Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Intellectual Property Law

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai Jan 2021

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai

Articles

Artificial intelligence and machine learning represent powerful tools in many fields, ranging from criminal justice to human biology to climate change. Part of the power of these tools arises from their ability to make predictions and glean useful information about complex real-world systems without the need to understand the workings of those systems.


A Critical Evaluation Of The Effectiveness And Legitimacy Of Webblocking Injunctions, Mark Hyland Jan 2020

A Critical Evaluation Of The Effectiveness And Legitimacy Of Webblocking Injunctions, Mark Hyland

Articles

Relative to the dual criteria of effectiveness and legitimacy, this article evaluates webblocking injunctions in the context of intellectual property law and with a particular focus on the vanguard role played by the English Courts. With regard to the first criterion, it is argued that there is reason to think that webblocking injunctions are viewed by IP owners as well as by legislators and courts as a relatively effective instrument in the protection of IP assets. Moreover, the extension of webblocking orders to trade marks together with their adoption in a number of legal systems, is further evidence that these …


Using Ai To Analyze Patent Claim Indefiniteness, Dean Alderucci, Kevin D. Ashley Jan 2019

Using Ai To Analyze Patent Claim Indefiniteness, Dean Alderucci, Kevin D. Ashley

Articles

In this Article, we describe how to use artificial intelligence (AI) techniques to partially automate a type of legal analysis, determining whether a patent claim satisfies the definiteness requirement. Although fully automating such a high-level cognitive task is well beyond state-of-the-art AI, we show that AI can nevertheless assist the decision maker in making this determination. Specifically, the use of custom AI technology can aid the decision maker by (1) mining patent text to rapidly bring relevant information to the decision maker attention, and (2) suggesting simple inferences that can be drawn from that information.

We begin by summarizing the …


The Dangers Of The Digital Millennium Copyright Act: Much Ado About Nothing?, Steve P. Calandrillo, Ewa A. Davison Jan 2008

The Dangers Of The Digital Millennium Copyright Act: Much Ado About Nothing?, Steve P. Calandrillo, Ewa A. Davison

Articles

In 1998, Congress passed the Digital Millennium Copyright Act (DMCA), a landmark piece of legislation aimed at protecting copyright holders from those who might manufacture or traffic technology capable of allowing users to evade piracy protections on the underlying work. At its core, the DMCA flatly prohibits the circumvention of “technological protection measures” in order to gain access to copyrighted works, but provides no safety valve for any traditionally protected uses.

While hailed as a victory by the software and entertainment industries, the academic and scientific communities ties have been far less enthusiastic. The DMCA’s goal of combating piracy is …


The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski Jan 2007

The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski

Articles

Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.

The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …


Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton Jan 2006

Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton

Articles

Computer software is somewhat of a problem child for intellectual property law. Courts and legislatures have struggled to encourage innovations in software development while, at the same time, attempting to avoid undesirable digital information monopolies. Neither the patent nor the copyright system has provided a particularly satisfactory paradigm for software protection. Although patents have received greater attention than copyrights in the software context (consider, for example, the recent BlackBerry case), copyright law arguably creates more insidious undercurrents in today's marketplace. This is partly because we have not yet appreciated the potential impact of recent developments in programming methodology and digital …


General Public License 3.0: Hacking The Free Software Movement's Constitution, Robert W. Gomulkiewicz Jan 2005

General Public License 3.0: Hacking The Free Software Movement's Constitution, Robert W. Gomulkiewicz

Articles

The General Public License (GPL) enshrines a software hacker’s freedom to use code in important ways. Hackers often refer to the GPL as the free software movement’s “constitution.” Richard Stallman, founder of the Free Software Foundation (FSF) wrote the most recent version of the GPL, version 2.0, back in 1991. For a constitution, a fourteen-year-old document is young, but for a license, it is quite old. The revision process is finally underway, led by Stallman and Eben Moglen, FSF’s general counsel.

The release of GPL version 3.0 will be momentous for many reasons, but one reason stands out: The GPL …


Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy, Jacqueline D. Lipton Jan 2005

Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy, Jacqueline D. Lipton

Articles

All good 'cyberlawyers' know that in the late 1990s, legal and regulatory measures were adopted, both at the domestic and international level to address the then-growing problem of 'cybersquatting': that is, the registration of often multiple domain names corresponding to valuable corporate trademarks with the intention of extorting high prices from the trademark owners for transferring the names to them. Since 1999, the Uniform Domain Name Dispute Resolution Policy ('UDRP') in particular, complemented by the Anti-Cybersquatting Consumer Protection Act ('ACPA'), has been very successful in combating this practice. Unfortunately, since the late 1990s, there has been little movement towards developing …


Entrepreneurial Open Source Software Hackers: Mysql And Its Dual Licensing, Robert W. Gomulkiewicz Jan 2004

Entrepreneurial Open Source Software Hackers: Mysql And Its Dual Licensing, Robert W. Gomulkiewicz

Articles

Hackers often quibble about commercializing software, yet most willreadily sell their programming services. Richard Stallman, the father of free software, has always recognized that hackers have a right to make money. Aside from selling programming services, however, Stallman's disciples seem to frown upon commercializing software. Other hackers, labeling themselves "open source" developers, have warmed to the possibility that free software may be profitable.

This article describes one of the most promising business models for hackers, called "dual licensing." In this model, hackers offer the same code under two different licenses: a commercial license and an open source license. Licensees who …


Legal Protection For Software: Still A Work In Progress, Robert W. Gomulkiewicz Jan 2002

Legal Protection For Software: Still A Work In Progress, Robert W. Gomulkiewicz

Articles

Software began as geekware-something written by programmers for programmers. Now, software is a business and consumer staple. Cryptic character-based user interfaces have given way to friendly graphical ones; multi-media is everywhere; people own multiple computers of varying sizes; computers are connected to one another across the globe; email and instant electronic messages have replaced letters and telephone calls for many people.

The issue of whether the law should protect software seems quaint to us now. Over the past twenty-five years, legislatures and courts have concluded that copyright, patent, trade secret, trademark, and contract law all can be used to protect …


De-Bugging Open Source Software Licensing, Robert W. Gomulkiewicz Jan 2002

De-Bugging Open Source Software Licensing, Robert W. Gomulkiewicz

Articles

Home computer users and businesses often rely on software developed by unconventional programmers known as "hackers." Hackers claim that the code they develop is superior in quality to the code developed by commercial software firms because hackers freely share the code they develop. This code sharing enables a multitude of programmers from around the world to rapidly find and fix bugs. The legal mechanism that enables hackers to deploy this worldwide team of de-buggers is a license agreement or, to be more precise,an assortment of license agreements known as "open source" licenses.

Although open source software developers may regularly fix …


Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites, Xuan-Thao Nguyen Jan 2001

Should It Be A Free For All? The Challenge Of Extending Trade Dress Protection To The Look And Feel Of Web Sites, Xuan-Thao Nguyen

Articles

In the e-commerce world, a company's web site becomes the primary communication center with the customer. The web site is where the company displays products, presents marketing materials, and provides sales and post-sales support. Increasingly, companies are spending valuable resources to build and maintain their web sites. With the rapid change in web technology, many web sites now feature more than just ordinary text. Color, clipart, graphics, designs, animations, and sounds are now part of the overall appearance of web sites. Yet copying an image from a web site is just one click away. What protection is available to the …


Blame It On The Cybersquatters: How Congress Partially Ends The Circus Among The Circuits With The Anticybersquatting Consumer Protection Act?, Xuan-Thao Nguyen Jan 2001

Blame It On The Cybersquatters: How Congress Partially Ends The Circus Among The Circuits With The Anticybersquatting Consumer Protection Act?, Xuan-Thao Nguyen

Articles

Congress blamed the cybersquatters for the need to pass another trademark cyberlaw. Congress enacted the Anticybersquatting Consumer Protection Act (“ACPA”) on November 29, 1999. The ACPA aimed to protect consumers and businesses, to promote the growth of electronic commerce, and to provide clarity in the law for trademark owners by prohibiting cybersquatting activities on the Internet. Prior to the enactment of the ACPA, the Federal Trademark Dilution Act (“FTDA”), which was passed by Congress in 1995 and became effective on January 16, 1996, was hailed as a powerful tool to combat cybersquatters on the Internet. That presumed powerful tool turned …


A Brief Defense Of Mass Market Software License Agreements, Robert W. Gomulkiewicz Jan 1996

A Brief Defense Of Mass Market Software License Agreements, Robert W. Gomulkiewicz

Articles

In the rapidly changing world of personal computer software, the end user license agreement ("EULA") has endured. The EULA is a familiar component of most personal computer software transactions. Many commentators, however, have maligned the practice of standard form software licensing. A survey of the literature on the subject might lead one to conclude that there are only critics--and no proponents--of EULAs.

Despite the din of criticism, EULAs continue to be widely usedby almost every mass-market software publisher, even though the cost of doing so is significant. This Article explains the value of EULAs for both software publishers and users, …


Performer's Rights And Digital Sampling Under U.S. And Japanese Law, Jessica D. Litman Jan 1988

Performer's Rights And Digital Sampling Under U.S. And Japanese Law, Jessica D. Litman

Articles

A year or two ago, one of my copyright students called to my attention a problem that seemed to him to pose unique difficulties for the copyright statute. The problem arises because of a technology called digital sampling.' Digital sampling is a new threat to performers' rights that has grown out of the combination of digital recording technology with music synthesizer technology. This threat is a very recent one. Indeed, the digital sampling problem is so new that copyright lawyers haven't yet figured out how to think about it.