Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian Oct 2002

Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian

Michigan Telecommunications & Technology Law Review

The purpose of this research guide is not to answer the question "What remedies are available to an owner of computer related technology whose rights have been infringed?" but to provide a methodology by which a legal practitioner can find the answer to this question. This guide sets forth materials and methods of research that can be used for an inquiry that is broad in scope, such as researching which legal scheme's remedial component best suits a client's technology, but that are also capable of being used for a narrow or limited inquiry, such as looking for specific remedies available …


Economic Espionage Act--Reverse Engineering And The Intellectual Property Public Policy, The, Craig L. Uhrich Jun 2001

Economic Espionage Act--Reverse Engineering And The Intellectual Property Public Policy, The, Craig L. Uhrich

Michigan Telecommunications & Technology Law Review

The publicity surrounding[...] incidents of industrial espionage resulted in a push for federal protections. In response to this pressure from U.S. industries, Congress passed the Economic Espionage Act of 1996 ("EEA"). The EEA protects trade secrets through the use of federal criminal sanctions." The EEA's provisions are introduced in Part I. Trade secrets are a form of intellectual property. Therefore, a basic understanding of intellectual property law is important to an analysis of the EEA. Part II of this Article provides an overview of the various forms of intellectual property. To be effective, the EEA must complement existing intellectual property …


Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok Jun 2000

Establishing A Legitimate Expectation Of Privacy In Clickstream Data, Gavin Skok

Michigan Telecommunications & Technology Law Review

This Article argues that Web users should enjoy a legitimate expectation of privacy in clickstream data. Fourth Amendment jurisprudence as developed over the last half-century does not support an expectation of privacy. However, reference to the history of the Fourth Amendment and the intent of its drafters reveals that government investigation and monitoring of clickstream data is precisely the type of activity the Framers sought to limit. Courts must update outdated methods of expectation of privacy analysis to address the unique challenges posed by the Internet in order to fulfill the Amendment's purpose. Part I provides an overview of the …