevent and the perpetration of cybercrime. The article begins by defining the terms “law enforcement”, “crime”, and “cybercrime” and then moves on to discuss how the current model of law enforcement, as it stands today, is inept to …


First Amendment Implications For E-Mail Threats: Are There Any Free Speech Protections?, 23 J. Marshall J. Computer & Info. L. 845 (2005), Joshua Azriel Jan 2005

First Amendment Implications For E-Mail Threats: Are There Any Free Speech Protections?, 23 J. Marshall J. Computer & Info. L. 845 (2005), Joshua Azriel

UIC John Marshall Journal of Information Technology & Privacy Law

In this article, Azriel explores how the First Amendment protects or does not provide protections to threatening e-mail communications. The article begins by examining seminal U.S. Supreme Court cases that dealt with threatening speech. The factors that provide the First Amendment protections are described, as well as the particular facts of each case and the Court’s findings. Azriel then looks at the Federal Threat Law and the factors that are enunciated in that legislation with regard to the protections afforded threatening communications, in addition to federal court cases that have interpreted the statute. The article then looks at several cases …


Lights, Camera, Action: Video Cameras As Tools Of Justice, 23 J. Marshall J. Computer & Info. L. 771 (2005), Matthew D. Thurlow Jan 2005

Lights, Camera, Action: Video Cameras As Tools Of Justice, 23 J. Marshall J. Computer & Info. L. 771 (2005), Matthew D. Thurlow

UIC John Marshall Journal of Information Technology & Privacy Law

In the continuing effort to convict only the guilty and free only the innocent increasing attention has focused on criminal confessions. Long a source of controversy, confessions are imperfect instruments with which to determine guilt or innocence. Police coerce confessions, and suspects under disabilities and without legal representation confess to crimes they did not commit. However, videotaping confessions and interrogations may be one way to improve the accuracy of this powerful piece of evidence. Whether used in interrogation rooms, during traffic stops, or as hand-held devices, video cameras have the potential to reduce the risks of wrongful convictions and, by …


The Legal Status Of Software, 23 J. Marshall J. Computer & Info. L. 711 (2005), Daniel B. Garrie Jan 2005

The Legal Status Of Software, 23 J. Marshall J. Computer & Info. L. 711 (2005), Daniel B. Garrie

UIC John Marshall Journal of Information Technology & Privacy Law

This article by cyberlaw specialist Daniel B. Garrie is intended to serve as a guide for judges to ensure that judicial decisions reflect an understanding of software’s multiple facets and its relation to the boundaries of the law. The article is designed to provide a high-level overview of software and then examine software in greater depth for specific legal areas likely to spawn legal disputes directly involving software. Included within the article are a brief overview of the current legal framework evolving with respect to software development (including an examination of the 2005 Supreme Court case Metro-Goldwyn-Mayer Studios, Inc. v. …


2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 23 J. Marshall J. Computer & Info. L. 587 (2005), Ryan Dry, Angela Hamilton, Jason Newman Jan 2005

2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 23 J. Marshall J. Computer & Info. L. 587 (2005), Ryan Dry, Angela Hamilton, Jason Newman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Injunctions Against Liquidation In Trade Remedy Cases: A Petitioner's View, 39 J. Marshall L. Rev. 45 (2005), Jeffrey M. Telep Jan 2005

Injunctions Against Liquidation In Trade Remedy Cases: A Petitioner's View, 39 J. Marshall L. Rev. 45 (2005), Jeffrey M. Telep

UIC Law Review

No abstract provided.


Patients Beware: Preemption Of Common Law Claims Under The Medical Device Amendments, 39 J. Marshall L. Rev. 75 (2005), Michael P. Dinatale Jan 2005

Patients Beware: Preemption Of Common Law Claims Under The Medical Device Amendments, 39 J. Marshall L. Rev. 75 (2005), Michael P. Dinatale

UIC Law Review

No abstract provided.


Remands In Trade Adjustment Assistance Cases, 39 J. Marshall L. Rev. 9 (2005), Munford Page Hall Ii Jan 2005

Remands In Trade Adjustment Assistance Cases, 39 J. Marshall L. Rev. 9 (2005), Munford Page Hall Ii

UIC Law Review

No abstract provided.


American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley Jan 2005

American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley

UIC Law Review

No abstract provided.


Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey Jan 2005

Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey

UIC Review of Intellectual Property Law

This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?


Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese Jan 2005

Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese

UIC Review of Intellectual Property Law

Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.


"As The Federal Circuit Turns": The Supreme Court's Consideration Of Merck V. Integra And The Safe Harbor Provision, 4 J. Marshall Rev. Intell. Prop. L. 368 (2005), Blair M. Jacobs, Christina A. Ondrick Jan 2005

"As The Federal Circuit Turns": The Supreme Court's Consideration Of Merck V. Integra And The Safe Harbor Provision, 4 J. Marshall Rev. Intell. Prop. L. 368 (2005), Blair M. Jacobs, Christina A. Ondrick

UIC Review of Intellectual Property Law

The Hatch-Waxman Act was enacted to balance the competing interests in the pharmaceutical marketplace between brand name and generic drug manufacturers. In the twenty years since its inception, the safe harbor provision contained in § 271(e)(1), has been interpreted to provide broad protection to those involved in research activities. However, in 2003, the Federal Circuit narrowly interpreted the safe harbor provision in a move that could potentially frustrate future research and improvements on patented technologies. Merck v. Integra is currently before the United States Supreme Court, who has the challenge of unraveling the competing interests involved. In order to encourage …


Intellectual Property Implications In A Virtual Reality Environment, 4 J. Marshall Rev. Intell. Prop. L. 483 (2005), Timir Chheda Jan 2005

Intellectual Property Implications In A Virtual Reality Environment, 4 J. Marshall Rev. Intell. Prop. L. 483 (2005), Timir Chheda

UIC Review of Intellectual Property Law

What will become of intellectual property interests in a world where virtual reality is a fact of life? To ponder this question we must step back from the sophisticated judicially created tests built around a framework of policy suited for modern reality and first consider whether such policy is viable given a virtual reality environment. Only then may we consider if the tests appropriately further such policy, and if not, modify the tests accordingly. This comment considers the policy and tests implicated when copyright, trademark, and patent law pass through the looking-glass and enter the realm of virtual reality.


Placing The Burden Back Where It Belongs: A Proposal To Eliminate The Affirmative Duty From Willful Infringement Analyses, 4 J. Marshall Rev. Intell. Prop. L. 509 (2005), Kevin J. Kelly Jan 2005

Placing The Burden Back Where It Belongs: A Proposal To Eliminate The Affirmative Duty From Willful Infringement Analyses, 4 J. Marshall Rev. Intell. Prop. L. 509 (2005), Kevin J. Kelly

UIC Review of Intellectual Property Law

In order to further the objective of the patent system and maximize the public’s incentive to innovate, it is imperative that the patent laws maintain a balance between the interests of patent owners in excluding others from their patents and the interests of society in the continual progress of technology. The current law in willful infringement analysis upsets this balance with the affirmative duty of due care, which shifts the burden of proof in patent infringement suits from the plaintiff to the alleged infringer. The affirmative duty places a heavy burden on the public and is inconsistent with various common …


Congress Wants To Give The Riaa Control Of Your Ipod: How The Induce Act Chills Innovation And Abrogates Sony, 4 J. Marshall Rev. Intell. Prop. L. 534 (2005), Michael Raucci Jan 2005

Congress Wants To Give The Riaa Control Of Your Ipod: How The Induce Act Chills Innovation And Abrogates Sony, 4 J. Marshall Rev. Intell. Prop. L. 534 (2005), Michael Raucci

UIC Review of Intellectual Property Law

The addition of “active inducement” to the Copyright Act would compliment the doctrine of contributory liability by punishing those who actively encourage copyright infringement. Actively inducing infringement can include advertising an infringing use or other affirmative acts. Therefore, active inducement provides a technology-neutral standard that would not look to punish bad technology but rather bad actions by the technology distributor. In contrast, the reasonable person standard of the Inducing Infringement of Copyright Act of 2004 (“Induce Act”) permits an inappropriate extension of the exclusive rights given to copyright holders by lowering the threshold for litigation. Consequently, the Induce Act improperly …


China's Struggle To Maintain Economic Viability While Enforcing International And Domestic Intellectual Property Rights, 4 J. Marshall Rev. Intell. Prop. L. 608 (2005), Randal S. Alexander Jan 2005

China's Struggle To Maintain Economic Viability While Enforcing International And Domestic Intellectual Property Rights, 4 J. Marshall Rev. Intell. Prop. L. 608 (2005), Randal S. Alexander

UIC Review of Intellectual Property Law

The development of global intellectual property rights (“IPRs”) can lead to complex issues regarding conformity with international standards of IP protection and enforcement. Although each country willing to become a WTO signatory is tasked with the development of such a regime, each country’s domestic affairs and economic survival competes with the burden of adhering to those international standards. This struggle provides the potential for many countries to confuse the boundaries of protection and create a fog of marginal infringement. In China, this fog is heavier because of local protectionism and judicial disincentives to enforce IPRs.