Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (60)
- Privacy Law (35)
- Intellectual Property Law (32)
- Computer Law (28)
- Internet Law (28)
-
- Legislation (20)
- Litigation (19)
- Business Organizations Law (17)
- Jurisprudence (16)
- Commercial Law (11)
- Constitutional Law (10)
- Labor and Employment Law (10)
- Consumer Protection Law (9)
- State and Local Government Law (9)
- Courts (8)
- Tax Law (8)
- Transnational Law (8)
- Health Law and Policy (7)
- International Law (7)
- Retirement Security Law (7)
- Administrative Law (6)
- Criminal Law (6)
- First Amendment (6)
- Food and Drug Law (6)
- International Trade Law (6)
- Legal Ethics and Professional Responsibility (6)
- Legal Writing and Research (6)
- Insurance Law (5)
- Law and Politics (5)
Articles 1 - 30 of 83
Full-Text Articles in Law
Collateral Damage: The Effect Of The Database Debate On Other Acts Of Congress, 5 J. Marshall Rev. Intell. Prop. L. 78 (2005), Christopher A. Mohr
Collateral Damage: The Effect Of The Database Debate On Other Acts Of Congress, 5 J. Marshall Rev. Intell. Prop. L. 78 (2005), Christopher A. Mohr
UIC Review of Intellectual Property Law
Under the reasoning in Unied States v. Martingon, declaring the federal bootlegging statute unconstitutional, databases, as “non-writings,” could not be protected under Congress’s copyright power or commerce power. In other words, Congress’s power under Article I, Section 8, Clause 8 serves to limit its ability to act under Article I, Section 8, Clause 3. Marignon’s rationale raises questions about a variety of prospective and existing legislation that protects “non-writings” for an unlimited time, such as the trademark dilution statute. This article examines the merits of this contention, arguing that the manner in which the Supreme Court has handled overlapping Article …
Fifth Avenue And The Patent Lawyer: Strategies For Using Design Patents To Increase The Value Of Fashion And Luxury Goods Companies, 5 J. Marshall Rev. Intell. Prop. L. 40 (2005), Scott D. Locke
UIC Review of Intellectual Property Law
Design patents occupy a peculiar niche in intellectual property law. For instance, they are different from copyrights in that an accused infringer has no defense of independent creation, different from utility patents in that there is no prerequisite of a useful function, and different from trade dress in that there is no issue of secondary meaning. Design patents also contain only one claim, which makes the applicant’s drafting task particularly challenging—she must strike a delicate balance between claiming broad protection and establishing novelty. Furthermore, in litigation, the design patent plaintiff must satisfy two tests of infringement: the ordinary observer and …
To Be Presumed Or Not To Be Presumed . . . That Is The Enablement Question, 5 J. Marshall Rev. Intell. Prop. L. 140 (2005), Kristina A. Walker
To Be Presumed Or Not To Be Presumed . . . That Is The Enablement Question, 5 J. Marshall Rev. Intell. Prop. L. 140 (2005), Kristina A. Walker
UIC Review of Intellectual Property Law
In 2003, the Federal Circuit in Amgen Inc. v. Hoechst Marion Roussel, Inc. placed the burden of proving a prior art patent’s § 112 nonenablement on the patentee instead of the accused infringer. The patentee even bears this burden when the unclaimed subject matter is asserted to anticipate the patent at issue. This comment focuses on three questions that were created by the decision in Amgen. First, is material in a printed publication equivalent to unclaimed material in a patent? Second, is the holding in Amgn based on a false premise because it may accord a presumption of § 112 …
How We Lost Our Moral Rights And The Door Closed On Non-Economic Values In Copyright, 5 J. Marshall Rev. Intell. Prop. L. 1 (2005), Susan P. Liemer
How We Lost Our Moral Rights And The Door Closed On Non-Economic Values In Copyright, 5 J. Marshall Rev. Intell. Prop. L. 1 (2005), Susan P. Liemer
UIC Review of Intellectual Property Law
The Visual Artists Rights Act (“VARA”) is a piece of modern legislation preceded by a rich history, with a significant gap. As early as the 1400’s, patents were offered as economic incentive to develop new processes in the trades and applied arts. By the 1700’s, the Statute of Anne became the first statute to protect the literary work of individual creators. The Engravers’ Act of 1735 soon followed, expanding this protection to include the first works of visual art and providing the precursor to the modern right of integrity. Millar v. Taylor was the landmark case that alluded to moral …
The Failure Of The Rule Of Law In Cyberspace?: Reorienting The Normative Debate On Borders And Territorial Sovereignty, 24 J. Marshall J. Computer & Info. L. 1 (2005), H. Brian Holland
UIC John Marshall Journal of Information Technology & Privacy Law
The purpose of this article is to suggest a different perspective on the issue of extraterritorial regulation in cyberspace. The article begins by outlining the Johnson-Post-Goldsmith debate which addressed the significance and legitimacy of physical, geographically-defined borders and territorial sovereignty in the regulation of cyberspace. The debate focused primarily on two areas of disagreement: First, whether and to what extent the architecture of the Internet is borderless or boundary-destroying, so as to be resistant to regulatory regimes grounded in territorial authority; and second, whether and to what extent a nation may legitimately exercise its regulatory power extraterritorially, particularly in the …
2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 24 J. Marshall J. Computer & Info. L. 97 (2005), Allyson Bennett, Christina Dallen, David Kestenbaum
2005 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For Petitioner, 24 J. Marshall J. Computer & Info. L. 97 (2005), Allyson Bennett, Christina Dallen, David Kestenbaum
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Law And Order In Cyberspace: A Case Study Of Cyberspace Governance In Hong Kong, 23 J. Marshall J. Computer & Info. L. 249 (2005), Kam C. Wong, Georgiana Wong
Law And Order In Cyberspace: A Case Study Of Cyberspace Governance In Hong Kong, 23 J. Marshall J. Computer & Info. L. 249 (2005), Kam C. Wong, Georgiana Wong
UIC John Marshall Journal of Information Technology & Privacy Law
Hong Kong, an international finance center, has been enjoying great benefits generated by computer-mediated communication ("CMC") in the new Information Age. On the other hand with the rapid and advanced development in technology, Hong Kong's economy is increasingly and irreversibly relying, and made dependent upon CMC and the Internet to operate, because the Internet has become a catalyst of reform and development in other arenas including social, cultural, and public policy. The Information Age raises new criminality concerns as it aggregates traditional criminal problems since great amounts of data are transmitted by and stored on computers is beyond imagination and …
Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer
Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer
UIC John Marshall Journal of Information Technology & Privacy Law
Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …
The Convention On Cybercrime: A Harmonized Implementation Of International Penal Law: What Prospects For Procedural Due Process?, 23 J. Marshall J. Computer & Info. L. 329 (2005), Miriam F. Miquelon-Weismann
The Convention On Cybercrime: A Harmonized Implementation Of International Penal Law: What Prospects For Procedural Due Process?, 23 J. Marshall J. Computer & Info. L. 329 (2005), Miriam F. Miquelon-Weismann
UIC John Marshall Journal of Information Technology & Privacy Law
The CoE Convention on cybercrime provides a treaty-based framework that imposes on the participating nations the obligation to enact legislation criminalizing certain conduct related to computer systems, create investigative procedures and ensure their availability to domestic law enforcement authorities to investigate cybercrime offenses, including procedures to obtain electronic evidence in all of its forms and create a regime of broad international cooperation, including assistance in extradition of fugitives sought for crimes identified under the CoE Convention. Since there is no internationally recognized legal definition of computer crime, this article briefly presents the generally recognized categories of cybercrime and then proceeds …
Pennsylvania And Pornography: Cdt V. Pappert Offers A New Approach To Criminal Liability, 23 J. Marshall J. Computer & Info. L. 411 (2005), John Spence
UIC John Marshall Journal of Information Technology & Privacy Law
The rapid expansion of information technology in the past few years has left states and the Federal government struggling desperately to keep up and many of the laws attempting to regulate the Internet and information technology show a lack of understanding how the affected technology actually works and could possibly the growth and distribution of new ideas and inventions even incapacitate the Internet. One area in particular that has been the subject of widespread concern and attention is online pornography, a business that few people only realize just how big it truly is. This article focuses on the recent District …
Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross
Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross
UIC John Marshall Journal of Information Technology & Privacy Law
Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is …
European Spectrum Management Principles, 23 J. Marshall J. Computer & Info. L. 277 (2005), Patrick S. Ryan
European Spectrum Management Principles, 23 J. Marshall J. Computer & Info. L. 277 (2005), Patrick S. Ryan
UIC John Marshall Journal of Information Technology & Privacy Law
Any discussion of European policies is a complicated one, in part because the word "Europe" means different things to different people. At the present time, the European Union has expanded to twenty-five countries and more countries may become provisional members within the next years. These countries represent a multitude of cultures, languages, and legal traditions so talking about a "European" approach to a given matter is to risk making inherently flawed generalizations about diverse peoples, cultures, and systems. However, one generalization is rather safe to assert: the traditional regulatory model in Europe has been based on a state-run monopoly structure …
E-Voting: A Tale Of Lost Votes, 23 J. Marshall J. Computer & Info. L. 509 (2005), Lillie Coney
E-Voting: A Tale Of Lost Votes, 23 J. Marshall J. Computer & Info. L. 509 (2005), Lillie Coney
UIC John Marshall Journal of Information Technology & Privacy Law
In order for the United States to avoid another Constitutional crisis due to the failure of voting technology it must address the weaknesses of paperless direct recording electronic (“DRE”) voting machines. Many policymakers hold the belief that the Help America Vote Act (“HAVA”) would save the nation from the threat of another election-sponsored Constitutional crisis because it would, among other objectives, replace outdated voting machines with new electronic voting technology. This belief was disproved a number of times during the 2002 and 2004 primary and general election seasons. As it was revealed by the Carteret County, North Carolina November 2, …
Software Patents On Both Sides Of The Atlantic, 23 J. Marshall J. Computer & Info. L. 815 (2005), Jack George Abid
Software Patents On Both Sides Of The Atlantic, 23 J. Marshall J. Computer & Info. L. 815 (2005), Jack George Abid
UIC John Marshall Journal of Information Technology & Privacy Law
This comment addresses and analyzes the state of software patentability in the United States (“U.S.”) and European Union (“E.U.”). This comment discusses policies that drive changes and developments in patent law, the technical background of software, and the non-patent intellectual property protection for software. The comment further addresses the judicial precedent and the situation surrounding software patents in the U.S. and the legal situation in the E.U., including proposed changes in the Software Patent Directive. Finally, the article discusses common criticisms of current U.S. policies on software patentability by exposing the problems created by these policies and suggests corrective policies …
Distributed Security: Preventing Cybercrime, 23 J. Marshall J. Computer & Info. L. 659 (2005), Susan W. Brenner, Leo L. Clarke
Distributed Security: Preventing Cybercrime, 23 J. Marshall J. Computer & Info. L. 659 (2005), Susan W. Brenner, Leo L. Clarke
UIC John Marshall Journal of Information Technology & Privacy Law
This article focuses on the modern development of cybercrime and how the current law enforcement model is inadequate to prevent and enforce computer-mediated crime. Specifically the article argues that the nation-states can better control the problem of cybercrime by replacing the current law enforcement model with that of a system of “distributed” security that uses criminal sanctions to employ reasonable measures to prevent and the perpetration of cybercrime. The article begins by defining the terms “law enforcement”, “crime”, and “cybercrime” and then moves on to discuss how the current model of law enforcement, as it stands today, is inept to …
First Amendment Implications For E-Mail Threats: Are There Any Free Speech Protections?, 23 J. Marshall J. Computer & Info. L. 845 (2005), Joshua Azriel
UIC John Marshall Journal of Information Technology & Privacy Law
In this article, Azriel explores how the First Amendment protects or does not provide protections to threatening e-mail communications. The article begins by examining seminal U.S. Supreme Court cases that dealt with threatening speech. The factors that provide the First Amendment protections are described, as well as the particular facts of each case and the Court’s findings. Azriel then looks at the Federal Threat Law and the factors that are enunciated in that legislation with regard to the protections afforded threatening communications, in addition to federal court cases that have interpreted the statute. The article then looks at several cases …
Lights, Camera, Action: Video Cameras As Tools Of Justice, 23 J. Marshall J. Computer & Info. L. 771 (2005), Matthew D. Thurlow
Lights, Camera, Action: Video Cameras As Tools Of Justice, 23 J. Marshall J. Computer & Info. L. 771 (2005), Matthew D. Thurlow
UIC John Marshall Journal of Information Technology & Privacy Law
In the continuing effort to convict only the guilty and free only the innocent increasing attention has focused on criminal confessions. Long a source of controversy, confessions are imperfect instruments with which to determine guilt or innocence. Police coerce confessions, and suspects under disabilities and without legal representation confess to crimes they did not commit. However, videotaping confessions and interrogations may be one way to improve the accuracy of this powerful piece of evidence. Whether used in interrogation rooms, during traffic stops, or as hand-held devices, video cameras have the potential to reduce the risks of wrongful convictions and, by …
The Legal Status Of Software, 23 J. Marshall J. Computer & Info. L. 711 (2005), Daniel B. Garrie
The Legal Status Of Software, 23 J. Marshall J. Computer & Info. L. 711 (2005), Daniel B. Garrie
UIC John Marshall Journal of Information Technology & Privacy Law
This article by cyberlaw specialist Daniel B. Garrie is intended to serve as a guide for judges to ensure that judicial decisions reflect an understanding of software’s multiple facets and its relation to the boundaries of the law. The article is designed to provide a high-level overview of software and then examine software in greater depth for specific legal areas likely to spawn legal disputes directly involving software. Included within the article are a brief overview of the current legal framework evolving with respect to software development (including an examination of the 2005 Supreme Court case Metro-Goldwyn-Mayer Studios, Inc. v. …
2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 23 J. Marshall J. Computer & Info. L. 587 (2005), Ryan Dry, Angela Hamilton, Jason Newman
2004 John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 23 J. Marshall J. Computer & Info. L. 587 (2005), Ryan Dry, Angela Hamilton, Jason Newman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Injunctions Against Liquidation In Trade Remedy Cases: A Petitioner's View, 39 J. Marshall L. Rev. 45 (2005), Jeffrey M. Telep
Injunctions Against Liquidation In Trade Remedy Cases: A Petitioner's View, 39 J. Marshall L. Rev. 45 (2005), Jeffrey M. Telep
UIC Law Review
No abstract provided.
Patients Beware: Preemption Of Common Law Claims Under The Medical Device Amendments, 39 J. Marshall L. Rev. 75 (2005), Michael P. Dinatale
Patients Beware: Preemption Of Common Law Claims Under The Medical Device Amendments, 39 J. Marshall L. Rev. 75 (2005), Michael P. Dinatale
UIC Law Review
No abstract provided.
Remands In Trade Adjustment Assistance Cases, 39 J. Marshall L. Rev. 9 (2005), Munford Page Hall Ii
Remands In Trade Adjustment Assistance Cases, 39 J. Marshall L. Rev. 9 (2005), Munford Page Hall Ii
UIC Law Review
No abstract provided.
American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley
UIC Law Review
No abstract provided.
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
UIC Review of Intellectual Property Law
This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
UIC Review of Intellectual Property Law
Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.
"As The Federal Circuit Turns": The Supreme Court's Consideration Of Merck V. Integra And The Safe Harbor Provision, 4 J. Marshall Rev. Intell. Prop. L. 368 (2005), Blair M. Jacobs, Christina A. Ondrick
"As The Federal Circuit Turns": The Supreme Court's Consideration Of Merck V. Integra And The Safe Harbor Provision, 4 J. Marshall Rev. Intell. Prop. L. 368 (2005), Blair M. Jacobs, Christina A. Ondrick
UIC Review of Intellectual Property Law
The Hatch-Waxman Act was enacted to balance the competing interests in the pharmaceutical marketplace between brand name and generic drug manufacturers. In the twenty years since its inception, the safe harbor provision contained in § 271(e)(1), has been interpreted to provide broad protection to those involved in research activities. However, in 2003, the Federal Circuit narrowly interpreted the safe harbor provision in a move that could potentially frustrate future research and improvements on patented technologies. Merck v. Integra is currently before the United States Supreme Court, who has the challenge of unraveling the competing interests involved. In order to encourage …
Intellectual Property Implications In A Virtual Reality Environment, 4 J. Marshall Rev. Intell. Prop. L. 483 (2005), Timir Chheda
Intellectual Property Implications In A Virtual Reality Environment, 4 J. Marshall Rev. Intell. Prop. L. 483 (2005), Timir Chheda
UIC Review of Intellectual Property Law
What will become of intellectual property interests in a world where virtual reality is a fact of life? To ponder this question we must step back from the sophisticated judicially created tests built around a framework of policy suited for modern reality and first consider whether such policy is viable given a virtual reality environment. Only then may we consider if the tests appropriately further such policy, and if not, modify the tests accordingly. This comment considers the policy and tests implicated when copyright, trademark, and patent law pass through the looking-glass and enter the realm of virtual reality.
Placing The Burden Back Where It Belongs: A Proposal To Eliminate The Affirmative Duty From Willful Infringement Analyses, 4 J. Marshall Rev. Intell. Prop. L. 509 (2005), Kevin J. Kelly
UIC Review of Intellectual Property Law
In order to further the objective of the patent system and maximize the public’s incentive to innovate, it is imperative that the patent laws maintain a balance between the interests of patent owners in excluding others from their patents and the interests of society in the continual progress of technology. The current law in willful infringement analysis upsets this balance with the affirmative duty of due care, which shifts the burden of proof in patent infringement suits from the plaintiff to the alleged infringer. The affirmative duty places a heavy burden on the public and is inconsistent with various common …
Congress Wants To Give The Riaa Control Of Your Ipod: How The Induce Act Chills Innovation And Abrogates Sony, 4 J. Marshall Rev. Intell. Prop. L. 534 (2005), Michael Raucci
UIC Review of Intellectual Property Law
The addition of “active inducement” to the Copyright Act would compliment the doctrine of contributory liability by punishing those who actively encourage copyright infringement. Actively inducing infringement can include advertising an infringing use or other affirmative acts. Therefore, active inducement provides a technology-neutral standard that would not look to punish bad technology but rather bad actions by the technology distributor. In contrast, the reasonable person standard of the Inducing Infringement of Copyright Act of 2004 (“Induce Act”) permits an inappropriate extension of the exclusive rights given to copyright holders by lowering the threshold for litigation. Consequently, the Induce Act improperly …
China's Struggle To Maintain Economic Viability While Enforcing International And Domestic Intellectual Property Rights, 4 J. Marshall Rev. Intell. Prop. L. 608 (2005), Randal S. Alexander
China's Struggle To Maintain Economic Viability While Enforcing International And Domestic Intellectual Property Rights, 4 J. Marshall Rev. Intell. Prop. L. 608 (2005), Randal S. Alexander
UIC Review of Intellectual Property Law
The development of global intellectual property rights (“IPRs”) can lead to complex issues regarding conformity with international standards of IP protection and enforcement. Although each country willing to become a WTO signatory is tasked with the development of such a regime, each country’s domestic affairs and economic survival competes with the burden of adhering to those international standards. This struggle provides the potential for many countries to confuse the boundaries of protection and create a fog of marginal infringement. In China, this fog is heavier because of local protectionism and judicial disincentives to enforce IPRs.