Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (6)
- Internet Law (4)
- Communications Law (2)
- Comparative and Foreign Law (2)
- Contracts (2)
-
- Courts (2)
- Marketing Law (2)
- Science and Technology Law (2)
- Administrative Law (1)
- Commercial Law (1)
- Computer Law (1)
- Entertainment, Arts, and Sports Law (1)
- Food and Drug Law (1)
- International Law (1)
- International Trade Law (1)
- Law and Economics (1)
- Legal Ethics and Professional Responsibility (1)
- Legal History (1)
- Legislation (1)
- Privacy Law (1)
- Transportation Law (1)
- Keyword
-
- Internet (5)
- Patent law (4)
- Consumers (3)
- Advertising (2)
- Data security (2)
-
- Electronic commerce (2)
- Information (2)
- Licenses (2)
- Patent system (2)
- Technology (2)
- Territoriality (2)
- Aircraft (1)
- Attorney advertising (1)
- Authority (1)
- Biotechnology (1)
- Blawgs (1)
- Blogs (1)
- China (1)
- Claim construction (1)
- Coneyances (1)
- Contract enforceability (1)
- Contract formation (1)
- Contract terms (1)
- Data (1)
- Data mining (1)
- Data protection (1)
- Databases (1)
- Digital rights management (1)
- Disclaimers (1)
- Drug approval (1)
Articles 1 - 12 of 12
Full-Text Articles in Law
Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon
Improving Post-Approval Risk Surveillance For Drugs: Active Post-Market Risk Identification, Matthew Gordon
Michigan Telecommunications & Technology Law Review
Pre-approval clinical trials cannot possibly ensure that a drug will not have disastrous side effects once it arrives on the market. Post-approval drug safety data gathering was put in place to address this problem, but as implemented, it has not proven to be as effective as hoped. Congress recently overhauled the legislation regarding post-approval drug risk identification, and in doing so made a deliberate decision to put much of the burden of post-approval drug surveillance on the FDA through data mining. Further, the legislation gave the FDA the power to require post-approval clinical trials from drug makers only in limited …
Royalty Rate-Setting For Webcasters: A Royal(Ty) Mess, Amy Duvall
Royalty Rate-Setting For Webcasters: A Royal(Ty) Mess, Amy Duvall
Michigan Telecommunications & Technology Law Review
The Internet is a haven for free expression. Not only are content-based restrictions disfavored, but "[the internet] provides relatively unlimited, low-cost capacity for communication of all kinds." Almost half of all Americans have listened to music online, whether rebroadcasts of terrestrial radio or to find niche music that terrestrial radio simply does not play, and 13 percent tune in regularly. Webcasters provide a unique outlet for new artists; however, if royalty rates are set too high for all but the largest webcasters to stay in business, the variety of music available will be severely restricted. Musical diversity stimulates the generation …
Making Much Ado About Theory: The Chinese Trademark Law, Leah Chan Grinvald
Making Much Ado About Theory: The Chinese Trademark Law, Leah Chan Grinvald
Michigan Telecommunications & Technology Law Review
Although the United States has had an active hand in the implementation of trademark law in China over the past century, the same frustrations that marked the turn of the twentieth century are reflected in the twenty-first century. This Article posits that one of the reasons that the United States has not seen the desired level of progress in China's protection of trademarks lies in the imposition of an American theory of trademarks, which has inhibited U.S. reform efforts in China to date. This imposition is understandable, as little thought has been given to the Chinese theoretical justification for their …
Synopsis Of The Extraterritorial Protection Afforded By Section 337 As Compared To The Patent Act , Neil F. Duchez
Synopsis Of The Extraterritorial Protection Afforded By Section 337 As Compared To The Patent Act , Neil F. Duchez
Michigan Telecommunications & Technology Law Review
Unlike Section 271 of the Patent Act of 1952, "[s]ection 337 is a trade law which is not necessarily limited by the principles of domestic patent law." When examined more closely, Section 337 of the U.S. Tariff Act of 1930 in effect provides a patentee more protection from infringing foreign activity than Section 271. Accordingly, in many situations involving foreign acts, it may be more advantageous to enforce a U.S. patent at the International Trade Commission ("Commission") as opposed to a federal district court. The analysis discussed infra more closely examines those situations and provides the history behind the intended …
Hiding Behind Nationality: The Temporary Presence Exception And Patent Infringement Avoidance, J. Jonas Anderson
Hiding Behind Nationality: The Temporary Presence Exception And Patent Infringement Avoidance, J. Jonas Anderson
Michigan Telecommunications & Technology Law Review
This Article argues that the temporary presence exception was not designed to allow conveyance owners the ability to select the most optimal patent system under which to be subject. It also examines the ramifications of the temporary presence exception on international commerce and concludes that increased use of the exception may result in reduced values for patents relating to international conveyances, reduced incentives to invest in and develop technologies in international conveyances, and a decrease in the quality of various domestic patent systems worldwide. Finally, this Article proposes a solution to these problems. The temporary presence exception has received some …
Can We Dicker Online Or Is Traditional Contract Formation Really Dying - Rethinking Traditional Contract Formation For The World Wide Web, Tatiana Melnik
Can We Dicker Online Or Is Traditional Contract Formation Really Dying - Rethinking Traditional Contract Formation For The World Wide Web, Tatiana Melnik
Michigan Telecommunications & Technology Law Review
When most people imagine the process of contract formation, they picture two people sitting down and negotiating, arguing about particular contract provisions and particular contract terminology, and maybe even involving attorneys to draft an "official" version of the contract. Regardless of the specific details people imagine, traditional contract formation generally involves some form of negotiation between two parties where they choose one set of terms over another. In modern society, however, such negotiation happens very rarely. People enter into many contracts on a daily basis, for example, when they purchase goods or services online. Online purchases are governed by computers, …
The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay
The General Public License Version 3.0: Making Or Breaking The Foss Movement, Clark D. Asay
Michigan Telecommunications & Technology Law Review
Free and open source software (FOSS) is a big deal. FOSS has become an undeniably important element for businesses and the global economy in general, as companies increasingly use it internally and attempt to monetize it. Governments have even gotten into the act, as a recent study notes that FOSS plays a critical role in the US Department of Defense's systems. Others have pushed for the adoption of FOSS to help third-world countries develop. Given many of its technological and developmental advantages, FOSS's use, adoption, and development are only projected to grow.[...] The FSF created the most popular version of …
The Claim Construction Effect, Lee Petherbridge
The Claim Construction Effect, Lee Petherbridge
Michigan Telecommunications & Technology Law Review
Claim construction refers to the task of construing, or interpreting, the words of patents' claims to establish the metes and bounds of a patent. Theoretically, the task of claim construction serves to operationalize the concept of "invention," which lies at the heart of the U.S. patent system.[...] Rather than focusing on the set of cases in which the Federal Circuit addresses claim construction, this study focuses on a set of cases defined by a different patent doctrine. The basic idea is to explore the impact of claim construction on other areas of patent law.[...] The hypothesis of the claim construction …
E-Contract Doctrine 2.0: Standard Form Contracting In The Age Of Online User Participation , Shmuel I. Becher, Tal Z. Zarsky
E-Contract Doctrine 2.0: Standard Form Contracting In The Age Of Online User Participation , Shmuel I. Becher, Tal Z. Zarsky
Michigan Telecommunications & Technology Law Review
The growing popularity of e-commerce transactions revives the perennial question of consumer contract law: should non-salient provisions of consumer standard form contracts be enforced? With the focus presently on an ex-ante analysis, scholars debate whether consumers can and should read standardized terms at the time of contracting. In today's information age, such a focus might be misguided. The online realm furnishes various tools, so-called "Web 2.0" applications, which encourage the flow of information from experienced to prospective consumers. This Article, therefore, reframes the analysis of online consumer contracts while taking into account this new flow of information. In doing so, …
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
When Mobile Phones Are Rfid-Equipped - Finding E.U.-U.S. Solutions To Protect Consumer Privacy And Facilitate Mobile Commerce, Nancy J. King
Michigan Telecommunications & Technology Law Review
New mobile phones have been designed to include delivery of mobile advertising and other useful location-based services, but have they also been designed to protect consumers' privacy? One of the key enabling technologies for these new types of phones and new mobile services is Radio Frequency Identification (RFID), a wireless communication technology that enables the unique identification of tagged objects. In the case of RFID-enabled mobile phones, the personal nature of the devices makes it very likely that, by locating a phone, businesses will also be able to locate its owner. Consumers are currently testing new RFID-enabled phones around the …
A New Frontier Or Merely A New Medium - An Analysis Of The Ethics Of Blawgs, Justin Krypel
A New Frontier Or Merely A New Medium - An Analysis Of The Ethics Of Blawgs, Justin Krypel
Michigan Telecommunications & Technology Law Review
The purpose of this Note is to investigate those rules of ethics which interact with attorney blogs, placing a special emphasis on advertising rules. The central finding is that, under the Supreme Court's current First Amendment jurisprudence, attorney blogs (or, more cleverly, "blawgs") are not subject to regulation by the ethics codes of the ABA or the various state bars. Furthermore, if the Supreme Court were to, for some reason, construe blawgs as falling outside of First Amendment protection, evidence suggests that regulating this new medium would be neither desirable nor effective. Part II outlines the historical framework which underlies …
Research Tool Patents After Integra V. Merck - Have They Reached A Safe Harbor, Wolrad Prinz
Research Tool Patents After Integra V. Merck - Have They Reached A Safe Harbor, Wolrad Prinz
Michigan Telecommunications & Technology Law Review
The saga surrounding the Integra v. Merck cases has rekindled a heated debate about the proper scope of both common law exemption and the safe harbor provision, causing significant concern for owners of research tool patents. This Article will argue that the next judicial decision addressing the question of research tool patents should clarify that they are in a safe harbor because none of the two exemptions from infringement referenced above extends to the use of research tools in experiments in order to preserve the necessary incentives for their creation in the first place. Allowing access to research tools under …