Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Law

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone Nov 2007

Vol. Ix, Tab 47 - Ex. 10 - Document "Rosetta Stone Affiliate Overview - Nov. 29, 2007, Rosetta Stone

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers Oct 2007

Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers

UF Law Faculty Publications

An important provision in each of the final judgments in the government's Microsoft antitrust case requires Microsoft to "make available" to software developers the communications protocols that Windows client operating systems use to interoperate "natively" (that is, without adding software) with Microsoft server operating systems in corporate networks or over the Internet. The short-term goal of the provision is to allow developers, as licensees of the protocols, to write applications for non-Microsoft server operating systems that interoperate with Windows client computers in the same ways that applications written for Microsoft's server operating systems interoperate with Windows clients. The long-term goal …


Intel's Alleged Schemes Affected U.S. Consumers, Robert H. Lande Sep 2007

Intel's Alleged Schemes Affected U.S. Consumers, Robert H. Lande

All Faculty Scholarship

This short piece explains how the first unit discounts or rebates allegedly given by Intel on their X86 chips could harm competition, innovation, and PC purchasers in this crucial $33 billion/year market. For these reasons, their discounts or rebates could violate European Competition law and U.S. Antitrust law.


Vol. Vi, Tab 38 - Ex. 33 - Email From Eric Eichmann, Eric Eichmann Sep 2007

Vol. Vi, Tab 38 - Ex. 33 - Email From Eric Eichmann, Eric Eichmann

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 20 - Email From Lena Huang, Lena Huang Sep 2007

Vol. Vi, Tab 38 - Ex. 20 - Email From Lena Huang, Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Is Open Source Software The New Lex Mercatoria?, Fabrizio Marrella, Christopher S. Yoo Aug 2007

Is Open Source Software The New Lex Mercatoria?, Fabrizio Marrella, Christopher S. Yoo

All Faculty Scholarship

Early Internet scholars proclaimed that the transnational nature of the Internet rendered it inherently unregulable by conventional governments. Instead, the Internet would be governed by customs and practices established by the end user community in a manner reminiscent of the lex mercatoria, which spontaneously emerged during medieval times to resolve international trade disputes independently and autonomously from national law. Subsequent events have revealed these claims to have been overly optimistic, as national governments have evinced both the inclination and the ability to exert influence, if not outright control, over the physical infrastructure, the domain name system, and the content flowing …


Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang Aug 2007

Vol. Ix, Tab 41 - Ex. 22 - Email From Lena Huang (Rosetta Stone Online Marketing), Lena Huang

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


What Can Antitrust Contribute To The Network Neutrality Debate?, Christopher S. Yoo Aug 2007

What Can Antitrust Contribute To The Network Neutrality Debate?, Christopher S. Yoo

All Faculty Scholarship

Over the course of the last year, policymakers have begun to consider whether antitrust can play a constructive role in the network neutrality debate. A review of both the theory and the practice of antitrust suggests that it does have something to contribute. As an initial matter, antitrust underscores that standardization and interoperability are not always beneficial and provides a framework for determining the optimal level of standardization. In addition, the economic literature and legal doctrine on vertical exclusion reveal how compelling network neutrality could reduce static efficiency and show how mandating network neutrality could impair dynamic efficiency by deterring …


Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll Jul 2007

Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll

Working Paper Series

In eBay v. MercExchange, the Supreme Court correctly rejected a one-size-fits-all approach to patent injunctions. However, the Court's opinion does not fully recognize that the problem of uniformity in patent law is more general and that this problem cannot be solved through case-by-case analysis. This Essay provides a field guide for implementing eBay using functional analysis and insights from a uniformity-cost framework developed more fully in prior work. While there can be no general rule governing equitable relief in patent cases, the traditional four factor analysis for injunctive relief should lead the cases to cluster around certain patterns that often …


Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google Jun 2007

Vol. Ix, Tab 46 - Ex. 6 - Email From Amc@Google.Com, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Neutral Citation, Court Web Sites, And Access To Authoritative Case Law, Peter W. Martin Apr 2007

Neutral Citation, Court Web Sites, And Access To Authoritative Case Law, Peter W. Martin

Cornell Law Faculty Publications

In 1994, the Wisconsin Bar and the Wisconsin Judicial Council together urged the state’s supreme court to take two dramatic steps with the combined aim of improving access to state case law: adopt a new system of neutral format citation and establish a digital archive of decisions directly available to all publishers and the public. The recommendations set off a firestorm, and the court deferred decision on the package. In the dozen or so years since those events, the background conditions have shifted dramatically. Neutral format citation has been endorsed by AALL and the ABA and formally adopted in a …


Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee Mar 2007

Vol. Ix, Tab 41 - Ex. 8 - Email From Fiona Lee And Epcot Study (Google Online Operations), Fiona Lee

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page Jan 2007

Vol. Ix, Tab 46 - Ex. 66 - Deposition Of Larry Page From American Blind And Wallpaper V. Google (Google Co-Founder), Larry Page

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Personal Data Privacy Tradeoffs And How A Swedish Church Lady, Austrian Public Radio Employees, And Transatlantic Air Carriers Show That Europe Does Not Have All The Answers, Edward C. Harris Jan 2007

Personal Data Privacy Tradeoffs And How A Swedish Church Lady, Austrian Public Radio Employees, And Transatlantic Air Carriers Show That Europe Does Not Have All The Answers, Edward C. Harris

All Faculty Scholarship

No abstract provided.


Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long Jan 2007

Messages From The Front: Hard Earned Lessons On Information Security From The Ip Wars, 16 Mich. St. J. Int'l L. 71 (2007), Doris E. Long

UIC Law Open Access Faculty Scholarship

Cyberspace is often a battlefield with a wide array of armies posed to challenge one another across the increasing array of rhetoric and technology that has made it such a potent arena for global digital commerce. Perry Barlow's infamous demand that cyberspace be left to its own devices because of its unique unregulated nature may have been answered by Larry Lessig's reply that code may in fact be used to regulate cyberspace, but the reality is that social norming demands, the evanescence of technological controls, and the perceived utility of illicit conduct utilizing the internet make any regulation problematic at …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Big Opportunities In Access To "Small Science" Data, Harlan J. Onsrud, James Dunbar Campbell Jan 2007

Big Opportunities In Access To "Small Science" Data, Harlan J. Onsrud, James Dunbar Campbell

Spatial Information Science and Engineering Faculty Scholarship

A distributed infrastructure that would enable those who wish to do so to contribute their scientific or technical data to a universal digital commons could allow such data to be more readily preserved and accessible among disciplinary domains. Five critical issues that must be addressed in developing an efficient and effective data commons infrastructure are described. We conclude that creation of a distributed infrastructure meeting the critical criteria and deployable throughout the networked university library community is practically achievable.


Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe Jan 2007

Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe

UF Law Faculty Publications

This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …


Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe Jan 2007

Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe

UF Law Faculty Publications

When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …


The Search Interest In Contract, Joshua Fairfield Jan 2007

The Search Interest In Contract, Joshua Fairfield

Articles by Maurer Faculty

Parties often do not negotiate for contract terms. Instead, parties search for the products, terms, and contractual counterparties they desire. The traditional negotiation-centered view of contract leads courts to try to determine the meaning of the parties where no meaning was negotiated and to waste time determining the benefits of bargains that were never struck. Further, while courts have ample tools to validate specifically negotiated contract terms, they lack the tools to respond to searched-for terms. Although the law and literature have long recognized that there is a disconnect between the legal fictions of negotiation and the reality of contracting …


The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann Jan 2007

The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann

Faculty Scholarship

We analyze the characteristics of the patents held by firms in the software industry. Unlike prior researchers, we rely on the examination of individual patents to determine which patents involve software inventions. This method of identifying the relevant patents is more laborious than the methods that previous scholars have used, but it produces a data set from which we can learn more about the role of patents in the software industry. In general, we find that patents the computer technology firms obtain on software inventions have more prior art references, claims, and forward citations than the patents that the same …


Database Protection In The United States Is Alive And Well: Comments On Davison, Marshall A. Leaffer Jan 2007

Database Protection In The United States Is Alive And Well: Comments On Davison, Marshall A. Leaffer

Articles by Maurer Faculty

No abstract provided.


"Stranger Than Fiction": Taxing Virtual Worlds, Leandra Lederman Jan 2007

"Stranger Than Fiction": Taxing Virtual Worlds, Leandra Lederman

Articles by Maurer Faculty

Virtual worlds, including massive multi-player on-line role-playing games (game worlds), such as City of Heroes, Everquest, and World of Warcraft, have become popular sources of entertainment. Game worlds provide scripted contexts for events such as quests. Other virtual worlds, such as Second Life, are unstructured virtual environments that lack specific goals but allow participants to socialize and engage virtually in such activities as shopping or attending a concert. Many of these worlds have become commodified, with millions of dollars of real-world trade in virtual items taking place every year. Most game worlds prohibit these real market transactions, but some worlds …


Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann Jan 2007

Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann

Faculty Scholarship

Software patents have been controversial since the days when "software" referred to the crude programs that came free with an IBM mainframe. Different perspectives have been presented in judicial, legislative, and administrative fora over the years, and the press has paid as much attention to this issue as it has to any other intellectual property topic during this time. Meanwhile, a software industry developed and has grown to a remarkable size, whether measured by revenues or profitability, number of firms or employees, or research expenditures. The scope of software innovation has become even broader, as an increasing number of devices …


A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg Jan 2007

A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg

Faculty Scholarship

Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …


The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski Jan 2007

The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski

Articles

Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.

The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …