Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Patent Infringement As Criminal Conduct, Jacob S. Sherkow Jan 2012

Patent Infringement As Criminal Conduct, Jacob S. Sherkow

Michigan Telecommunications & Technology Law Review

Criminal and civil law differ greatly in their use of the element of intent. The purposes of intent in each legal system are tailored to effectuate very different goals. The Supreme Court's recent decision in Global-Tech Appliances, Inc. v. SEB S.A., 131 S. Ct. 2060 (2011), however, imported a criminal concept of intent--willful blindness--into the statute for patent infringement, a civil offense. This importation of a criminal law concept of intent into the patent statute is novel and calls for examination. This Article compares the purposes behind intent in criminal law with the purposes behind intent in patent law to …


The Failure Of Sexting Criminalization: A Plea For The Exercise Of Prosecutorial Restraint, Robert H. Wood Jan 2009

The Failure Of Sexting Criminalization: A Plea For The Exercise Of Prosecutorial Restraint, Robert H. Wood

Michigan Telecommunications & Technology Law Review

The purpose of this Essay is to explore the various legal approaches to the sexting phenomenon through an analysis of a decision by the United States District Court for the Middle District of Pennsylvania, which granted a temporary restraining order enjoining the prosecution of sexting teens on constitutional grounds, and an examination of current and pending legislative attempts to deal with the sexting phenomenon. Section I describes the facts leading up to the district court decision and its subsequent holding. Section II examines the approaches to sexting prosecution and legislation taken by other states. Section III analyzes the legal issues …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young Oct 2003

Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young

Michigan Telecommunications & Technology Law Review

This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …


Economic Espionage Act--Reverse Engineering And The Intellectual Property Public Policy, The, Craig L. Uhrich Jun 2001

Economic Espionage Act--Reverse Engineering And The Intellectual Property Public Policy, The, Craig L. Uhrich

Michigan Telecommunications & Technology Law Review

The publicity surrounding[...] incidents of industrial espionage resulted in a push for federal protections. In response to this pressure from U.S. industries, Congress passed the Economic Espionage Act of 1996 ("EEA"). The EEA protects trade secrets through the use of federal criminal sanctions." The EEA's provisions are introduced in Part I. Trade secrets are a form of intellectual property. Therefore, a basic understanding of intellectual property law is important to an analysis of the EEA. Part II of this Article provides an overview of the various forms of intellectual property. To be effective, the EEA must complement existing intellectual property …


Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum Jun 2000

Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum

Michigan Telecommunications & Technology Law Review

The purpose of this comment is to analyze the potential First Amendment implications of the appearance of bomb-making instructions on the Web in the United States. Moreover, this comment will ultimately consider the notion that "because Brandenburg allows consideration of all the unique characteristics of the Web, there is no reason to formulate new jurisprudence merely because of new technology." Part II examines the seminal cases in the area of speech action, including Schenck v. United States, Hess v. Indiana, and Brandenburg v. Ohio, and the adulations and criticisms that resulted from these cases. Part III discusses the civil cases …


Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz Jun 2000

Taking A Bite Out Of Circumvention: Analyzing 17 U.S.C. 1201 As A Criminal Law, Jason M. Schulz

Michigan Telecommunications & Technology Law Review

...information content providers who depend heavily on copyright law are growing increasingly wary of advances in digital technology that allow manipulation of their content and potentially diminish the effectiveness of their copyright protection. Technology firms, on the other hand, are looking more and more at developing products which provide low-cost, high quality access to content without restriction. Thus, as technologists work feverishly to find new ways to free up information, content providers are fighting just as hard to constrain access in order to prevent market-killing duplication and distribution of their works. These two codependent yet clashing interest groups recently met …