Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (15)
- Internet Law (14)
- Communications Law (6)
- Computer Law (6)
- International Law (6)
-
- Science and Technology Law (6)
- Administrative Law (4)
- Business Organizations Law (4)
- Civil Rights and Discrimination (4)
- Constitutional Law (4)
- Social and Behavioral Sciences (4)
- Law and Society (3)
- Legislation (3)
- Other Law (3)
- Physical Sciences and Mathematics (3)
- Business (2)
- Comparative and Foreign Law (2)
- Computer Engineering (2)
- Computer Sciences (2)
- Contracts (2)
- Courts (2)
- Energy and Utilities Law (2)
- Engineering (2)
- Jurisdiction (2)
- Legal Education (2)
- Legal Ethics and Professional Responsibility (2)
- Legal Profession (2)
- Property Law and Real Estate (2)
- State and Local Government Law (2)
- Institution
-
- Selected Works (9)
- Northwestern Pritzker School of Law (8)
- SelectedWorks (8)
- Maurer School of Law: Indiana University (5)
- Saint Louis University School of Law (3)
-
- University of Florida Levin College of Law (3)
- University of Michigan Law School (3)
- BLR (2)
- Columbia Law School (2)
- Fordham Law School (2)
- Georgia State University College of Law (2)
- Seattle University School of Law (2)
- University of Missouri School of Law (2)
- University of San Diego (2)
- Case Western Reserve University School of Law (1)
- Cleveland State University (1)
- Duke Law (1)
- Embry-Riddle Aeronautical University (1)
- George Washington University Law School (1)
- Maurice A. Deane School of Law at Hofstra University (1)
- Penn State Dickinson Law (1)
- University of Colorado Law School (1)
- University of Kentucky (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of New Hampshire (1)
- University of South Carolina (1)
- Vanderbilt University Law School (1)
- Publication
-
- Northwestern Journal of Technology and Intellectual Property (8)
- Faculty Publications (3)
- Faculty Scholarship (3)
- Michael D. Mann (3)
- Michigan Telecommunications & Technology Law Review (3)
-
- UF Law Faculty Publications (3)
- All Faculty Scholarship (2)
- Articles by Maurer Faculty (2)
- ExpressO (2)
- Federal Communications Law Journal (2)
- Georgia State University Law Review (2)
- Jacqueline D Lipton (2)
- Rob Frieden (2)
- San Diego International Law Journal (2)
- Seattle University Law Review (2)
- Allyson Haynes Stuart (1)
- Ann Bartow (1)
- Anna P. Hemingway (1)
- Elizabeth A Rowe (1)
- Faculty Scholarly Works (1)
- Fordham Journal of Corporate & Financial Law (1)
- GW Law Faculty Publications & Other Works (1)
- Hofstra Law Review (1)
- Indiana Law Journal (1)
- Jonah M. Knobler (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Law and Health (1)
- Juliet M. Moringiello (1)
- Law Faculty Scholarly Articles (1)
- Law Faculty Scholarship (1)
- Publication Type
- File Type
Articles 31 - 60 of 67
Full-Text Articles in Law
A Listener’S Free Speech, A Reader’S Copyright, Malla Pollack
A Listener’S Free Speech, A Reader’S Copyright, Malla Pollack
Malla Pollack
Despite the Supreme Court’s repeated use of free speech doctrine to derail media reforms, some reform is possible. As Jerome A. Barron recognized, the Court’s central error is hypothesizing a romanticized speaker. The Court’s copyright jurisprudence is similarly marred by its congruent focus on a romanticized author. The original and continuing central purpose of both copyright and free speech is the wide distribution of material to citizens – especially when politically relevant information and opinions are involved. The Constitution’s copyright clause, Article I, section 8, clause 8, allows Congress the power to enact only such statutes as encourage the “progress” …
In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
Faculty Publications
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
The Corporatization Of Communication, Eric Chiappinelli, Adam Candeub, Jeffrey Chester, Lawrence Soley
The Corporatization Of Communication, Eric Chiappinelli, Adam Candeub, Jeffrey Chester, Lawrence Soley
Seattle University Law Review
Our next panel discusses the corporatization of communication.
Using An Online Auction To Sell Article 9 Collateral, Michael Korybut
Using An Online Auction To Sell Article 9 Collateral, Michael Korybut
All Faculty Scholarship
This short article discusses selected issues under Article 9 of the Uniform Commercial Code with respect to a secured party using an online auction like eBay to sell repossessed collateral. In particular, the article analyzes certain potential limitations imposed by Article 9's commercial reasonableness standard and its notice of sale requirement.
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
Breaching The Great Firewall Of China: Congress Overreaches In Attacking Chinese Internet Censorship, Miriam D. D'Jaen
Breaching The Great Firewall Of China: Congress Overreaches In Attacking Chinese Internet Censorship, Miriam D. D'Jaen
Seattle University Law Review
The Global Online Freedom Act of 2007 promotes freedom of expression on the Internet by prohibiting U.S. businesses from cooperating with officials in Internet-restricting countries. While the Act should be commended for imposing a higher standard of ethical business practices on U.S.corporations, there are significant problems with curing China's censorship policies by imposing liability on U.S. Internet companies. The standards and recommendations proposed by Congress within the Act correspond with an inherently American conception of freedom of expression. Thus, the Act imposes our domestic standards, rooted in the First Amendment, on states with very different political ideologies. A better alternative …
Cyberstalking, A New Crime: Evaluating The Effectiveness Of Current State And Federal Laws, Naomi Harlin Goodno
Cyberstalking, A New Crime: Evaluating The Effectiveness Of Current State And Federal Laws, Naomi Harlin Goodno
Missouri Law Review
This article explores how the nature of cyberstalking represents a form of behavior distinct from "offline stalking." As such, the interpretation of many of the statutes dealing with offline stalking may be inadequate to address the problem. The first part of this article explores the differences between offline stalking and cyberstalking. The second part examines what the criminal elements of cyberstalking should be in light of these differences. The third part considers how these differences create gaps in both state and federal stalking statutes so that it may be difficult to adequately prosecute all aspects of cyberstalking. This section also …
A Right To Reach An Audience: An Approach To Intermediary Bias On The Internet, Jennifer A. Chandler
A Right To Reach An Audience: An Approach To Intermediary Bias On The Internet, Jennifer A. Chandler
Hofstra Law Review
No abstract provided.
Keep Your Eye On Your Ball: Patent Holders' Evolving Duty To Patrol The Marketplace For Infringement, Aaron B. Rabinowitz
Keep Your Eye On Your Ball: Patent Holders' Evolving Duty To Patrol The Marketplace For Infringement, Aaron B. Rabinowitz
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Choosing Between The Advice Of Counsel Defense To Willful Patent Infringement Or The Effective Assistance Of Trial Counsel: A Bridge Or The Troubled Waters, Christopher A. Harkins
Choosing Between The Advice Of Counsel Defense To Willful Patent Infringement Or The Effective Assistance Of Trial Counsel: A Bridge Or The Troubled Waters, Christopher A. Harkins
Northwestern Journal of Technology and Intellectual Property
Trouble is brewing for patent infringement defendants who use lawyers from one law firm to act as trial counsel and other lawyers from the same or different firm (albeit perfectly screened off from the trial team) to prepare a non-infringement opinion as an advice of counsel defense to allegations of willful infringement. The 2006 Federal Circuit decision in EchoStar has set off a veritable feeding frenzy of attacks by patentees' counsel on the most sacred of attorney client communications and work product: that of trial counsel. In a case of first impression, one federal court has even granted a motion …
National Cable & Telecommunications Association V. Brand X Internet Services: Resolving Irregularities In Regulation?, Amy L. Signaigo
National Cable & Telecommunications Association V. Brand X Internet Services: Resolving Irregularities In Regulation?, Amy L. Signaigo
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Is Apple Playing Fair? Navigating The Ipod Fairplay Drm Controversy, Nicola F. Sharpe, Olufunmilayo B. Arewa
Is Apple Playing Fair? Navigating The Ipod Fairplay Drm Controversy, Nicola F. Sharpe, Olufunmilayo B. Arewa
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Illinois Tool Works: Allocating The Burden Of Proving Market Power In Patent Tying Cases, Dennis J. Abdelnour
Illinois Tool Works: Allocating The Burden Of Proving Market Power In Patent Tying Cases, Dennis J. Abdelnour
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Extra-Judicial Decision Making For Drug Safety And Risk Management: Evidence From The Fda, Hazel Mcmullin, Andrew B. Whitford
Extra-Judicial Decision Making For Drug Safety And Risk Management: Evidence From The Fda, Hazel Mcmullin, Andrew B. Whitford
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Times May Have Changed, But The Song Is Still The Same: Why The Supreme Court Was Incorrect To Stray From Sony's Reasoning In Metro-Goldwyn-Mayer Studios, Inc. V. Grokster, Ltd., Julie A. Wooten
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Overcoming The Achilles Heel Of Copyright Law, Haochen Sun
Overcoming The Achilles Heel Of Copyright Law, Haochen Sun
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Lessons From The Trademark Use Debate, Mark D. Janis, Graeme B. Dinwoodie
Lessons From The Trademark Use Debate, Mark D. Janis, Graeme B. Dinwoodie
Articles by Maurer Faculty
In their response to our article Confusion Over Use: Contextualism in Trademark Law, Professors Dogan and Lemley discard more all-encompassing versions of the trademark use requirement. Instead, they seek to delineate and defend a "more surgical form" of trademark use doctrine. In this reply, we demonstrate that the language of the Lanham Act does not impose a trademark use requirement even when that requirement is defined "surgically" and sections 32 and 43(a) are read "fluidly," as Dogan and Lemley suggest. Moreover, their interpretation still renders section 33(b)(4) redundant and unduly limits appropriate common law development of trademark law. We also …
Confusion Over Use: Contextualism In Trademark Law, Mark D. Janis, Graeme B. Dinwoodie
Confusion Over Use: Contextualism In Trademark Law, Mark D. Janis, Graeme B. Dinwoodie
Articles by Maurer Faculty
This paper tackles an intellectual property theory that many scholars regard as fundamental to future policy debates over the scope of trademark protection: the trademark use theory. We argue that trademark use theory is flawed and should be rejected. The adoption of trademark use theory has immediate practical implications for disputes about the use of trademarks in online advertising, merchandising, and product design, and has long-term consequences for other trademark generally. We critique the theory both descriptively and prescriptively. We argue that trademark use theory over-extends the search costs rationale for the trademark system, and that it unhelpfully elevates formalism …
Protecting The New Face Of Entrepreneurship: Online Appropriate Dispute Resolution And International Consumer-To-Consumer Online Transactions, Ivonnely Colón-Fung
Protecting The New Face Of Entrepreneurship: Online Appropriate Dispute Resolution And International Consumer-To-Consumer Online Transactions, Ivonnely Colón-Fung
Fordham Journal of Corporate & Financial Law
No abstract provided.
The Myopia Of U.S. V. Martinelli: Extraterritorial Jurisdiction In The 21st Century, Christopher L. Blakesley
The Myopia Of U.S. V. Martinelli: Extraterritorial Jurisdiction In The 21st Century, Christopher L. Blakesley
Scholarly Works
Beginning in January 1999 and continuing through January 2000, a U.S. soldier began frequenting an off-post Internet cafe in Darmstadt, Germany, called the Netzwork Café. There he would download images of child pornography and search Internet websites, logging onto Internet chat rooms in order to communicate with individuals willing to send him images of naked children and children engaged in sex acts.
Specialist Martinelli was eventually caught and charged with various violations of 18 U.S.C. § 2252A for knowingly mailing, transporting or shipping child pornography in interstate or foreign commerce (by computer); knowingly receiving child pornography that had been mailed, …
Calling All Angles: Perspectives On Regulating Internet Telephony, Melissa Winberg
Calling All Angles: Perspectives On Regulating Internet Telephony, Melissa Winberg
Vanderbilt Journal of Entertainment & Technology Law
In 1996, Congress passed the Telecommunications Act, substantially revising the Communications Act of 1934 to reflect technological advances, including the Internet, and Congress's deregulatory goals. Currently, however, new technologies are challenging the viability of the statutory definitions and regulatory schemes of the statute. Internet telephony, commonly called Voice over Internet Protocol (VoIP), is both a replacement for traditional telephone service and a new web-based technology. Given the current competitive political climate and the magnitude of the interests involved, Congress is unlikely to succeed in altering the telecommunications regime. Thus, the Federal Communications Commission, which has the authority to regulate interstate …
American Diagnostic Radiology Moves Offshore: Surfing The Internet Wave To Worldwide Access And Quality Perspectives: American Diagnostic Radiology Moves Offshore: Where Is The Internet Wave Taking This Field, Eric M. Nyberg, Charles F. Lanzieri
American Diagnostic Radiology Moves Offshore: Surfing The Internet Wave To Worldwide Access And Quality Perspectives: American Diagnostic Radiology Moves Offshore: Where Is The Internet Wave Taking This Field, Eric M. Nyberg, Charles F. Lanzieri
Journal of Law and Health
International reading of medical imaging studies, or offshore teleradiology, has been a successful, though limited, practice benefiting patients and physicians for over a decade. Domestic and international market forces will continue to expand the demand for teleradiology as an important complement to United States based diagnostic radiology, though a full exodus of diagnostic reading to offshore sites is unlikely and inappropriate. Considerable obstacles remain to taking the teleradiology market to scale; however, barriers related to licensure, liability, quality assurance, and reimbursement will likely yield to market forces to be resolved in recognition of the significant benefits teleradiology offers to consumers …
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
UF Law Faculty Publications
This article presents an overview of the public policy issues surrounding digital libraries, and describes some current trends, such as Web 2.0, the social network. It discusses the impact of globalization and the Internet on international and foreign law information, the free access to law movement and open access scholarship, and mass digitization projects, then turns to some concerns, focusing on preservation and long term access to born digital legal information and authentication of official digital legal information. It finally discusses new roles for librarians, called upon to evaluate the quality of information teach legal research methodology and be advocates …
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
UF Law Faculty Publications
This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …
Article 9'S Incorporation Strategy And Novel, New Markets For Collateral: A Theory Of Non-Adoption, Michael Korybut
Article 9'S Incorporation Strategy And Novel, New Markets For Collateral: A Theory Of Non-Adoption, Michael Korybut
All Faculty Scholarship
Online auctions like eBay are heralded widely as efficient, robust markets through which millions of businesses and people have sold billions of dollars of all types of property. Yet U.C.C. Article 9 secured parties apparently are only slowly and anemically adopting eBay or other online auctions to sell repossessed property (collateral) and are sticking instead to conventional, traditional sale methods. The apparent slow and anemic adoption of eBay and other online auctions by Article 9 secured creditors suggests a failure of the commercial reasonableness standard's incorporation strategy of new, efficient markets and its price-maximization goal. The Article proposes a non-adoption …
The Gats And Legal Services In Limerick, Laurel S. Terry
The Gats And Legal Services In Limerick, Laurel S. Terry
Faculty Scholarly Works
One of the most significant regulatory developments for legal services is their inclusion in the 1994 General Agreement on Trade in Services or GATS. The GATS was the first world trade agreement to cover services rather than goods and it applies to legal services. The GATS in Limerick is a light-hearted but nonetheless serious effort to address the most important legal services-related GATS developments in the last twelve years. These verses cover the basic principles of the GATS, the ongoing market access negotiations and the efforts to develop disciplines on domestic regulation.
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
UF Law Faculty Publications
When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …
Law And Society Approaches To Cyberspace, Paul Schiff Berman
Law And Society Approaches To Cyberspace, Paul Schiff Berman
GW Law Faculty Publications & Other Works
This is the introductory essay to an edited collection titled Law and Society Approaches to Cyberspace and published by Ashgate Publishing. Accordingly, the essay first considers what qualifies as a law and society approach to any particular subject. Then, I address questions about what it means to study cyberspace, surveying some of the academic literature on the subject and identifying three distinct waves of scholarship about the Internet since the mid 1990s. I also discuss some of the major theoretical fault lines that have emerged during this period. Finally, the essay summarizes each of the contributions to the volume, which …
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Law Faculty Scholarly Articles
This Article provides a timely examination of the European Union's approach to information privacy on the internet, an approach that some legal scholars have held up as a model for law reform in the United States. Building on the author's recent piece discussing the U.S. approach to internet privacy, this Article applies to the EU's internet privacy regime a theoretical framework constructed from the writings of philosopher and social theorist Alasdair MacIntyre on the failures of Enlightenment and post-Enlightenment thought. The EU internet privacy regime is shown to reflect and reinforce three key elements of the "post-Enlightenment paradigm," i.e., the …
The Chilling Effect Of Government Surveillance Programs On The Use Of The Internet By Muslim-Americans, Dawinder S. Sidhu
The Chilling Effect Of Government Surveillance Programs On The Use Of The Internet By Muslim-Americans, Dawinder S. Sidhu
University of Maryland Law Journal of Race, Religion, Gender and Class
No abstract provided.