Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Selected Works

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 294

Full-Text Articles in Intellectual Property Law

The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris Apr 2015

The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris

Emily Michiko Morris

Once the stuff of science fiction, nanotechnology is now expected to be the next technological revolution, but despite millions of dollars of investment, we still have yet to see the brave new world of cheap energy, cell-specific drug delivery systems, and self-replicating nanobots that nanotechnology promises. Instead, nanotechnology seems to be in a holding pattern, perpetually stuck in the status of “emerging science,” “immature field,” and “new technology” for over three decades now. Why? Professor Mark Lemley and a number of others have suggested that the answer to this puzzling question is simple: nanotechnology differs from the all of the …


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Apr 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Julian Dibbell

When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …


Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter Mar 2015

Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter

Megan M Carpenter

This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …


Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele Feb 2015

Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele

Layne S. Keele

In Apple, Inc. v. Motorola, Inc., 757 F.3d 1286 (Fed. Cir. 2014), the four federal judges who considered the case—Judge Posner by designation at the trial level, and three Federal Circuit judges on appeal—all expressed differing opinions on the question of whether and to what extent extraordinary patent remedies should be available for the infringement of standard-essential patents. This article aims to simplify this muddled and confusing topic.

The article employs a teleological approach, examining the purposes behind remedies in general, the purposes of extraordinary remedies in patent law, and the purposes of RAND commitments (commitments to license standard-essential …


Bowman V. Monsanto: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman Feb 2015

Bowman V. Monsanto: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman

Christopher M Holman

The inherent tendency of patented seeds to self-replicate has led to fears that farmers might face liability for inadvertent patent infringement. To address the perceived problem, some have proposed severely limiting the availability of effective patent protection for self-replicating technologies, for example by denying patent rights to “second generation” self-replicating products, or even by broadly declaring such technologies ineligible for patent protection. The fact is, lawsuits against inadvertently infringing farmers remain of largely hypothetical concern. However, changes in the market could soon render such lawsuits a reality. In addressing the resulting policy concerns, the courts and/or Congress have at their …


Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort Jan 2015

Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort

Scott Shackelford

According to Frank Montoya, the U.S. National Counterintelligence Chief, “We’re an information-based society now. Information is everything. That makes . . . company executives, the front line – not the support mechanism, the front line – in [determining] what comes.”[1] Chief Montoya’s remarks underscore the central role played by the private sector in ongoing efforts aimed at enhancing cybersecurity, much like the increasingly vital role firms are playing in fostering sustainability. For example, according to Accenture surveys, the number of managers who consider sustainability to be critical to the future success of their organizations jumped from fifty to more …


Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler Jan 2015

Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler

Brandon C. Butler

The Supreme Court has said that copyright’s fair use doctrine is a “First Amendment safety valve” because it ensures that certain crucial cultural activities are not unduly burdened by copyright. While many such activities (criticism, commentary, parody) have benefited from the courts’ increased attention to first amendment values, one such activity, education, has been mired for years in a minimalist, market-based vision of fair use that is largely out of touch with mainstream fair use jurisprudence. The latest installment in the history of educational fair use, the 11th Circuit’s opinion in the Georgia State e-reserves case, may be the last …


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh Jan 2015

The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh

Kavid Singh

Bitcoin is the most popular online decentralized currency in the world. Created by an enigmatic figure, Satoshi Nakamoto, in 2009, its propagation and use has caused heated controversy. On the legal side of its use, businesses both large and small have started to accept bitcoins as a form of payment. On the illegal side of its use, large quantities of bitcoins worth hundreds of millions of dollars have been stolen from businesses and large Bitcoin currency exchanges. The aim of this article is to introduce workable federal regulation that will help deter money laundering, a pervasive problem in the world …


Cases For Lecture 3; Trademarks, Macerata 17 March 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 3; Trademarks, Macerata 17 March 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Cases For Lecture 4 - Copyright In Cyberspace, Macerata, 8 April 2015, Ulf Maunsbach Dec 2014

Cases For Lecture 4 - Copyright In Cyberspace, Macerata, 8 April 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss Dec 2014

Introduction À Quelques Aspects Du Droit Américain, W. Gregory Voss

W. Gregory Voss

This is an introduction (in French) to my contributions on U.S. law for the workshop -- "Les défis du numérique dans l'entreprise en Europe" ("The Challenges of Digital Technologies in Europe") held at the Toulouse Business School on February 27, 2015. One of my contributions, which is unpublished -- "Les conditions générales d’utilisation des sites web soumis au droit américain et quelques protections pour les consommateurs" -- is available on this website. Another -- "Les données personnelles dans l'entreprise vues au travers du prisme du droit américain" -- was published in the October 2015 issue of the Revue Lamy Droit …


Copyright Porn Trolls, Wasting Taxi Medallions, And The Propriety Of ‘Property’, Tom W. Bell Dec 2014

Copyright Porn Trolls, Wasting Taxi Medallions, And The Propriety Of ‘Property’, Tom W. Bell

Tom W. Bell

What happens when the government creates privileges that have powers rivaling those that the common law accords to property? Recent events in two seemingly unrelated areas suggest a troubling answer to that question. First, in copyright, porn trolls have sued thousands of John Does for allegedly participating in illegal file sharing. These suits evidently seek not judicial vindication but merely the defendants' identities, which the plaintiffs then use to reap settlement payments from guilty and innocent alike. Second, taxi drivers in cities across the world have launched legal, political, and physical attacks against Uber and other networked transportation services, accusing …


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Teoría General De Los Signos Distintivos, Juan Carlos Riofrío Martínez-Villalba Oct 2014

Teoría General De Los Signos Distintivos, Juan Carlos Riofrío Martínez-Villalba

Juan Carlos Riofrío Martínez-Villalba

La presente investigación delinea de forma sistemática una teoría general para todo género de signos distintivos. Para este propósito se vale de las investigaciones parciales que la propiedad industrial y otras ramas del derecho han realizado de algunos signos distintivos particulares, como las marcas, las indicaciones geográficas, los sellos de calidad, los nombres de pila, los nombres comerciales, entre otros. Se usa un método inductivo que recoge leyes, jurisprudencia y doctrina de varios lugares del mundo. En cuanto a la estructura, luego de una introducción, se determinar cuál es el conjunto de los signos distintivos que será el universo a …


One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood Sep 2014

One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood

Jonathan R. K. Stroud

Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …


Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart Aug 2014

Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart

Rebecca K Stewart

Ever since the U.S. Patent and Trademark Office began issuing utility patents for plants, the United States has sat squarely on the frontlines of what have come to be known as the “seed wars.” In the last two decades, the majority of battles in the U.S. seed wars have been waged in the form of patent infringement lawsuits. Typically these suits are filed by biotechnology corporations such as Monsanto against farmers accused of saving and planting patented seed that self-replicates to produce progeny embodying—and thus infringing—the biotech corporations’ patented inventions.

Yet in recent years, the seed wars have begun to …


The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden Aug 2014

The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden

Rob Frieden

This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller Aug 2014

Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller

Benjamin Miller

Abstract In F.T.C. v. Actavis, Inc. the Supreme Court resolved a circuit split regarding the proper evaluation of reverse payment settlements under federal antitrust law, holding that they must be evaluated under a rule of reason analysis. However, the Court simultaneously created significant uncertainty by declaring that the lower courts were responsible for structuring the analysis. While a few cases are currently in the pre-trial phase, the only decisions relating to reverse payments since Actavis have been rulings on pre-trial motions—there have been no decisions on the merits. Given the intricate intersection between antitrust and intellectual property principles in these …


Reforming Copyright Interpretation, Zahr K. Said Aug 2014

Reforming Copyright Interpretation, Zahr K. Said

Zahr K Said

This Article argues that copyright law needs to acknowledge and reform its interpretive choice regime. Even though judges face potentially outcome-determinative choices among competing sources of interpretive authority when they adjudicate copyrightable works, their selection of interpretive methods has been almost entirely overlooked by scholars and judges alike. This selection among competing interpretive methods demands that judges choose where to locate their own authority: in the work itself; in the context around the work, including its reception, or in the author’s intentions; in expert opinions; or in judicial intuition. Copyright’s interpretive choice regime controls questions of major importance for the …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


The Next Great Youtube: Improving Content Id To Foster Creativity, Cooperation, And Fair Compensation, Benjamin Boroughf Apr 2014

The Next Great Youtube: Improving Content Id To Foster Creativity, Cooperation, And Fair Compensation, Benjamin Boroughf

Benjamin Boroughf

YouTube prides itself on its automatic copyright detection and filtering program known as Content ID because it goes beyond YouTube’s legal responsibilities under the Digital Millennium Copyright Act and because it allows copyright holders to control and profit from their content. However, Content ID is not the technological paragon YouTube and some scholars see it as. By relying on a system that automatically matches, blocks, and monetizes videos that allegedly contain any amount of infringing content, both YouTube and copyright holders have promoted a system that opposes the Copyright Act and YouTube’s goals of promoting creativity and protecting fair use. …


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank Pasquale

Frank A. Pasquale

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman Mar 2014

Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman

Bill D. Herman

With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …