Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Microsoft

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 76

Full-Text Articles in Law

Consumer Welfare Of The Future: Harm To Innovation As An Antitrust Injury, Brenton Gutkowski May 2023

Consumer Welfare Of The Future: Harm To Innovation As An Antitrust Injury, Brenton Gutkowski

San Diego Law Review

This Comment will discuss pertinent background information regarding American antitrust jurisprudence. Second, this Comment will define Big Tech and discuss its rise to a dominant market position in the American economy. Third, this Comment will break down the District of Columbia District Court’s decision in United States v. Microsoft Corp. and will discuss how the courts’ reasoning can establish a new standard of harm to innovation under the consumer welfare standard. Fourth, this Comment will discuss two different situations in which the harm to innovation standard works to espouse antitrust goals. In summation, this Comment will address objections to …


The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page Feb 2023

The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page

University of Miami Law Review

The United States Department of Justice (“DOJ”) and three overlapping groups of states have filed federal antitrust cases alleging Google has monopolized internet search, search advertising, internet advertising technologies, and app distribution on Android phones. In this Article, we focus on the DOJ’s claims that Google has used contracts with tech firms that distribute Google’s search services in order to exclude rival search providers and thus to monopolize the markets for search and search advertising—the two sides of Google’s search platform. The primary mechanisms of exclusion, according to the DOJ, are the many contracts Google has used to secure its …


The Policy Origins Of Wi-Fi, John Blevins Jan 2023

The Policy Origins Of Wi-Fi, John Blevins

Indiana Law Journal

Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


The Power Of Being Present: Lessons From Diplomacy In Latin America And The Caribbean For The Private Sector, Kimberly Breier, Daniel Korn Dec 2021

The Power Of Being Present: Lessons From Diplomacy In Latin America And The Caribbean For The Private Sector, Kimberly Breier, Daniel Korn

University of Miami Inter-American Law Review

Successful modern diplomacy and private sector engagements require being physically present. Based on the experience of the authors in diplomacy and corporate government affairs, this article argues that the trust that forms the basis of effective diplomacy and corporate engagement with the communities in which they operate is established best through direct physical interaction. With examples from Latin America and the Caribbean, the article explores how both diplomacy and corporate government affairs have evolved into a model of being present that emphasizes seeking to empower local populations. The article delves into how and why the United States carries out its …


Fixing What’S Broken: The Outdated Guidelines Of The Sca And Its Application To Modern Information Platforms, Lutfi Barakat Jan 2021

Fixing What’S Broken: The Outdated Guidelines Of The Sca And Its Application To Modern Information Platforms, Lutfi Barakat

Touro Law Review

In 1986, Congress enacted the Electronic Communications Privacy Act (ECPA) to afford privacy protections to electronic communications and it has not changed since its inception. The ECPA has proven problematic as technology has advanced, but Congress has not modified the law to reflect this change. Courts have struggled to apply the law to both old technologies that have been updated and new technologies that have emerged. The ECPA needs to be revised to reflect the new advances in technology or be repealed and replaced with a new approach. This will ensure that consumer data will be safeguarded while in the …


Spirit Of The Corporation, Russell Powell Jan 2021

Spirit Of The Corporation, Russell Powell

Seattle University Law Review

Christian theologians have analyzed the productive and destructive qualities of institutions, sometimes attributing to them human virtues and vices. In City of God, Saint Augustine describes a utopian vision of human community within a Christian context as an alternative to the flawed “City of Man.” Contemporary theologians and sociologists have described collective structures of human behavior in institutions as having a kind of “spirit” analogous to the individual human “spirit.” Institutions are then assumed to take on an existence separate from the individuals within them, and in fact, the “spirit” of an institution influences the behavior of individuals. In The …


When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl Jul 2020

When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl

IP Theory

No abstract provided.


Antitrust In Times Of Information Technology: An Analysis Of Big Tech Monopoly Cases, Shamayeta Rahman Jan 2020

Antitrust In Times Of Information Technology: An Analysis Of Big Tech Monopoly Cases, Shamayeta Rahman

Electronic Theses and Dissertations

The information technology industry is one of the most rapidly growing yet concentrated markets existing today. Big Tech monopolies and their increasingly anticompetitive behavior posits risks for competition, technological innovation and consumer welfare. This ranges from price discrimination, limiting consumer choices to the unethical use of data. The particular nature of information technology, with its network effects and negligible marginal costs, incentivizes and facilitates predatory market practices making antitrust analysis in this industry extremely complex. Certain schools of antitrust thought are more sensitive (namely the post-Chicago school) to these implications than others, though antitrust application is still lacking in both …


Nascent Competitors, C. Scott Hemphill, Tim Wu Jan 2020

Nascent Competitors, C. Scott Hemphill, Tim Wu

Faculty Scholarship

A nascent competitor is a firm whose prospective innovation represents a serious threat to an incumbent. Protecting such competition is a critical mission for antitrust law, given the outsized role of unproven outsiders as innovators and the uniquely potent threat they often pose to powerful entrenched firms. In this Article, we identify nascent competition as a distinct analytical category and outline a program of antitrust enforcement to protect it. We make the case for enforcement even where the ultimate competitive significance of the target is uncertain, and explain why a contrary view is mistaken as a matter of policy and …


Defining Critical Infrastructure For A Global Application, Colleen M. Newbill Aug 2019

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill

Indiana Journal of Global Legal Studies

A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …


A Patent Reformist Supreme Court And Its Unearthed Precedent, Samuel F. Ernst Jan 2019

A Patent Reformist Supreme Court And Its Unearthed Precedent, Samuel F. Ernst

Fordham Intellectual Property, Media and Entertainment Law Journal

How is it that the Supreme Court, a generalist court, is leading a project of innovation reform in our times while the court of appeals established to encourage innovation is having its precedent stricken down time and again? This decade the Supreme Court has issued far more patent law decisions than in any decade since the passage of the Patent Act of 1952. In doing so, the Supreme Court has overruled the Federal Circuit in roughly threequarters of the patent cases in which the Supreme Court has issued opinions. In most of these cases, the Supreme Court has established rules …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


Antitrust And Inequality: The Problem Of Super-Firms, Shi-Ling Hsu Jan 2018

Antitrust And Inequality: The Problem Of Super-Firms, Shi-Ling Hsu

Scholarly Publications

Increasing concern about economic inequality has coincided with an unsettling ascendancy of some large, technologically integrated “super-firms,” which have grabbed large market shares in multiple markets, and cast doubt upon the future viability of a wide range of businesses, many of which have been important local and regional employers. It is thus unsurprising that these two trends have knocked together in public discourse, and that antitrust law been proposed as one way of helping to remedy economic inequality. This essay notes that antitrust law is generally a poor fit for reducing economic inequality, but one aspect is worthy of note: …


Gender And The Tournament: Reinventing Antidiscrimination Law In An Age Of Inequality, Naomi Cahn, June Carbone, Nancy Levit Jan 2018

Gender And The Tournament: Reinventing Antidiscrimination Law In An Age Of Inequality, Naomi Cahn, June Carbone, Nancy Levit

Faculty Works

Since the 1970’s, antidiscrimination advocates have approached Title VII as though the impact of the law on minorities and women could be considered in isolation. This article argues that this is a mistake. Instead, Reinventing Antidiscrimination Law attempts to reclaim Title VII’s original approach, which justified efforts to dismantle segregated workplaces as necessary to both eliminate discrimination and promote economic growth. Using that approach, this Article is the first to consider how widespread corporate tournaments and growing gender disparities in the upper echelons of the economy are intrinsically intertwined, and how they undermine the core promises of antidiscrimination law. The …


International Law And Extraterritoriality: Brief Of International And Extraterritorial Law Scholars As Amici Curiae (U.S. V. Microsoft), Anthony J. Colangelo, Austen L. Parrish Jan 2018

International Law And Extraterritoriality: Brief Of International And Extraterritorial Law Scholars As Amici Curiae (U.S. V. Microsoft), Anthony J. Colangelo, Austen L. Parrish

Faculty Journal Articles and Book Chapters

Written by international and extraterritorial law scholars, the attached amicus brief was submitted in the U.S. v. Microsoft case. That case involves whether Congress, when it enacted the Stored Communications Act, intended to provide federal and local law enforcement authority to unilaterally seize the private email communications of foreign citizens stored abroad.

The amicus brief explains how the Charming Betsy canon and the law of extraterritoriality are part of a well-defined body of law the U.S. Supreme Court has developed for determining how American law applies abroad. These doctrines exist independently: one aims to avoid unsanctioned violations of international law. …


International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui Jan 2018

International Comity And The Non-State Actor, Microsoft: Why Law Enforcement Access To Data Stored Abroad Act (Leads Act) Promotes International Comity, Sabah Siddiqui

Catholic University Journal of Law and Technology

Currently large email service providers, such as Google, Microsoft and Yahoo are refusing to comply with warrants issued under the Secured Communications Act (“SCA”) because in many instances, the requested information may be stored in servers located abroad. In the dismissed Supreme Court case, In re Warrant to Search a Certain E-Mail Account Controlled & Maintained by Microsoft Corporation, the Supreme Court should have addressed whether an internet service provider must comply with a warrant issued under the SCA when the requested information is stored in a foreign country and whether enforcement of these warrants would be an impermissible …


At&T V. Microsoft: Is This A Case Of Deepsouth Déjà Vu?, Christopher R. Rogers Nov 2017

At&T V. Microsoft: Is This A Case Of Deepsouth Déjà Vu?, Christopher R. Rogers

Maine Law Review

It has been stated many times by various courts that the patent laws of the United States do not reach beyond the borders of the United States. In an age of expanding world commerce, the territorial reach of our patent laws has sometimes made it difficult for U.S. inventors to meaningfully protect their intellectual property. For example, the Supreme Court holding in Deepsouth Packing Co. v. Laitram Corp. opened up a loophole that allowed unlicensed U.S. manufacturers to essentially export patented inventions, thereby trampling on the patent rights of U.S. patent holders selling to foreign markets. The Deepsouth loophole has …


United States Versus Microsoft: A Case Study, Michael Betts Sep 2017

United States Versus Microsoft: A Case Study, Michael Betts

Oklahoma Journal of Law and Technology

No abstract provided.


Storage Wars: Analyzing The Territorial Limits Of The Sca's Warrant Provision, Peter Liskanich Jan 2017

Storage Wars: Analyzing The Territorial Limits Of The Sca's Warrant Provision, Peter Liskanich

Loyola of Los Angeles Law Review

No abstract provided.


Can A Cost Sharing Arrangement Prevent A Tax Shelter Label?, Jeffrey M. Kadet Nov 2016

Can A Cost Sharing Arrangement Prevent A Tax Shelter Label?, Jeffrey M. Kadet

Articles

In connection with an ongoing effort of the government to examine certain Microsoft documents, the government on October 12, 2016, stated in a filed document that one of the transactions at issue is "unquestionably" a tax shelter for purposes of section 7525. The significance of that is in whether some written communications should be protected from IRS scrutiny by the section 7525 confidentiality privilege that may apply to tax advice between a taxpayer and tax practitioners. Under section 7525(b)(2), written communications will not qualify if they are "in connection with the promotion of the direct or indirect participation of the …


Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee Sep 2016

Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee

Journal of Intellectual Property Law

No abstract provided.


Profit-Shifting Structures: Making Ethical Judgments Objectively, Part 2, Jeffrey M. Kadet, David Koontz Jul 2016

Profit-Shifting Structures: Making Ethical Judgments Objectively, Part 2, Jeffrey M. Kadet, David Koontz

Articles

MNCs and their advisors have seemingly taken ethics out of the mix when considering the profit-shifting tax structures they have so prolifically and enthusiastically implemented over the past several decades. There may be a variety of reasons for this. First, U.S. tax law is a self-assessment system, meaning that in most cases taxpayers compute and pay tax without advance approval of their tax positions from the IRS. No third party technical test or propriety standard has to be passed on the front end for any tax strategy or structure. Second, direct personal benefits accrue to management and advisors from implementing …


Profit-Shifting Structures: Making Ethical Judgments Objectively, Part 1, Jeffrey M. Kadet, David Koontz Jun 2016

Profit-Shifting Structures: Making Ethical Judgments Objectively, Part 1, Jeffrey M. Kadet, David Koontz

Articles

MNCs and their advisors have seemingly taken ethics out of the mix when considering the profit-shifting tax structures they have so prolifically and enthusiastically implemented over the past several decades. There may be a variety of reasons for this. First, U.S. tax law is a self-assessment system, meaning that in most cases taxpayers compute and pay tax without advance approval of their tax positions from the IRS. No third party technical test or propriety standard has to be passed on the front end for any tax strategy or structure. Second, direct personal benefits accrue to management and advisors from implementing …


Network Effects In Technology Markets: Applying The Lessons Of Intel And Microsoft To Future Clashes Between Antitrust And Intellectual Property, John T. Soma, Kevin B. Davis Apr 2016

Network Effects In Technology Markets: Applying The Lessons Of Intel And Microsoft To Future Clashes Between Antitrust And Intellectual Property, John T. Soma, Kevin B. Davis

Journal of Intellectual Property Law

No abstract provided.


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Measuring Compliance With Compulsory Licensing Remedies In The American Microsoft Case, William Page, Seldon Childers Aug 2015

Measuring Compliance With Compulsory Licensing Remedies In The American Microsoft Case, William Page, Seldon Childers

William H. Page

Section III.E of the final judgments in the American Microsoft case requires Microsoft to make available to software developers certain communications protocols that Windows client operating systems use to interoperate with Microsoft's server operating systems. This provision has been by far the most difficult and costly to implement, primarily because of questions about the quality of Microsoft's documentation of the protocols. The plaintiffs' technical experts, in testing the documentation, have found numerous issues, which they have asked Microsoft to resolve. Because of accumulation of unresolved issues, the parties agreed in 2006 to extend Section III.E for up to five more …


Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett Dec 2014

Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett

Touro Law Review

No abstract provided.


Microsoft's Antitrust Travails, Keith N. Hylton Dec 2014

Microsoft's Antitrust Travails, Keith N. Hylton

Faculty Scholarship

Andrew Gavil and Harry First’s book on the Department of Justice’s litigation against Microsoft will undoubtedly become one of the standard references for anyone who studies these cases in the future. This litigation has been a big enterprise in the courts, especially the landmark D.C. Circuit opinion in 2001. 1 Repercussions continue today, with new raids on Microsoft’s operations in China to investigate vaguely described concerns of the Chinese government over product bundling and interoperability, issues at the core of the Microsoft litigation from the start.

Gavil and First have two goals: to provide a road map and history of …


The Strategic Use Of Public And Private Litigation In Antitrust As Business Strategy, D. Daniel Sokol Nov 2014

The Strategic Use Of Public And Private Litigation In Antitrust As Business Strategy, D. Daniel Sokol

D. Daniel Sokol

This Article claims that there may be a subset of cases in which private rights of action may work with public rights as an effective strategy for a firm to raise costs against rival dominant firms. A competitor firm may bring its own case (which is costly) and/or have government bring a case on its behalf (which is less costly). Alternatively, if the competitor firm has sufficient financial resources, it can pursue an approach that employs both strategies simultaneously. This situation of public and private misuse of antitrust may not happen often. As the Article will explore, it is not …