Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2011

Intellectual Property Law

Discipline
Institution
Publication
File Type

Articles 1 - 30 of 155

Full-Text Articles in Law

How Can Open Source And Closed Source Software Business Structures Mutually Exist, Yugank Goyal, Padmanabha Ramanujam Dec 2011

How Can Open Source And Closed Source Software Business Structures Mutually Exist, Yugank Goyal, Padmanabha Ramanujam

Yugank Goyal

The phenomenon of producing Open Source Software based on unconstrained access to source code and the swift growth of the open source business structure of producing software fuelled by Linux Operating System and Apache Web Server have raised important questions, which are of immense scholastic interest. Accordingly many scholars in the last few years have endeavoured to clarify as to why thousands of top-quality programmers contribute freely to an open source product which is a public good. However, there has hardly been any attempt to explain how open source and closed source business structure of producing software can coexist. This …


Intellectual Property Indemnity Clauses, Thomas Ms Hemnes Dec 2011

Intellectual Property Indemnity Clauses, Thomas Ms Hemnes

Thomas Hemnes

In this article, Mr. Hemnes examines the history of intellectual property warranty and indemnity contractual provisions. He then describes events that have destabilized provisions that had become standardized, particularly in the computer software field, and critiques the positions currently taken by both vendors and customers. He concludes with proposals for a better allocation of risk between technology providers and consumers.


Patents As Escalators, Amelia Smith Rinehart Dec 2011

Patents As Escalators, Amelia Smith Rinehart

Amelia Smith Rinehart

High technology companies commit time, effort and resources to innovation. Over the course of a research and development project, an innovative company may face several sequential decisions regarding whether to continue to invest in the project and whether to commercialize the discoveries that have been made. Companies often seek patents early in the research and development process to receive the right to exclude others from practicing the invention. Given a current trend toward earlier and earlier patent filing, it has been suggested that this strategy could leave many inventions underdeveloped as companies treat patents like real options, deciding later, as …


A State Law Approach To Preserving Fair Use In Academic Libraries, David R. Hansen Nov 2011

A State Law Approach To Preserving Fair Use In Academic Libraries, David R. Hansen

David R Hansen

Every year academic libraries spend millions of dollars to provide their users access to copyrighted works. Much of that money goes not toward purchasing physical copies of books or journals, but toward licensing electronic content from publishers. In those electronic license agreements, the default rules for how users interact with copyrighted content is often altered, and academic library users are deprived of basic rights — especially rights such as fair use — which are granted under federal copyright law. The literature is flush with discussion of the misuse of private contracts to alter the rights granted by Congress in copyright’s …


The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman Nov 2011

The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman

Bill D. Herman

Scholars who discuss copyright often observe that the voices for stronger copyright have more financial and political capital than their opponents and thus tend to win in Congress. While the playing field is still quite slanted toward stronger copyright, the politics around the issue are much messier and less predictable. This study, a detailed political and legislative history of the major proposals regarding copyright and digital rights management from 1987 to 2006, illustrates how this policy dynamic has changed so drastically. In 1987, there was no organized opposition to copyright’s expansion. By 2006, however, there was a substantial coalition of …


Why Full Open Access Matters, Michael W. Carroll Nov 2011

Why Full Open Access Matters, Michael W. Carroll

Michael W. Carroll

This Perspective argues that when authors or funders pay the full cost of publishing a scientific or scholarly journal article in an open access journal, the terms of reuse should require only attribution to some combination of the author(s), the original publisher, and the funder. Publications that charge authors and their financial backers the full cost of publication and then add other reuse restrictions are not fully open access publications.


Sports Merchandizing, Publicity Rights, And The Missing Role Of The Sports Fan, Joseph P. Liu Oct 2011

Sports Merchandizing, Publicity Rights, And The Missing Role Of The Sports Fan, Joseph P. Liu

Joseph P. Liu

Sports fans play a tremendously important role in the success and popularity of sports teams and the enterprise of sports in general. It is somewhat curious, then, that fan interests are almost entirely missing from discussions about certain important legal issues that have a direct impact on them. Specifically, fan interests play a surprisingly limited role in discussions about sports team merchandising and player rights of publicity. This Article argues that modern sports licensing practices are coming into increasing conflict with the interests of sports fans, and that the law should take greater account of such interests. This Article starts …


Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden Oct 2011

Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …


Cost Shifting In E-Discovery: A Comparative Analysis Between America And Europe, Umar Bakhsh Oct 2011

Cost Shifting In E-Discovery: A Comparative Analysis Between America And Europe, Umar Bakhsh

Umar Bakhsh

E-discovery is quickly becoming a prominent consideration when dealing with traditional discovery requests. The costs of producing e-discovery, however, have grown exponentially due to the voluminous and fragmented nature of electronically stored information. The current standard used by courts, in UBS v. Zubulake, has mistakenly and non-uniformly been applied by courts in spite of Congress’ attempt to create its own standard via FRCP Rule 26. In comparison, Europe’s “loser of litigation pays all court costs” has not adequately met the particular problem created by e-discovery. My article proposes a more manageable alternative standard to Zubulake, FRCP 26, and the European …


Acting Like An Administrative Agency: The Federal Circuit En Banc, Ryan G. Vacca Oct 2011

Acting Like An Administrative Agency: The Federal Circuit En Banc, Ryan G. Vacca

Ryan G. Vacca

When Congress created the Federal Circuit in 1982, it thought it was creating a court of appeals. Little did it know that it was also creating a quasi-administrative agency that would engage in substantive rulemaking and set policy in a manner substantially similar to administrative agencies. In this Article, I examine the Federal Circuit's practices when it orders a case to be heard en banc and illustrate how these practices cause the Federal Circuit to look very much like an administrative agency engaging in substantive rulemaking. The number and breadth of questions the Federal Circuit agrees to hear en banc …


The Landscape Of Collective Management Schemes, Daniel J. Gervais Sep 2011

The Landscape Of Collective Management Schemes, Daniel J. Gervais

Daniel J Gervais

This paper, based on a keynote talk at Columbia Law School, reviews the nature of collective management organizations (CMOs), their regulation, in particular the difference in the US regulatory regimes for performing rights organizations (PROs), digital transmissions of sound recordings and reprography. The paper reviews the incoherent rate-setting processes under consent decrees and sections 112 and 114 of the US Copyright Act. The paper also considers the role that CMOs can and should play in empowering new business models and modes of access to online material.


Everything You Should Know About A Copyright Lawyer, Aaron M. Kelly Arron M Kelly Sep 2011

Everything You Should Know About A Copyright Lawyer, Aaron M. Kelly Arron M Kelly

Aaron M Kelly

No abstract provided.


Designer Collaborations As A Solution To The Fast-Fashion Copyright Dilemma, Arielle K. Cohen Sep 2011

Designer Collaborations As A Solution To The Fast-Fashion Copyright Dilemma, Arielle K. Cohen

Arielle K Cohen

This article explores the issue of large retailers capitalizing on designers’ designs by using the method of “close copying” and the dilemma that designers face due to their lack of recourse since their designs are not afforded copyright protection. The Council of Fashion Designers of America has been lobbying Congress for protection and their efforts have created the Innovative Design Protection and Piracy Prevention Act. This legislation is currently pending but it is a revised version of the earlier Design Piracy Prohibition Act and it removes many of the controversial provisions that were in the earlier version. Therefore, there is …


Contract + Tort = Property: The Trade Secret Illustration, Matthew E. Cavanaugh Mba Cpa Esq. Sep 2011

Contract + Tort = Property: The Trade Secret Illustration, Matthew E. Cavanaugh Mba Cpa Esq.

Matthew E. Cavanaugh MBA CPA Esq.

This article commences with an introduction to the use of Hegel’s famous dialectical method as an arithmetic analysis of law. It reviews Hegel’s assertion that the sum of property and contract is tort and crime, and then suggests a better dialectic is that contract plus tort equals property. This article then reviews the doctrines of contract, tort, and property, focusing on the plaintiff’s rights and remedies, and who can be defendants in each of the three doctrines. The article next reviews the law of one particular type of intellectual property, trade secrets, because this article uses trade secrets as a …


New Frontiers Of Reprogenetics: Snp Profile Collection And Banking And The Resulting Duties In Medical Malpractice, Issues In Property Rights Of Genetic Materials, And Liabilities In Genetic Privacy., Stephanie Sgambati Sep 2011

New Frontiers Of Reprogenetics: Snp Profile Collection And Banking And The Resulting Duties In Medical Malpractice, Issues In Property Rights Of Genetic Materials, And Liabilities In Genetic Privacy., Stephanie Sgambati

Stephanie Sgambati

ABSTRACT

Single nucleotide polymorphisms (SNPs) represent the portions of our genetic makeup where human differ from each other. Mapping an individual’s profile creates a DNA fingerprint entirely unique to that individual. The primary purpose for the creation of SNP profiles has been validation of medical techniques used in reproductive medicine that require researchers to be able to definitively determine which embryo makes which baby- thus matching DNA fingerprints from infants to those from embryos. In spite of this seemingly narrow use, the potential value of the information contained in the SNP profile is enormous.

In this paper, I explore how …


Association Of Molecular Pathology Meets Therasense: Analyzing The Unenforceability Of Isolated-Sequence-Related Patents For Upenn, Columbia, Nyu, Yale, And Emory, Sam S. Han Ph.D. Sep 2011

Association Of Molecular Pathology Meets Therasense: Analyzing The Unenforceability Of Isolated-Sequence-Related Patents For Upenn, Columbia, Nyu, Yale, And Emory, Sam S. Han Ph.D.

Sam Han

37 CFR 1.56 requires disclosure of material information to the United States Patent and Trademark Office ("USPTO" or "PTO") when applying for a patent. This duty is imposed on (1) each inventor; (2) each attorney or agent who prepares or prosecutes the application; and (3) every other person who is substantively involved in the preparation or prosecution of the application and who is associated with the inventor, with the assignee or with anyone to whom there is an obligation to assign the application. Thus, for academic institutions, those who handle patent prosecution for the institution are bound by this duty …


Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo Sep 2011

Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo

David M. Longo

No abstract provided.


Is Sexting The New Witchcraft? A Plea For A Common Sense Approach., John O. Hayward Sep 2011

Is Sexting The New Witchcraft? A Plea For A Common Sense Approach., John O. Hayward

John O. Hayward

Teenagers have enthusiastically embraced digital technology and its myriad assortment of electronic devices and gadgets. But unfortunately they often find themselves the target of numerous laws criminalizing their use. Sending sexy photos of themselves in various stages of undress to their favorite boyfriend or girlfriend earns them unwanted attention from school administrators as well as criminal complaints from the local district attorney accusing them of trafficking in child pornography! This article deals with “sexting,” the practice of “sending, receiving, or forwarding sexually explicit messages, photos, or images via cell phone, computer, or other digital device.” (The term is a combination …


Amendments To Titles Of United States Code By America Invents Act Of 2011, Arthur Tan-Chi Yuan Sep 2011

Amendments To Titles Of United States Code By America Invents Act Of 2011, Arthur Tan-Chi Yuan

Arthur Tan-Chi Yuan

The Leahy-Smith America Invents Act (Act) that was signed by President Obama on September 16, 2011 amends provisions of titles 28, 35, 42, and 51 of U.S.C. This compilation focuses on the amendments to these laws to show the changes for easy reference. In summary, 74 sections (not counting individual subsections) of the US Patent law have been affected by the Act in total. Four sections have been repealed, 18 sections/subsections have been substantially rewritten in terms of the amount of amended texts, and 17 new sections/subsections have been added to title 35 U.S.C. With respect to title 28 of …


The Power Of Music: Applying First Amendment Scrutiny To Copyright Regulation Of Internet Radio, Amanda Reid Sep 2011

The Power Of Music: Applying First Amendment Scrutiny To Copyright Regulation Of Internet Radio, Amanda Reid

Amanda Reid

The growing body of literature documenting the power of music, from promoting the well-being of individuals to fostering reconciliation of cross-cultural disputes underscores that the value of music extends beyond the private interests of the copyright holders. The current dialogue about the First Amendment interests affected by modern copyright law has not fully acknowledged the research that supports the unique communicative potential of music. First Amendment protections for music encompass a listener’s right to hear it, as well as a speaker’s interest in playing it. The ever-expanding copyright regulations of online music have been used by incumbents to maintain market …


The Myth And Reality Of Dilution, Sandra L. Rierson Sep 2011

The Myth And Reality Of Dilution, Sandra L. Rierson

Sandra L Rierson

Statutory dilution claims are traditionally justified on the theory that even non-confusing uses of a famous trademark (or similar mark) can nonetheless minutely dilute the source-identifying power of the targeted trademark. The assumption of both the original federal dilution statute enacted in 1995 as well as its substantial enlargement in 2006 is that the source-identifying capacity of a trademark is akin to a glass of water: spill a drop here, spill a drop there and eventually your glass is empty. This Article advances three claims. First, statutory dilution erroneously assumes that the source-identifying function of a trademark is a rivalrous …


The Sine Qua Non Of Copyright Is Uniqueness, Not Originality, Samson Vermont Sep 2011

The Sine Qua Non Of Copyright Is Uniqueness, Not Originality, Samson Vermont

Samson Vermont

The Supreme Court tells us originality is the sine qua non of copyright. I argue uniqueness is. Copyright only protects unique work – work no one created before (novel) and no one could independently create after (unrepeatable).

The Court also tells us originality has two components: independent creation by the author and creativity. But they are mere heuristics for uniqueness. Independent creation is over-inclusive; creativity is both over- and under-inclusive. They do not offset each other, so gaps remain. Courts plug most of the gaps with limiting doctrines and the substantial similarity standard. To put it imprecisely: (independent creation) + …


Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li Sep 2011

Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li

Xiaojing Li

The emergence of social networking websites imposes a challenge to patent law. Courts should not make a blanket assumption that everything posted on social websites constitute a printed publication. Rather, courts should adopt a refined multiple factor test to help the analysis. This proposal would result in a balance between private and public interests in an invention, and therefore help achieve the ultimate goal of patent law.


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


Results-Oriented Jurisprudence: A Second Circuit Panel Meets J. D. Salinger Coming Through The Rye, Kathleen (Kate) M. O'Neill Sep 2011

Results-Oriented Jurisprudence: A Second Circuit Panel Meets J. D. Salinger Coming Through The Rye, Kathleen (Kate) M. O'Neill

Kathleen M. O'Neill

ABSTRACT The Second Circuit’s 2010 decision in Salinger v. Colting has been widely noticed for vacating a preliminary injunction J. D. Salinger obtained against distribution in the U.S. of Fredrik Colting’s novel, 60 YEARS LATER – COMING THROUGH THE RYE. In an opinion by Judge Guido Calabresi, the panel adopted the standard for equitable relief from eBay, Inc. v. MercExchange (U.S. 2006), overruled circuit precedent, and held that henceforth district courts must find, not presume, that irreparable harm is in fact likely before enjoining a copyright defendant’s activities. This is the first article to observe that what the Second Circuit …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …