Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Computer Law

Price Discrimination, Personal Use And Piracy: Copyright Protection Of Digital Works, Michael J. Meurer Oct 1997

Price Discrimination, Personal Use And Piracy: Copyright Protection Of Digital Works, Michael J. Meurer

Buffalo Law Review

No abstract provided.


Showdown At The Domain Name Corral: Property Rights And Personal Jurisdiction Over Squatters, Poachers And Other Parasites, Ira Nathenson Jan 1997

Showdown At The Domain Name Corral: Property Rights And Personal Jurisdiction Over Squatters, Poachers And Other Parasites, Ira Nathenson

Ira Steven Nathenson

This paper on domain names disputes has two main goals. The first is to analyze the principal points of litigation in domain name disputes, namely, personal jurisdiction and trademark liability. The second is to propose an analytic framework to better help resolve matters of jurisdiction and liability. Regarding personal jurisdiction, domain names are problematic because an internet site can be viewed almost anywhere, potentially subjecting the domain name owner to suit everywhere. For example, should a Florida domain name owner automatically be subject to suit in Alaska where the site can be viewed? If not, then where? Regarding liability, trademark …


Trademark Law On The Internet - Will It Scale? The Challenge To Develop International Trademark Law, 16 J. Marshall J. Computer & Info. L. 3 (1997), David W. Maher Jan 1997

Trademark Law On The Internet - Will It Scale? The Challenge To Develop International Trademark Law, 16 J. Marshall J. Computer & Info. L. 3 (1997), David W. Maher

UIC John Marshall Journal of Information Technology & Privacy Law

The author states that the rapid growth of the Internet has caused a serious collision between the efficient functioning of Domain Name Systems and the claims of trademark owners. U.S. Courts have recognized that domain names can have trademark implications. Trademarks are important because organizations responsible for allocation and registration of domain names must take trademarks and trademark law into account. The International Trademark Association (INTA) sets forth principles that should apply to the use of trademarks in the Domain Name System. The author's comment focuses on how to accommodate the interests and rights of trademark owners in the DNS …


Nba V. Motorola And Stats, Inc.: The Second Circuit Properly Limits The "Hot News Doctrine", 16 J. Marshall J. Computer & Info. L. 197 (1997), Alan D. Lieb Jan 1997

Nba V. Motorola And Stats, Inc.: The Second Circuit Properly Limits The "Hot News Doctrine", 16 J. Marshall J. Computer & Info. L. 197 (1997), Alan D. Lieb

UIC John Marshall Journal of Information Technology & Privacy Law

The Second Circuit Court of Appeals recently handed down a decision which can be seen as a victory for supporters of free dissemination on the Internet. At issue was whether dissemination of real-time sports data infringed the NBA's copyright of broadcast material, and if not whether the use of NBA game statistics was a misappropriation of the NBA's property. In 1994, Motorola teamed up with STATS (Sports Team Analysis and Tracking Systems of Missouri, Inc.) to provide real-time updates of professional sports scores and information to subscribers of pagers as well as on-line services. STATS also provides sports information to …


Electronic Commerce On The Internet: Legal Developments In Taiwan, 16 J. Marshall J. Computer & Info. L. 77 (1997), George C. C. Chen Jan 1997

Electronic Commerce On The Internet: Legal Developments In Taiwan, 16 J. Marshall J. Computer & Info. L. 77 (1997), George C. C. Chen

UIC John Marshall Journal of Information Technology & Privacy Law

The purpose of this article is to share information about "outstanding legal issues" that Taiwan has experienced in its use of the Internet. It does through five topics. First, the issue of contracts is addressed using the present laws in Taiwan. Contracts are based on an "offer" by one party and "acceptance" of a second party. Digital products displayed on the Internet are said to constitute an offer when it bears a price, but a legal question arises out of how to constitute acceptance. Taiwan law looks to the law of the country where the offer was made to govern …


Right On The Mark: Defining The Nexus Between Trademarks And Internet Domain Names, 15 J. Marshall J. Computer & Info. L. 277 (1997), G. Peter Albert Jr. Jan 1997

Right On The Mark: Defining The Nexus Between Trademarks And Internet Domain Names, 15 J. Marshall J. Computer & Info. L. 277 (1997), G. Peter Albert Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

The Internet is a rapidly expanding global network. The Internet provides a virtual marketplace in which many small companies are given the opportunity to have increased leverage to compete with their larger corporate counterparts. Businesses are establishing their presence on the Internet through the creation of a domain name. The domain name is an alphanumeric address that identifies a specific location on the Internet. Each domain name reflects a distinct address that distinguishes it from any other. Similarly, qualification of a word or symbol as a trademark must include the following three elements: (1) "function" to identify and distinguish the …


A Request To The High Court: Don't Let The Patent Laws Be Distracted By A Flashy Trade Dress, 15 J. Marshall J. Computer & Info. L. 323 (1997), Manotti L. Jenkins Jan 1997

A Request To The High Court: Don't Let The Patent Laws Be Distracted By A Flashy Trade Dress, 15 J. Marshall J. Computer & Info. L. 323 (1997), Manotti L. Jenkins

UIC John Marshall Journal of Information Technology & Privacy Law

The United States Court of Appeals for the Tenth Circuit, in Vornado Air Circulation Systems Inc. v. Duracraft Corp., held in the negative the issue of "whether a product configuration is entitled to trade dress protection when it is or has been a significant inventive component of an invention covered by a utility patent." The court viewed the case involved as an issue of the "intersection of the Patent Act and the Lanham Trade-Mark Act," and reasoned that "patent policy dictates" that the Patent Act should prevail in these situations. The United States Supreme Court denied certiorari upon appeal by …


A Primer On Trademark Law And Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997), David J. Loundy Jan 1997

A Primer On Trademark Law And Internet Addresses, 15 J. Marshall J. Computer & Info. L. 465 (1997), David J. Loundy

UIC John Marshall Journal of Information Technology & Privacy Law

The conflicts arising over Internet addresses generally fall within four categories: trademarks as second-level domains; second-level domains that are similar to trademarks; trademarks as third-level domain/machine names; and trademarks as userIDs. When confronted with the four categories, a court will generally analyze the problem by looking at the likelihood of confusion, applying the dilution statutes, and determining if the trademark has been blurred or tarnished. The likelihood of confusion analysis looks at: the degree of similarity between the marks in appearance and suggestion; the similarity of the product or services; the area and manner of concurrent use; the degree of …


Orderly Expansion Of The International Top-Level Domains: Concurrent Trademark Users Need A Way Out Of The Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997), David B. Nash Jan 1997

Orderly Expansion Of The International Top-Level Domains: Concurrent Trademark Users Need A Way Out Of The Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997), David B. Nash

UIC John Marshall Journal of Information Technology & Privacy Law

Organizations that want to conduct business on the Internet have to register with Network Solutions, Inc. (NSI). The Internet was created as a network designed by the Defense Department to test a fail safe network. The National Science Foundation connects to the Internet five supercomputing centers, which connects most public colleges to the Internet. The World Wide Web was the first service that was opened to individuals and for commercial use. Commercial success on the Internet depends on the ease with which consumers can find the organization on-line. If the company has established good will in the public, the company …


Perfecting A Security Interest In Computer Software Copyrights: Getting It Right, 15 J. Marshall J. Computer & Info. L. 855 (1997), Aimee A. Watterberg Jan 1997

Perfecting A Security Interest In Computer Software Copyrights: Getting It Right, 15 J. Marshall J. Computer & Info. L. 855 (1997), Aimee A. Watterberg

UIC John Marshall Journal of Information Technology & Privacy Law

The rapid development of computer technology has led software companies to seek financial support from various commercial lenders. Lenders are typically unaccustomed and unwilling to lend money on the security of intellectual property. The fear of lenders is well founded because lenders face a considerable risk in lending money on contemporary and intangible collateral. As a result of the unavailability of funds, technology based companies would be hindered in their efforts to promote new programs. The unclarity of laws with respect to obtaining a security interest has created obstacles for parties on both sides of the transaction -- the lender …


The West German Smorgasbord Approach To Intellectual Property Protection Of Computer Software, 15 J. Marshall J. Computer & Info. L. 883 (1997), Larry N. Woodard Jan 1997

The West German Smorgasbord Approach To Intellectual Property Protection Of Computer Software, 15 J. Marshall J. Computer & Info. L. 883 (1997), Larry N. Woodard

UIC John Marshall Journal of Information Technology & Privacy Law

There is a lack of efficient protection for intellectual property within the computer software medium. Intellectual property of computer software has traditionally been protected by copyrights and relatively recently has been afforded protection of its intellectual property via patents. The distinction between a computer's hardware and a computer's software is decreasing; likewise, the distinction for such protection, namely patents and copyrights, respectively, should be decreased or eliminated, as well. After a brief comparative analysis of patent and copyright protection for computer software, an alternative to the current system of protection for software intellectual property exists. The nature of the software …


The Copyright Battle: Emerging International Rules And Roadblocks On The Global Information Infrastructure, 15 J. Marshall J. Computer & Info. L. 759 (1997), Stephen Fraser Jan 1997

The Copyright Battle: Emerging International Rules And Roadblocks On The Global Information Infrastructure, 15 J. Marshall J. Computer & Info. L. 759 (1997), Stephen Fraser

UIC John Marshall Journal of Information Technology & Privacy Law

This article discusses intellectual property rights on the Global Information Infrastructure (GII) as affected by the evolution of the Internet. It outlines the battle between the advocates of total copyright protection and the advocates of minimal copyright protection. The article examines all of the proposed national and international laws affecting copyright protection on the GII, beginning with the minimal protections outlined in the Berne Convention and the problems involved in its enforcement and continuing with its successors, the General Agreement on Tariffs and Trade (GATT)/World Trade Organization (WTO). The article reviews the history of international copyright protection and the different …


Obtaining And Enforcing Trade Dress For Computer Graphical User Interfaces - A Practitioner's Guide, John P. Musone Jan 1997

Obtaining And Enforcing Trade Dress For Computer Graphical User Interfaces - A Practitioner's Guide, John P. Musone

Richmond Journal of Law & Technology

A computer program that successfully incorporates an intuitive graphical user interface possesses a tremendous competitive advantage over its competitors. Interface development accordingly has become a critical aspect of software development. Without legal protection, however, this advantage is illusory as competitors are otherwise free to copy unprotected interface features. Interface creators have predominately used copyright law to protect the overall "look and feel" of their interfaces. However, copyright protection for interfaces increasingly appears to be the exception rather than the rule.


Legal Aspects - Software Reverse Engineering And Copyright: Past, Present And Future, 31 J. Marshall L. Rev. 1 (1997), Brian C. Behrens, Reuven R. Levary Jan 1997

Legal Aspects - Software Reverse Engineering And Copyright: Past, Present And Future, 31 J. Marshall L. Rev. 1 (1997), Brian C. Behrens, Reuven R. Levary

UIC Law Review

No abstract provided.