Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Technology

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 46

Full-Text Articles in Law

Xm Lawsuit: Threats To The Incentive Model Of Copyright Genesis And The Obsolescence Of The Ahra In A Digital Age Of Hybrid Technology, Jay W. Ferguson Nov 2007

Xm Lawsuit: Threats To The Incentive Model Of Copyright Genesis And The Obsolescence Of The Ahra In A Digital Age Of Hybrid Technology, Jay W. Ferguson

Northern Illinois University Law Review

This article examines Atlantic Records Corp. v. XM Satellite Radio Inc. The current litigation offers a prime example of various ways in which the United States Copyright Act is unable to pace current technological trends with respect to the hybridization of technology. This article explores the nature of the current litigation and the fact that the litigation is entirely device-driven; the applicability, interpretation and purpose of the Audio Home Recording Act; threats to the incentive model of copyright genesis; and a call for device-neutral legislation that focuses on particular acts of infringement rather than measuring a device's capabilities as a …


Copyright's Empire: Why The Law Matters, Alina Ng Jul 2007

Copyright's Empire: Why The Law Matters, Alina Ng

Marquette Intellectual Property Law Review

Previous intellectual property literature demands a balance between incentives to produce for the creator of a work and access to information, knowledge, and content by the users. However, law and economics jurisprudence does not provide compelling arguments to support the notion that the copyright monopoly is the most efficient way to maximize public welfare by promoting the works of authors. The social cost from expansion of private rights is nonexistent because market structures change as technologies develop, providing society with increased accessibility to creative works. Accordingly, copyright laws need to expand as technology develops in order to realize a fair …


The Supremacy Of Techno-Governance: Privatization Of Digital Content And Consumer Protection In The Globalized Information Society, Nicola Lucchi Jun 2007

The Supremacy Of Techno-Governance: Privatization Of Digital Content And Consumer Protection In The Globalized Information Society, Nicola Lucchi

Nicola Lucchi

The article aims to describe the role of technology and contract in regulating access to digital content deregulating intellectual property law monopoly. In particular it argues that the anti-circumvention provisions for technological protection measures and digital rights management systems enacted in the United States and in Europe compromise the consumer’s capacity to exercise legitimate rights, such as the private use exemption, by giving content owners extralegal protection for their works. It also analyses how these acts have caused an inappropriate delegation of governmental decision making to a non-governmental entity with a consequent privatization of the government’s role in protecting intellectual …


What's Wrong With The Patent System? Fuzzy Boundaries And The Patent Tax, James Bessen, Michael J. Meurer Jun 2007

What's Wrong With The Patent System? Fuzzy Boundaries And The Patent Tax, James Bessen, Michael J. Meurer

Faculty Scholarship

The annual number of patent lawsuits filed in the U.S. has roughly tripled from 1970 to 2004. The number of suits was more or less steady in the 1970s, climbed slowly in the 1980s, and exploded in the 1990s. Why? The usual answers point to (1) the growth of the “new economy” and the concomitant explosion of patenting, (2) the failure of the Patent Office to reject patents on old or obvious inventions, or (3) the rise of the patent troll. There is an element of truth in all these answers, but even collectively they do a poor job explaining …


Communicating During Emergencies: Toward Interoperability And Effective Information Management, Philip J. Weiser Jun 2007

Communicating During Emergencies: Toward Interoperability And Effective Information Management, Philip J. Weiser

Federal Communications Law Journal

Symposium: The Crisis in Public Safety Communications. Held at the Mercatus Center at George Mason University, December 8, 2006.

To change the culture and realities of public safety communications, this Article calls on policymakers to develop a new architecture for the use of information and communications technologies and provide a framework for leadership to transition to a next generation system for public safety communications. Such a culture change would include not only an embrace of new technologies, but a new framework for technology leadership--at the state or regional level-that spurs decision making in a coordinated fashion (and not through ad …


Fair Use: Its Application, Limitations And Future. , Sonia Katyal, Paul Aiken, Laura Quilter, David O. Carson, John, Jr. G. Palfrey, Hugh C. Hansen Jun 2007

Fair Use: Its Application, Limitations And Future. , Sonia Katyal, Paul Aiken, Laura Quilter, David O. Carson, John, Jr. G. Palfrey, Hugh C. Hansen

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


From Face-To-Face To Screen-To-Screen: Real Hope Or True Fallacy, Philippe Gilliéron May 2007

From Face-To-Face To Screen-To-Screen: Real Hope Or True Fallacy, Philippe Gilliéron

Philippe Gilliéron

The development of e-commerce involves the implementation of effective Online Dispute Resolution (ODR) methods. While the enactment of ODR methods is made particularly easy thanks to the technological tools at disposal, their mere implementation does still not ensure their efficiency. ODR has drawn much attention in legal scholarships in recent years. Strangely enough, hardly any scholar has however focused on a key factor for the good development of ODR: differences between face-to-face and computer-mediated interactions. After having described the current state of literature related to ODR, I shall focus more specifically on these differences based upon experiments conducted in the …


Some Job Hunters Are What They Post, Michael D. Mann Apr 2007

Some Job Hunters Are What They Post, Michael D. Mann

Michael D. Mann

Plug a prospective employee's name into an Internet search engine, and you might be surprised at what you find. Web pages may tell hiring attorneys that the person they just interviewed wrote for an undergraduate newspaper or belonged to a specific sorority, but the Web may also reveal the recent interviewee's drink of choice and dating status. Law firms can use the Internet for their own recruiting needs, says attorney Michael D. Mann, but they should take what they read on the Web with a grain of salt.


A Copyright Conundrum: Protecting Email Privacy, Ned Snow Apr 2007

A Copyright Conundrum: Protecting Email Privacy, Ned Snow

Faculty Publications

The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …


Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton Feb 2007

Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton

Erin Espedal

Emerging surveillance technologies now allow operators to collect information located within the brain of an individual, allow the collection of forensic evidence regarding cerebral and cognitive processes, and are even beginning to be able to predict human intentions. While science has not yet produced a mind-reading machine per se, the devices referred to as “cognitive camera technologies” are substantial steps in the direction of that inevitable result. One such technique, a proprietary method called Brain Fingerprinting, is used as an example of the strong trend towards increasingly invasive and ever more powerful surveillance methods, and provides an entrée to a …


When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry Jan 2007

When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry

ExpressO

As research has advanced, technologies have become more closely knit, and the relationships between them—both complementary and competitive—have become increasingly important. Unfortunately, the patent system’s use of monopoly power to reward innovators creates inefficient results by overly encouraging the development of substitute technologies and discouraging the development of complementary technologies. This paper explains how an optional patent purchase system could help ameliorate such problems and discusses the implications of such a system.


Patents And Diversity In Innovation, Brian Kahin Jan 2007

Patents And Diversity In Innovation, Brian Kahin

Michigan Telecommunications & Technology Law Review

Over the past quarter-century, the patent system has expanded in scope and significance, claiming a central position in a U.S. economy increasingly based on knowledge and intangible assets. This historic expansion has come at the cost of controversy and, within the past five years, growing public scrutiny from outside the system--from the press, business, Congress, and finally the Supreme Court. However, proposed reforms are marked by deepening divisions between sectors of the economy. The information technology (IT) and services industries favor strong reforms while pharmaceutical and biotech industries, as well as the patent bar, favor modest, incremental reforms. This yawning …


Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini Jan 2007

Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini

Michigan Telecommunications & Technology Law Review

As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …


The Myth Of Inherent And Inevitable Industry Differences: Diversity As Artifact In The Quest For Patent Reforms, Robert A. Armitage Jan 2007

The Myth Of Inherent And Inevitable Industry Differences: Diversity As Artifact In The Quest For Patent Reforms, Robert A. Armitage

Michigan Telecommunications & Technology Law Review

The University of Michigan Law School hosted a two-day conference entitled "Patents and Diversity in Innovation." The morning of the first day featured a panel devoted to "industry differences." This panel took up the task of dealing with the following questions: How has diversification of innovation and the expansion of patentable subject matter affected patent practice? How do markets for technology vary from sector to sector? And how do they reflect or influence patent practice? To what extent are business practices and competitive markets shaped by the nature of the technology, product, or service?[...] A conference titled "Patents and Diversity" …


A Method For Reforming The Patent System, Peter S. Menell Jan 2007

A Method For Reforming The Patent System, Peter S. Menell

Michigan Telecommunications & Technology Law Review

The principal recent studies of patent reform (NAS (2004), FTC (2003), Jaffe and Lerner (2004)) contend that a uniform system of patent protection must (or should) be available for "anything under the sun made by man" based upon one or more of the following premises: (1) the Patent Act requires this breadth and uniformity of treatment; (2) "discriminating" against any particular field of "technology" would be undesirable; (3) discrimination among technologies would present insurmountable boundary problems and could easily be circumvented through clever patent drafting; and (4) interest group politics stand in the way of excluding any subject matter classes …


What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George Jan 2007

What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George

Michigan Telecommunications & Technology Law Review

Importantly, at least a few relevant patent holders are inevitably left out of an industry organization's collection of patents. These left-out patent holders, known as "holdouts," can undermine the collective arrangement with demand letters and infringement suits.[...] The first part of this Note explains why holdouts exist in the first place, given the benefits of joining an organization of collected patents. In the second part of this Note, I explore the lack of legal protections against holdout demands offered by pre-eBay patent law. The third part of this Note introduces the eBay decision as revolutionary addition to list of legal …


Compulsory Patent Licensing: Is It A Viable Solution In The United States, Carol M. Nielsen, Michael R. Samardzija Jan 2007

Compulsory Patent Licensing: Is It A Viable Solution In The United States, Carol M. Nielsen, Michael R. Samardzija

Michigan Telecommunications & Technology Law Review

As technology continues to advance at a rapid pace, so do the number of patents that cover every aspect of making, using, and selling these innovations. In 1996, to compound the rapid change of technology, the U.S. Supreme Court affirmed that business methods are also patentable. Hence in the current environment, scores of patents, assigned to many different parties, may cover a single electronic device or software--making it increasingly impossible to manufacture an electronic device without receiving a cease and desist letter or other notice from a patentee demanding a large royalty or threatening an injunction. Companies, particularly those in …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …


Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron Jan 2007

Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron

Faculty Scholarship

A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …


Technology, Competition, And Values, Frank Pasquale Jan 2007

Technology, Competition, And Values, Frank Pasquale

Faculty Scholarship

Law can advance or retard the distributive effects of innovation and its diffusion in many ways. Certain technologies merit special monitoring because they promote the leveraging of economic advantage into social or cultural advantage without substantially increasing overall social welfare. Others threaten to undermine collective values and perceptions commonly used to evaluate technology. A final category threatens to do both, creating unfair or wasteful competition while blunting our capacity to recognize its morally dubious character.

As new sectors of life become more game-like and competitive, methods of leveling the playing field developed in sports and college admissions might become more …


Law And Technology Podcasts, Roger V. Skalbeck Jan 2007

Law And Technology Podcasts, Roger V. Skalbeck

Law Faculty Publications

This article lists a select handful of useful podcasts covering topics such as technology policy, law, and web development.


Structural Rights In Privacy, Harry Surden Jan 2007

Structural Rights In Privacy, Harry Surden

Publications

This Essay challenges the view that privacy interests are protected primarily by law. Based upon the understanding that society relies upon nonlegal devices such as markets, norms, and structure to regulate human behavior, this Essay calls attention to a class of regulatory devices known as latent structural constraints and provides a positive account of their role in regulating privacy. Structural constraints are physical or technological barriers which regulate conduct; they can be either explicit or latent. An example of an explicit structural constraint is a fence which is designed to prevent entry onto real property, thereby effectively enforcing property rights. …


Keep Your Eye On Your Ball: Patent Holders' Evolving Duty To Patrol The Marketplace For Infringement, Aaron B. Rabinowitz Jan 2007

Keep Your Eye On Your Ball: Patent Holders' Evolving Duty To Patrol The Marketplace For Infringement, Aaron B. Rabinowitz

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Choosing Between The Advice Of Counsel Defense To Willful Patent Infringement Or The Effective Assistance Of Trial Counsel: A Bridge Or The Troubled Waters, Christopher A. Harkins Jan 2007

Choosing Between The Advice Of Counsel Defense To Willful Patent Infringement Or The Effective Assistance Of Trial Counsel: A Bridge Or The Troubled Waters, Christopher A. Harkins

Northwestern Journal of Technology and Intellectual Property

Trouble is brewing for patent infringement defendants who use lawyers from one law firm to act as trial counsel and other lawyers from the same or different firm (albeit perfectly screened off from the trial team) to prepare a non-infringement opinion as an advice of counsel defense to allegations of willful infringement. The 2006 Federal Circuit decision in EchoStar has set off a veritable feeding frenzy of attacks by patentees' counsel on the most sacred of attorney client communications and work product: that of trial counsel. In a case of first impression, one federal court has even granted a motion …


National Cable & Telecommunications Association V. Brand X Internet Services: Resolving Irregularities In Regulation?, Amy L. Signaigo Jan 2007

National Cable & Telecommunications Association V. Brand X Internet Services: Resolving Irregularities In Regulation?, Amy L. Signaigo

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Is Apple Playing Fair? Navigating The Ipod Fairplay Drm Controversy, Nicola F. Sharpe, Olufunmilayo B. Arewa Jan 2007

Is Apple Playing Fair? Navigating The Ipod Fairplay Drm Controversy, Nicola F. Sharpe, Olufunmilayo B. Arewa

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Illinois Tool Works: Allocating The Burden Of Proving Market Power In Patent Tying Cases, Dennis J. Abdelnour Jan 2007

Illinois Tool Works: Allocating The Burden Of Proving Market Power In Patent Tying Cases, Dennis J. Abdelnour

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Extra-Judicial Decision Making For Drug Safety And Risk Management: Evidence From The Fda, Hazel Mcmullin, Andrew B. Whitford Jan 2007

Extra-Judicial Decision Making For Drug Safety And Risk Management: Evidence From The Fda, Hazel Mcmullin, Andrew B. Whitford

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Times May Have Changed, But The Song Is Still The Same: Why The Supreme Court Was Incorrect To Stray From Sony's Reasoning In Metro-Goldwyn-Mayer Studios, Inc. V. Grokster, Ltd., Julie A. Wooten Jan 2007

Times May Have Changed, But The Song Is Still The Same: Why The Supreme Court Was Incorrect To Stray From Sony's Reasoning In Metro-Goldwyn-Mayer Studios, Inc. V. Grokster, Ltd., Julie A. Wooten

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


Overcoming The Achilles Heel Of Copyright Law, Haochen Sun Jan 2007

Overcoming The Achilles Heel Of Copyright Law, Haochen Sun

Northwestern Journal of Technology and Intellectual Property

No abstract provided.