Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (13)
- Selected Works (6)
- UIC School of Law (4)
- University of Georgia School of Law (4)
- Brooklyn Law School (3)
-
- Cornell University Law School (2)
- The Catholic University of America, Columbus School of Law (2)
- Boston University School of Law (1)
- Roger Williams University (1)
- Southern Methodist University (1)
- University of Cincinnati College of Law (1)
- University of Minnesota Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of New Hampshire (1)
- Keyword
-
- Copyright (3)
- Intellectual property (3)
- Privacy (3)
- Technology (3)
- Anticybersquatting Consumer Protection Act (2)
-
- Consumer confusion (2)
- Copyright law (2)
- Cybercrime (2)
- Cybersquatting (2)
- Fair use (2)
- Internet (2)
- Lanham Act (2)
- Trademark (2)
- 2001 Budapest Convention (1)
- 3D printing technology (1)
- 3taps Inc. (1)
- API (1)
- Actes de procédure (1)
- Amazon (1)
- Application programming interface (1)
- Art (1)
- Artificial general super-intelligence (1)
- Artificial intellgence (1)
- Artificial intelligence (1)
- Autonomous machines (1)
- Breach (1)
- Broadcasting Act (1)
- CRTC (1)
- Canadian cybercrime legislation (1)
- Capitol Records (1)
- Publication
-
- Canadian Journal of Law and Technology (13)
- Journal of Intellectual Property Law (4)
- Catholic University Journal of Law and Technology (2)
- Cornell Law Faculty Publications (2)
- Journal of Law and Policy (2)
-
- Michael W. Carroll (2)
- UIC Law Review (2)
- Boyd Briefs / Road Scholars (1)
- Brooklyn Journal of International Law (1)
- Daniel Harris Brean (1)
- Elizabeth A Rowe (1)
- Faculty Scholarship (1)
- Joseph P. Liu (1)
- Law Faculty Scholarship (1)
- Law School Blogs (1)
- Minnesota Journal of Law, Science & Technology (1)
- SMU Science and Technology Law Review (1)
- The University of Cincinnati Intellectual Property and Computer Law Journal (1)
- Tracy Mitrano (1)
- UIC John Marshall Journal of Information Technology & Privacy Law (1)
- UIC Review of Intellectual Property Law (1)
- Publication Type
- File Type
Articles 1 - 30 of 41
Full-Text Articles in Intellectual Property Law
Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll
Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll
Michael W. Carroll
In eBay v. MercExchange, the Supreme Court correctly rejected a one-size-fits-all approach to patent injunctions. However, the Court's opinion does not fully recognize that the problem of uniformity in patent law is more general and that this problem cannot be solved through case-by-case analysis. This Essay provides a field guide for implementing eBay using functional analysis and insights from a uniformity-cost framework developed more fully in prior work. While there can be no general rule governing equitable relief in patent cases, the traditional four factor analysis for injunctive relief should lead the cases to cluster around certain patterns that often …
Creative Commons And The New Intermediaries, Michael W. Carroll
Creative Commons And The New Intermediaries, Michael W. Carroll
Michael W. Carroll
This symposium contribution examines the disintermediating and reintermediating roles played by Creative Commons licenses on the Internet. Creative Commons licenses act as a disintermediating force because they enable end-to-end transactions in copyrighted works. The licenses have reintermediating force by enabling new services and new online communities to form around content licensed under a Creative Commons license. Intermediaries focused on the copyright dimension have begun to appear online as search engines, archives, libraries, publishers, community organizers, and educators. Moreover, the growth of machine-readable copyright licenses and the new intermediaries that they enable is part of a larger movement toward a Semantic …
Chapter Three: Intellectual Property, Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Tracy Mitrano
No abstract provided.
Circumvention Of Geoblocking, Marketa Trimble
Circumvention Of Geoblocking, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble gave her presentation Circumvention of Geoblocking at the "Law, Borders, and Speech" conference, held at Stanford Law School on Oct. 24, 2016.
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
The University of Cincinnati Intellectual Property and Computer Law Journal
Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy
Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy
Canadian Journal of Law and Technology
In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie
Canadian Journal of Law and Technology
Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.
Using a pending border case …
Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma
Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma
Canadian Journal of Law and Technology
2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram
Canadian Journal of Law and Technology
Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …
The Right To Repair Doctrine And The Use Of 3d Printing Technology In Canadian Patent Law, Tesh W. Dagne, Gosia Piasecka
The Right To Repair Doctrine And The Use Of 3d Printing Technology In Canadian Patent Law, Tesh W. Dagne, Gosia Piasecka
Canadian Journal of Law and Technology
3D printing technology is part of a new economic movement, termed the sharing economy, where consumers rely less on large corporations for supplying them with products. The technology allows consumers to bypass the traditional manufacturing process. Instead, consumers increasingly share and sell products to each other on online sharing platforms. Consumers can download digital copies of products and print them in the convenience of their homes. In addition, they can repair and modify these products to suit their needs. Canadian patent law permits the repair of a patent-protected item but prohibits its reconstruction. However, the line between repair and reconstruction …
3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel
3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel
Minnesota Journal of Law, Science & Technology
No abstract provided.
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Catholic University Journal of Law and Technology
No abstract provided.
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
Catholic University Journal of Law and Technology
No abstract provided.
Rats, Traps, And Trade Secrets, Elizabeth A. Rowe
Rats, Traps, And Trade Secrets, Elizabeth A. Rowe
Elizabeth A Rowe
Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores …
How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon
How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon
Faculty Scholarship
In Oracle v. Google (2015), the Federal Circuit addressed whether the " method header " components of a dominant computer program were uncopyrightable as " merging " with the headers' ideas or function. Google had copied the headers to ease the ability of third-party programmers to interact with Google's Android platform. The court rebuffed the copyrightability challenge; it reasoned that because the plaintiff's expression might have been written in alternative forms, there was no " merger " of idea and expression. But the Oracle court may have been asking the wrong question. In Lotus v. Borland (1995), the owner of …
Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus
Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus
Journal of Intellectual Property Law
No abstract provided.
Copyright Law: Essential Cases And Materials, Alfred Yen, Joseph Liu
Copyright Law: Essential Cases And Materials, Alfred Yen, Joseph Liu
Joseph P. Liu
Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies
Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies
Journal of Intellectual Property Law
No abstract provided.
I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph
I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph
Journal of Intellectual Property Law
No abstract provided.
Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow
Journal of Intellectual Property Law
No abstract provided.
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli
Brooklyn Journal of International Law
In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …
Apis And Copyright Protection: The Potential Impact On Software Compatibility In The Programming Industry, 16 J. Marshall Rev. Intell. Prop. L. 153 (2016), Daria Vasilescu-Palermo
Apis And Copyright Protection: The Potential Impact On Software Compatibility In The Programming Industry, 16 J. Marshall Rev. Intell. Prop. L. 153 (2016), Daria Vasilescu-Palermo
UIC Review of Intellectual Property Law
In Oracle v. Google, the Federal Circuit set precedent when it decided to grant copyright protection to APIs. This comment examines the potential impact the computer programming industry will face now that APIs are deemed copyrightable. This comment also discusses Google s success in using fair use as an affirmative defense in order to use copyrightable APIs and what that means for the rest of the computer programming industry. Due to the fast-paced and ever-changing world of technology, this comment also proposes that the abstract-filtration-comparison test is the appropriate test to be used in determining API copyrightability if the issue …
The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren
UIC John Marshall Journal of Information Technology & Privacy Law
In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and …
The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li
The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li
Journal of Law and Policy
Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …
Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein
Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein
Journal of Law and Policy
Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …
Facebook, Twitter, And The Wild West Of Ip Enforcement On Social Media: Weighing The Merits Of A Uniform Dispute Resolution Policy, 49 J. Marshall L. Rev. 959 (2016), Daniel Doft
UIC Law Review
In Part I, this comment will discuss the different types of intellectual property issues that can arise on social media websites. Part II will then discuss the three actions currently available to an infringed owner attempting to protect its intellectual property rights. Part III will discuss the Uniform Domain Name Dispute Resolution Policy (UDRP), a successful mechanism for resolving domain name disputes online. Finally, Part IV will discuss the possible creation of a USRP, which will be modeled after the UDRP, in which a private third-party arbitrator would resolve intellectual property disputes in the social media arena. This section will …
Flo & Eddie, Inc. V. Sirius Xm Radio, Inc.: Will Terrestrial Radio And Pre-1972 Sound Recordings Remain “Happy Together”?, 50 J. Marshall L. Rev. 191 (2016), Kyle Prillaman
UIC Law Review
No abstract provided.
Foreword: The Food Law Era, Nathan Cortez
Foreword: The Food Law Era, Nathan Cortez
SMU Science and Technology Law Review
No abstract provided.
If It’S Broke, Fix It: Fixing Fixation, Megan M. Carpenter
If It’S Broke, Fix It: Fixing Fixation, Megan M. Carpenter
Law Faculty Scholarship
The fixation requirement, once an intended instrument for added flexibility in copyrightability, has become an unworkable standard under modern copyright law. The last twenty-five years have witnessed a dramatic expansion in creative media. Developments in both digital media and contemporary art have challenged what it means to be fixed, and cases dealing with these works reveal how inapposite current interpretations of fixation are for these forms of expression. Yet, getting fixation “right” is important, for it is often the juridical threshold over which idea becomes expression. Thus, we must enable fixation to help define the parameters of creative expression while …