Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba Oct 2002

Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba

Michigan Telecommunications & Technology Law Review

Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …


Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan Oct 2002

Constitutional Issues In Information Privacy, Fred H. Cate, Robert Litan

Michigan Telecommunications & Technology Law Review

The U.S. Constitution has been largely ignored in the recent flurry of privacy laws and regulations designed to protect personal information from incursion by the private sector despite the fact that many of these enactments and efforts to enforce them significantly implicate the First Amendment. Questions about the role of the Constitution have assumed new importance in the aftermath of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. Recent efforts to identify and apprehend terrorists and to protect against future attacks threaten to weaken constitutional protections against government intrusions into personal privacy. However, these …


Business Method Patents And Their Limits: Justifications, History, And The Emergence Of A Claim Construction Jurisprudence, Nicholas A. Smith Oct 2002

Business Method Patents And Their Limits: Justifications, History, And The Emergence Of A Claim Construction Jurisprudence, Nicholas A. Smith

Michigan Telecommunications & Technology Law Review

Scholars, practitioners, and even popular media spilled much ink over business method patents in the late 1990s, eager to discuss the shift in jurisprudence that enabled patent holders to enforce business method patents for the first time. Since that initial period of excitement--during which businesses filed record numbers of applications for business method patents, and numerous articles tracing the doctrinal shift were published--commentators have written little on the topic. Various patent holders, however, have since litigated business method patent claims. During these first few years after judicial endorsement of business method patents, such litigation has focused on the scope of …


Best Mode: A Plea To Repair Or Sacrifice This Broken Requirement Of United States Patent Law, Steven B. Walmsley Oct 2002

Best Mode: A Plea To Repair Or Sacrifice This Broken Requirement Of United States Patent Law, Steven B. Walmsley

Michigan Telecommunications & Technology Law Review

An inventor's obligation to disclose the best mode of her invention is strong consideration in the U.S. patent bargain, but the courts paradoxically define the scope of that obligation, thus rendering the enforcement of U.S. patents unreasonably unpredictable. If an inventor cannot reasonably foresee the scope of her obligation to disclose invention details, then she is subjected to the costs and risks of either overcompliance or undercompliance with the best mode requirement. The scope of the best mode requirement should either be reliably defined by an en banc ruling of the Court of Appeals for the Federal Circuit, or the …


Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian Oct 2002

Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian

Michigan Telecommunications & Technology Law Review

The purpose of this research guide is not to answer the question "What remedies are available to an owner of computer related technology whose rights have been infringed?" but to provide a methodology by which a legal practitioner can find the answer to this question. This guide sets forth materials and methods of research that can be used for an inquiry that is broad in scope, such as researching which legal scheme's remedial component best suits a client's technology, but that are also capable of being used for a narrow or limited inquiry, such as looking for specific remedies available …


Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White Jun 2002

Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White

Michigan Telecommunications & Technology Law Review

Despite differences in patent law jurisprudence in Germany, the United Kingdom and the United States, the fundamental principles underlying each system serve the same basic purpose: to encourage technological innovation and dissemination of knowledge. In granting exclusive patent rights, it is important that the scope of patent protection not be so broad as to remove existing knowledge from the public domain. The scope of protection should strike a balance between granting adequate patent rights while preserving the public's ownership in the public domain or the prior art. To encourage innovation patentees must attain significant exclusive rights, while potential infringers receive …


Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien Jun 2002

Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking The Identity Of Anonymous Employee Internet Posters, Margo E. K. Reder, Christine Neylon O'Brien

Michigan Telecommunications & Technology Law Review

Communications systems are now wide open and fully accessible, with no limits in range, scope or geography. Targeted audiences are accessible with pinpoint accuracy. Messages reach millions of readers with one click. There is a chat room for everyone. Most importantly, there is no limit on content. Therefore, employees can register their dissatisfaction by posting a message in a chat room. Moreover, the identity of the posting employee is not easily discoverable due to anonymous and pseudonymous communications capabilities. The nature of these online messages is qualitatively different from real-world communications. By way of example, newspapers have a responsibility regarding …


Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr Jun 2002

Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr

Michigan Telecommunications & Technology Law Review

"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …


Key Disclosure Issues For Life Sciences Companies: Fda Product Approval, Clinical Test Results, And Government Inspections, William O. Fisher Jun 2002

Key Disclosure Issues For Life Sciences Companies: Fda Product Approval, Clinical Test Results, And Government Inspections, William O. Fisher

Michigan Telecommunications & Technology Law Review

The government, particularly the Food and Drug Administration ("FDA"), heavily regulates the life sciences industry. FDA actions can have an extraordinary influence on the fortunes of biotechnology companies. Timely FDA approval of a drug or medical device can permit a company to exploit an inviting market window. FDA product approval is, in turn, tied to clinical test results which demonstrate "efficacy" and safety. Delayed approval, unfavorable test results, or the denial of an FDA application may ruin a company. Beyond the FDA product approval process and related testing lie FDA inspections and the possibility that the government will investigate charges …


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …