Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 102

Full-Text Articles in Law

Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu Jan 2008

Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu

UIC Review of Intellectual Property Law

Commentators have attributed China’s piracy and counterfeiting problems to the lack of political will on the part of Chinese authorities. They have also cited the many political, social, economic, cultural, judicial, and technological problems that have arisen as a result of the country’s rapid economic transformation and accession to the WTO. This provocative essay advances a third explanation. It argues that the failure to resolve piracy and counterfeiting problems in China can be partly attributed to the lack of political will on the part of U.S. policymakers and the American public to put intellectual property protection at the very top …


Making A Federal Case For Copyrighting Stage Directions: Einhorn V. Mergatroyd Productions, 7 J. Marshall Rev. Intell. Prop. L. 393 (2008), Jennifer J. Maxwell Jan 2008

Making A Federal Case For Copyrighting Stage Directions: Einhorn V. Mergatroyd Productions, 7 J. Marshall Rev. Intell. Prop. L. 393 (2008), Jennifer J. Maxwell

UIC Review of Intellectual Property Law

To date, no court has ruled on whether stage directions are copyrightable. Einhorn v. Mergatroyd Productions is the most recent case to directly address the copyrightability of stage directions and blocking scripts. However, the court was unable to decide the copyright issue because both parties to the suit failed to address a series of questions necessary to the resolution of the claim. Nonetheless, the Einhorn decision gives hope to future directors because it highlights the issues crucial to proving a case of copyright infringement of stage directions. This comment advocates for the copyright protection of stage directions that fulfill the …


Justice Breyer's Bicycle And The Ignored Elephant Of Patent Exhaustion: An Avoidable Collision In Quanta V. Lge, 7 J. Marshall Rev. Intell. Prop. L. 245 (2008), John W. Osborne Jan 2008

Justice Breyer's Bicycle And The Ignored Elephant Of Patent Exhaustion: An Avoidable Collision In Quanta V. Lge, 7 J. Marshall Rev. Intell. Prop. L. 245 (2008), John W. Osborne

UIC Review of Intellectual Property Law

The Supreme Court held in United States v. Univis Lens Co. that the authorized disposition of an article embodying the essential features of a patent claim exhausts that claim. The Federal Circuit’s LGE v. Bizcom decision, currently under review by the Supreme Court in Quanta v. LGE, improperly held that patent exhaustion could be disclaimed by contract. Patent exhaustion is a limitation on statutory rights which cannot be expanded by contract. Moreover, Quanta v. LGE is governed by the contributory infringement statute. Contributory infringement and exhaustion are opposite ends of the same principle in the Quanta v. LGE factual scenario. …


Rediscovering The Doctrine Of Marking Estoppel After Medimmune: Balancing The Public Interest And Private Rights, 7 J. Marshall Rev. Intell. Prop. L. 573 (2008), Michael D. Karson Jan 2008

Rediscovering The Doctrine Of Marking Estoppel After Medimmune: Balancing The Public Interest And Private Rights, 7 J. Marshall Rev. Intell. Prop. L. 573 (2008), Michael D. Karson

UIC Review of Intellectual Property Law

Marking is the act of placing a patent number on a product or its packaging. The doctrine of marking estoppel deals with whether the act of marking will preclude denials of patent infringement or patent validity challenges. This comment reviews the history of marking estoppel and determines that although the Federal Circuit has expressed reservations about the doctrine, marking estoppel remains viable. This comment argues that marking estoppel should preclude a marking party from denying patent infringement when the marking party has acted with scienter and the asserting party has come to court with clean hands. However, because of the …


Chief Judge Paul R. Michel's Address To The Federal Circuit Judicial Conference On The State Of The Court, 7 J. Marshall Rev. Intell. Prop. L. 647 (2008), Paul R. Michel Jan 2008

Chief Judge Paul R. Michel's Address To The Federal Circuit Judicial Conference On The State Of The Court, 7 J. Marshall Rev. Intell. Prop. L. 647 (2008), Paul R. Michel

UIC Review of Intellectual Property Law

On May 15, 2008, Chief Judge of the United States Court of Appeals for the Federal Circuit Paul R. Michel delivered the annual State of the Court speech. Chief Judge Michel delivered this speech during the Federal Circuit Judicial Conference, held at the Grand Hyatt hotel in Washington. The text of that speech and the corresponding graphics appear here.


The Uneven Application Of Twombly In Patent Cases: An Argument For Leveling The Playing Field, 8 J. Marshall Rev. Intell. Prop. L. 1 (2008), R. David Donoghue Jan 2008

The Uneven Application Of Twombly In Patent Cases: An Argument For Leveling The Playing Field, 8 J. Marshall Rev. Intell. Prop. L. 1 (2008), R. David Donoghue

UIC Review of Intellectual Property Law

The Supreme Court's recent Twombly decision has tightened pleading standards by retiring Conley v. Gibson’s “no set of facts” language. While Twombly has been applied beyond antitrust law, its impact on patent pleadings is not yet settled. Currently, a troubling dichotomy has emerged: lower courts are holding defendants to a heightened pleading standard for affirmative defenses and counterclaims, while allowing plaintiffs to continue the pre-Twombly “bare-bones” pleadings practice. This dichotomy is inconsistent with the Twombly Court’s goal of controlling the ballooning size of and costs of complex civil litigation. Holding patent plaintiffs to a heightened pleading standard would be at …


Throwing Judge Bryson's Curveball: A Pro Patent View Of Process Claims As Patent-Eligible Subject Matter, 7 J. Marshall Rev. Intell. Prop. L. 701 (2008), Christopher A. Harkins Jan 2008

Throwing Judge Bryson's Curveball: A Pro Patent View Of Process Claims As Patent-Eligible Subject Matter, 7 J. Marshall Rev. Intell. Prop. L. 701 (2008), Christopher A. Harkins

UIC Review of Intellectual Property Law

Can a baseball pitcher patent a method of throwing a curveball? On May 8, 2008, Judge Bryson posed that hypothetical as a way of stressing a point during the oral argument of In re Bilski, one of the most highly-attended hearings in the twenty-five year history of the Federal Circuit. In the Bilski case, the Federal Circuit will decide whether to embrace a new patentability test that redefines what is patent-eligible subject matter in the United States, or to create a fourth no-no to patent eligibility. At stake are many computer software patents and business method patents that form the …


The Computer Fraud And Abuse Act: A Vehicle For Litigating Trade Secrets In Federal Court, 8 J. Marshall Rev. Intell. Prop. L. 155 (2008), Graham M. Liccardi Jan 2008

The Computer Fraud And Abuse Act: A Vehicle For Litigating Trade Secrets In Federal Court, 8 J. Marshall Rev. Intell. Prop. L. 155 (2008), Graham M. Liccardi

UIC Review of Intellectual Property Law

Federal jurisdictions are split on the reach of the Computer Fraud and Abuse Act (“CFAA”) in situations where computer-stored trade secrets are stolen by former employees who possessed authorization to access and use the trade secret information. This comment explores both the broad and narrow interpretations of the CFAA. It proposes that courts adopt the broad interpretation, which includes principles of agency law, in order to determine when an employee is “without authorization” under the CFAA. Courts should also adopt the broad interpretation in situations where trade secrets are stolen because an employee is only granted a “limited license” to …


The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti Jan 2008

The Future Of Privacy Policies: A Privacy Nutrition Label Filled With Fair Information Practices, 26 J. Marshall J. Computer & Info. L. 1 (2008), Corey A. Ciocchetti

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the threats accompanying online shopping, such as identity theft and aggregated data files. Such issues arise when companies carelessly lose laptops filled with unencrypted data or callously sell data on the open market with collected personally identifying information (PII). The article explains that although privacy policies are supposed to force companies to strengthen their privacy practices they are not always effective because companies often post inconspicuous, vague and legalese-filled policies. These ambiguous postings cause online shoppers to blindly submit PII and ignore privacy practices completely. The article proposes a solution to this problem through the standardization …


United States V. Andrus: Password Protect Your Roommate, Not Your Computer, 26 J. Marshall J. Computer & Info. L. 183 (2008), Sarah M. Knight Jan 2008

United States V. Andrus: Password Protect Your Roommate, Not Your Computer, 26 J. Marshall J. Computer & Info. L. 183 (2008), Sarah M. Knight

UIC John Marshall Journal of Information Technology & Privacy Law

The article looks at the decision in United States v. Andrus, where it was determined that the police could obtain consent from a father to search an adult son’s computer without first checking if the father who gave consent know the password and therefore had apparent authority to search. The police used Encase, software designed to make a forensic copy of a hard drive, without even turning on the computer. The 10th Circuit majority opinion decided the police committed no error when they conducted the search. The article’s author argues that the dissenting opinion took the correct position in its …


Symbiotic Regulation, 26 J. Marshall J. Computer & Info. L. 207 (2008), Andrew Murray Jan 2008

Symbiotic Regulation, 26 J. Marshall J. Computer & Info. L. 207 (2008), Andrew Murray

UIC John Marshall Journal of Information Technology & Privacy Law

In this paper the author points out that complexity is at the heart of much of the work of today’s academia. The paper explains how the role of an academic researcher may be defined as studying and modelling complexity in an effort to make it accessible to a wider audience. This article models the complexity of regulatory relationships in communications networks and in particular the Internet. First, the article models the complexity of the regulatory environment. Next, it explains how regulators may harness the power of the network to achieve effective regulatory settlements by harnessing symbiotic regulation. Finally, it explains …


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law:Summary Of Bench Memorandum, 26 J. Marshall J. Computer & Info. L. 259 (2008), Robin Ficke, James Lai, Steven Tseng, Panagiota Kelali Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law:Summary Of Bench Memorandum, 26 J. Marshall J. Computer & Info. L. 259 (2008), Robin Ficke, James Lai, Steven Tseng, Panagiota Kelali

UIC John Marshall Journal of Information Technology & Privacy Law

Petitioner, Alex Romero (“Romero”), appeals to the Marshall Supreme Court from an order granting summary judgment in favor of Respondent, Windbucket Entertainment, LLC (“Windbucket”). Romero’s lawsuit alleged that Windbucket and a third party (not a party to the present appeal) were liable to him for invasion of privacy by intrusion upon seclusion. Romero then sought discovery sanctions against Windbucket for violations of Marshall Rule of Civil Procedure 37. The issues in the case concern whether a subscriber to an Internet-based, multiplayer computer game can state a valid invasion of privacy claim against the game’s publisher, when liability is based on …


Wikipedia Made Law? The Federal Judicial Citation Of Wikipedia, 26 J. Marshall J. Computer & Info. L. 229 (2008), Amber Lynn Wagner Jan 2008

Wikipedia Made Law? The Federal Judicial Citation Of Wikipedia, 26 J. Marshall J. Computer & Info. L. 229 (2008), Amber Lynn Wagner

UIC John Marshall Journal of Information Technology & Privacy Law

In this comment the author examines the new and growing body of federal opinions citing Wikipedia an authoritative source. The comment details how Wikipedia articles are generated, and the ease with which anyone can edit them, to illustrate their shortcomings as sources for making judicial determinations. The author provides examples of federal cases where judges rely on Wikipedia to define terms ranging from colloquial phrases to medical equipment. The author points out that in spite of several academic institutions and the U.S. Trade and Patent Office banning it as a source, federal judges continue to rely on Wikipedia in their …


Opening The Red Cross International Tracing Service Archive, 26 J. Marshall J. Computer & Info. L. 161 (2008), Kenneth Waltzer Jan 2008

Opening The Red Cross International Tracing Service Archive, 26 J. Marshall J. Computer & Info. L. 161 (2008), Kenneth Waltzer

UIC John Marshall Journal of Information Technology & Privacy Law

The Red Cross International Tracing Service Archive in Bad Arolsen contains nearly 17.5 million names and nearly 50 million World War II and post-war era documents. The Bonn Accords designated the International Tracing Service (“ITS”) as the sole caretaker of these documents. A recent revision to the Bonn Accords has resulted in a reopening of archives at Bad Arolsen. ITS has started to digitize materials, and the data has been distributed to designated research institutions. The revision also resulted in access to the archives for research purposes. This expanded availability of the information has raised a number of important questions …


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 26 J. Marshall J. Computer & Info. L. 283 (2008), David Caras, Jennifer Robbins, Zach Rudisill Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 26 J. Marshall J. Computer & Info. L. 283 (2008), David Caras, Jennifer Robbins, Zach Rudisill

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Beyond Whiffle-Ball Bats: Addressing Identity Crime In An Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008), Erin Kenneally, Jon Stanley Jan 2008

Beyond Whiffle-Ball Bats: Addressing Identity Crime In An Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008), Erin Kenneally, Jon Stanley

UIC John Marshall Journal of Information Technology & Privacy Law

The article discusses the challenges to the protection of private personal information in the age of rapid technological changes and advances with a particular focus on the explosion of Identity Theft Crime (IDC). The paper highlights the compartmentalized and imbalanced roles that the free market and law enforcement (LE) play in response to this emerging threat to privacy, the implications of this dynamic, and recommendations for improving the societal risk management of Identity Crime.


The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 26 J. Marshall J. Computer & Info. L. 321 (2008), Adam Powell, Erin Blake, Kris Kokotayo Jan 2008

The Twenty-Seventh Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 26 J. Marshall J. Computer & Info. L. 321 (2008), Adam Powell, Erin Blake, Kris Kokotayo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Internet Infrastructure And Online Alternative Dispute Resolution, 25 J. Marshall J. Computer & Info. L. 217 (2008), Haitham A. Haloush Jan 2008

Internet Infrastructure And Online Alternative Dispute Resolution, 25 J. Marshall J. Computer & Info. L. 217 (2008), Haitham A. Haloush

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


All Or Nothing: This Is The Question? The Application Of Article 3(2) Data Protection Directive 95/46/Ec To The Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008), Rebecca Wong, Joseph Savirimuthu Jan 2008

All Or Nothing: This Is The Question? The Application Of Article 3(2) Data Protection Directive 95/46/Ec To The Internet, 25 J. Marshall J. Computer & Info. L. 241 (2008), Rebecca Wong, Joseph Savirimuthu

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger Jan 2008

Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dancing In The Rain: Who Is Your Partner In The Corporate Boardroom?, 25 J. Marshall J. Computer & Info. L. 267 (2008), Maureen Duffy-Lewis, Daniel B. Garrie Jan 2008

Dancing In The Rain: Who Is Your Partner In The Corporate Boardroom?, 25 J. Marshall J. Computer & Info. L. 267 (2008), Maureen Duffy-Lewis, Daniel B. Garrie

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 25 J. Marshall J. Computer & Info. L. 337 (2008), Joshua Deitz, Kakuti Lin, Lindsey Shinn Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 25 J. Marshall J. Computer & Info. L. 337 (2008), Joshua Deitz, Kakuti Lin, Lindsey Shinn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Deadly Combinations: A Framework For Analyzing The Gpl’S Viral Effect, 25 J. Marshall J. Computer & Info. L. 487 (2008), Ron Phillips Jan 2008

Deadly Combinations: A Framework For Analyzing The Gpl’S Viral Effect, 25 J. Marshall J. Computer & Info. L. 487 (2008), Ron Phillips

UIC John Marshall Journal of Information Technology & Privacy Law

Free and Open Source Software (FOSS) is free to use and can be downloaded from the Internet. This paper argues that adaptations that combine community source licensed software with an organization’s own intellectual property can trigger “viral” terms of the community source licenses in unexpected ways. The author proposes a model framework for analyzing software combinations to determine whether the viral terms are triggered, and illustrate that analysis against various technical combinations of community-sourced and proprietary software. Author Footnote: Vice President and General Counsel, Serlio Software Development Corporation; J.D. MarquetteUniversity Law School; B.S. University of Washington.


The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 25 J. Marshall J. Computer & Info. L. 371 (2008), Stacy Appleton, Adam Butkus, Nick Mutton Jan 2008

The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 25 J. Marshall J. Computer & Info. L. 371 (2008), Stacy Appleton, Adam Butkus, Nick Mutton

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Litigating At The Boundaries, 25 J. Marshall J. Computer & Info. L. 609 (2008), Keith G. Chval Jan 2008

Litigating At The Boundaries, 25 J. Marshall J. Computer & Info. L. 609 (2008), Keith G. Chval

UIC John Marshall Journal of Information Technology & Privacy Law

This article details some of the real world challenges facing the legal processes in the United States as information storage and retrieval technology outstrips legal procedures for dealing with these processes. Describing a “perfect storm” of litigation needs, technology and information concerns, he describes the continuing stumbling blocks in dealing effectively with an information world which is becoming increasingly digital, on more consumer devices that may make the protection and discovery of such information increasingly problematic.


Information Convergence: At The Boundaries Of Access: Introduction, 25 J. Marshall J. Computer & Info. L. 585 (2008), Doris E. Long, Leslie Ann Reis Jan 2008

Information Convergence: At The Boundaries Of Access: Introduction, 25 J. Marshall J. Computer & Info. L. 585 (2008), Doris E. Long, Leslie Ann Reis

UIC John Marshall Journal of Information Technology & Privacy Law

This introduction describes "information convergence," the subject of the Symposium presented at The John Marshall Law School by The Center for Information Technology and Privacy Law and The Center for Intellectual Property Law. The introduction previews the speeches and presentations given at the Symposium and featured in this issue of the Journal.


Potential Pitfalls In High-Tech Copyright Litigation, 25 J. Marshall J. Computer & Info. L. 513 (2008), Peter J. Shurn Iii Jan 2008

Potential Pitfalls In High-Tech Copyright Litigation, 25 J. Marshall J. Computer & Info. L. 513 (2008), Peter J. Shurn Iii

UIC John Marshall Journal of Information Technology & Privacy Law

Alleging software and data-base infringement is probably the most common offensive strategy currently seen in high-tech copyright litigation. In the context of a hypothetical factual setting, this article explores three potential pitfalls attendant to such a strategy, and suggests ways to minimize those risks.


The Future Of Licensing Music Online: The Role Of Collective Rights Organizations And The Effect Of Territoriality, 25 J. Marshall J. Computer & Info. L. 409 (2008), Neil Conley Jan 2008

The Future Of Licensing Music Online: The Role Of Collective Rights Organizations And The Effect Of Territoriality, 25 J. Marshall J. Computer & Info. L. 409 (2008), Neil Conley

UIC John Marshall Journal of Information Technology & Privacy Law

The current licensing regime practiced by collective rights organizations (“CROs”) is preventing rights holders from being able to reap the financial benefits that the Internet and digital transmissions of music can provide. The problem is that CROs license online music on a restrictive, national basis where the online transmission of music is worldwide, unrestricted by national boundaries. This territorially restrictive licensing system began in the nineteenth century and was practical for geographically limited methods by which music was played and transmitted. However, licenses to transmit music online or in the digital environment in general are restricted on a national basis …


Convergence At The Boundaries Of Information Analysis And Security Technology, 25 J. Marshall J. Computer & Info. L. 599 (2008), Charisse Castagnoli Jan 2008

Convergence At The Boundaries Of Information Analysis And Security Technology, 25 J. Marshall J. Computer & Info. L. 599 (2008), Charisse Castagnoli

UIC John Marshall Journal of Information Technology & Privacy Law

This article examines the problems posed to information security as a result of the unintended changes in either technology or the ways in which we interact with new access platforms. From data security to cyberbullying, to the threats posed by the increasing number of medical devices controlled by remote access, she outlines a rapidly changing world where the convergences between information and technology pose serious threats to information security and access.