Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon Jan 2008

Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon

Michigan Telecommunications & Technology Law Review

Pre-approval clinical trials cannot possibly ensure that a drug will not have disastrous side effects once it arrives on the market. Post-approval drug safety data gathering was put in place to address this problem, but as implemented, it has not proven to be as effective as hoped. Congress recently overhauled the legislation regarding post-approval drug risk identification, and in doing so made a deliberate decision to put much of the burden of post-approval drug surveillance on the FDA through data mining. Further, the legislation gave the FDA the power to require post-approval clinical trials from drug makers only in limited …


Royalty Rate-Setting For Webcasters: A Royal(Ty) Mess, Amy Duvall Jan 2008

Royalty Rate-Setting For Webcasters: A Royal(Ty) Mess, Amy Duvall

Michigan Telecommunications & Technology Law Review

The Internet is a haven for free expression. Not only are content-based restrictions disfavored, but "[the internet] provides relatively unlimited, low-cost capacity for communication of all kinds." Almost half of all Americans have listened to music online, whether rebroadcasts of terrestrial radio or to find niche music that terrestrial radio simply does not play, and 13 percent tune in regularly. Webcasters provide a unique outlet for new artists; however, if royalty rates are set too high for all but the largest webcasters to stay in business, the variety of music available will be severely restricted. Musical diversity stimulates the generation …


Making Much Ado About Theory: The Chinese Trademark Law, Leah Chan Grinvald Jan 2008

Making Much Ado About Theory: The Chinese Trademark Law, Leah Chan Grinvald

Michigan Telecommunications & Technology Law Review

Although the United States has had an active hand in the implementation of trademark law in China over the past century, the same frustrations that marked the turn of the twentieth century are reflected in the twenty-first century. This Article posits that one of the reasons that the United States has not seen the desired level of progress in China's protection of trademarks lies in the imposition of an American theory of trademarks, which has inhibited U.S. reform efforts in China to date. This imposition is understandable, as little thought has been given to the Chinese theoretical justification for their …


Synopsis Of The Extraterritorial Protection Afforded By Section 337 As Compared To The Patent Act , Neil F. Duchez Jan 2008

Synopsis Of The Extraterritorial Protection Afforded By Section 337 As Compared To The Patent Act , Neil F. Duchez

Michigan Telecommunications & Technology Law Review

Unlike Section 271 of the Patent Act of 1952, "[s]ection 337 is a trade law which is not necessarily limited by the principles of domestic patent law." When examined more closely, Section 337 of the U.S. Tariff Act of 1930 in effect provides a patentee more protection from infringing foreign activity than Section 271. Accordingly, in many situations involving foreign acts, it may be more advantageous to enforce a U.S. patent at the International Trade Commission ("Commission") as opposed to a federal district court. The analysis discussed infra more closely examines those situations and provides the history behind the intended …


Hiding Behind Nationality: The Temporary Presence Exception And Patent Infringement Avoidance, J. Jonas Anderson Jan 2008

Hiding Behind Nationality: The Temporary Presence Exception And Patent Infringement Avoidance, J. Jonas Anderson

Michigan Telecommunications & Technology Law Review

This Article argues that the temporary presence exception was not designed to allow conveyance owners the ability to select the most optimal patent system under which to be subject. It also examines the ramifications of the temporary presence exception on international commerce and concludes that increased use of the exception may result in reduced values for patents relating to international conveyances, reduced incentives to invest in and develop technologies in international conveyances, and a decrease in the quality of various domestic patent systems worldwide. Finally, this Article proposes a solution to these problems. The temporary presence exception has received some …


Can We Dicker Online Or Is Traditional Contract Formation Really Dying - Rethinking Traditional Contract Formation For The World Wide Web, Tatiana Melnik Jan 2008

Can We Dicker Online Or Is Traditional Contract Formation Really Dying - Rethinking Traditional Contract Formation For The World Wide Web, Tatiana Melnik

Michigan Telecommunications & Technology Law Review

When most people imagine the process of contract formation, they picture two people sitting down and negotiating, arguing about particular contract provisions and particular contract terminology, and maybe even involving attorneys to draft an "official" version of the contract. Regardless of the specific details people imagine, traditional contract formation generally involves some form of negotiation between two parties where they choose one set of terms over another. In modern society, however, such negotiation happens very rarely. People enter into many contracts on a daily basis, for example, when they purchase goods or services online. Online purchases are governed by computers, …


The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay Jan 2008

The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay

Michigan Telecommunications & Technology Law Review

Free and open source software (FOSS) is a big deal. FOSS has become an undeniably important element for businesses and the global economy in general, as companies increasingly use it internally and attempt to monetize it. Governments have even gotten into the act, as a recent study notes that FOSS plays a critical role in the US Department of Defense's systems. Others have pushed for the adoption of FOSS to help third-world countries develop. Given many of its technological and developmental advantages, FOSS's use, adoption, and development are only projected to grow.[...] The FSF created the most popular version of …


The Claim Construction Effect, Lee Petherbridge Jan 2008

The Claim Construction Effect, Lee Petherbridge

Michigan Telecommunications & Technology Law Review

Claim construction refers to the task of construing, or interpreting, the words of patents' claims to establish the metes and bounds of a patent. Theoretically, the task of claim construction serves to operationalize the concept of "invention," which lies at the heart of the U.S. patent system.[...] Rather than focusing on the set of cases in which the Federal Circuit addresses claim construction, this study focuses on a set of cases defined by a different patent doctrine. The basic idea is to explore the impact of claim construction on other areas of patent law.[...] The hypothesis of the claim construction …


E-Contract Doctrine 2.0: Standard Form Contracting In The Age Of Online User Participation , Shmuel I. Becher, Tal Z. Zarsky Jan 2008

E-Contract Doctrine 2.0: Standard Form Contracting In The Age Of Online User Participation , Shmuel I. Becher, Tal Z. Zarsky

Michigan Telecommunications & Technology Law Review

The growing popularity of e-commerce transactions revives the perennial question of consumer contract law: should non-salient provisions of consumer standard form contracts be enforced? With the focus presently on an ex-ante analysis, scholars debate whether consumers can and should read standardized terms at the time of contracting. In today's information age, such a focus might be misguided. The online realm furnishes various tools, so-called "Web 2.0" applications, which encourage the flow of information from experienced to prospective consumers. This Article, therefore, reframes the analysis of online consumer contracts while taking into account this new flow of information. In doing so, …


When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King Jan 2008

When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King

Michigan Telecommunications & Technology Law Review

New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …


A New Frontier Or Merely A New Medium - An Analysis Of The Ethics Of Blawgs, Justin Krypel Jan 2008

A New Frontier Or Merely A New Medium - An Analysis Of The Ethics Of Blawgs, Justin Krypel

Michigan Telecommunications & Technology Law Review

The purpose of this Note is to investigate those rules of ethics which interact with attorney blogs, placing a special emphasis on advertising rules. The central finding is that, under the Supreme Court's current First Amendment jurisprudence, attorney blogs (or, more cleverly, "blawgs") are not subject to regulation by the ethics codes of the ABA or the various state bars. Furthermore, if the Supreme Court were to, for some reason, construe blawgs as falling outside of First Amendment protection, evidence suggests that regulating this new medium would be neither desirable nor effective. Part II outlines the historical framework which underlies …


Research Tool Patents After Integra V. Merck - Have They Reached A Safe Harbor, Wolrad Prinz Jan 2008

Research Tool Patents After Integra V. Merck - Have They Reached A Safe Harbor, Wolrad Prinz

Michigan Telecommunications & Technology Law Review

The saga surrounding the Integra v. Merck cases has rekindled a heated debate about the proper scope of both common law exemption and the safe harbor provision, causing significant concern for owners of research tool patents. This Article will argue that the next judicial decision addressing the question of research tool patents should clarify that they are in a safe harbor because none of the two exemptions from infringement referenced above extends to the use of research tools in experiments in order to preserve the necessary incentives for their creation in the first place. Allowing access to research tools under …