Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 138

Full-Text Articles in Intellectual Property Law

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren Jan 2016

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren

UIC John Marshall Journal of Information Technology & Privacy Law

In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and …


Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter Jan 2014

Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jan 2012

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer Jan 2010

Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer

UIC John Marshall Journal of Information Technology & Privacy Law

This paper will discuss how a private company running a single, nationwide database for filing financing agreements can ease the burden on creditors and pave the way for more creditors to enter this market. Part two offers a brief overview of how intellectual property securitization works and some of the impediments to using this type of securitization. Part three proposes a possible solution to the problem creditors face regarding the filing of a financing statement when attempting to securitize intellectual property, and provides an in depth analysis as to why the suggestion that a private company runs a single, nationwide …


The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan Jan 2010

The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan

UIC John Marshall Journal of Information Technology & Privacy Law

While there is a growing body of literature dealing with the General Public License (“GPL”), the potential viral effects of the GPL do not appear to have been analyzed in a detailed technical manner. This paper will attempt to demonstrate that a proper legal analysis of the viral effects of the GPL is dependent on a detailed technical understanding of the specific mechanisms used for each type of program-to-program interaction. Once these technical mechanisms are properly understood it will then be possible to identify the applicable copyright law needed to assess the viral effects of the GPL.


300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin Jan 2010

300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin

UIC John Marshall Journal of Information Technology & Privacy Law

2010 sees the three hundredth anniversary of the U.K.'s Statute of Anne 1710. This paper suggests that with the increased ability of content recipients to re-use works, there is a need to readdress the concerns of stakeholders, namely authors, publishers and content recipients. The paper sets out in detail how this should be achieved. To do so, it utilises the notion of creativity as the benchmark by which to balance the interests of stakeholders. This has been used in early eighteenth century case law in the U.K., and there are also other historical and theoretical justifications. The paper then proceeds …


Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener Jan 2010

Safeguarding "The Precious": Counsel On Law Journal Publication Agreements In Digital Times, 28 J. Marshall J. Computer & Info. L. 217 (2010), Michael N. Widener

UIC John Marshall Journal of Information Technology & Privacy Law

Heaping scholarship fills the academic print and online press about where legal scholars should publish and how to have one’s paper accepted for publication. But there is scarce writing about the contractual relationship between the law journal and the author of an accepted paper. This may be due in part to broadly misconstrued or ignored publication agrees, or perhaps that the business relationship is unworthy of scholarly attention. Regardless, this paper introduces a pragmatist’s perspective on evaluating and revising publication agreements, and informs student editors how publication agreements accomplish a journal’s objectives, based on current copyright law. Finally, this paper …


Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz Jan 2009

Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz

UIC John Marshall Journal of Information Technology & Privacy Law

Unlike traditional markets, Information Technology (“IT”) markets are characterized by special and unique features that shall be discussed in this paper. Competition in IT markets is dynamic; nonmarket based information production models (‘peer production’) play a significant role in IT markets; and IT market are usually data market rather than product market. The combination of the legal rule prohibiting circumvention of technological measure under the DMCA and the use of DRMs, created a new regime, the DRM/DMCA regime, which bestows the entertainment industry with a new and strong right to control the access to and use of the copyrighted work. …


Potential Pitfalls In High-Tech Copyright Litigation, 25 J. Marshall J. Computer & Info. L. 513 (2008), Peter J. Shurn Iii Jan 2008

Potential Pitfalls In High-Tech Copyright Litigation, 25 J. Marshall J. Computer & Info. L. 513 (2008), Peter J. Shurn Iii

UIC John Marshall Journal of Information Technology & Privacy Law

Alleging software and data-base infringement is probably the most common offensive strategy currently seen in high-tech copyright litigation. In the context of a hypothetical factual setting, this article explores three potential pitfalls attendant to such a strategy, and suggests ways to minimize those risks.


Convergence And Incongruence: Trademark Law And Icann's Introduction Of New Generic Top-Level Domains, 25 J. Marshall J. Computer & Info. L. 625 (2008), Christine Haight Farley Jan 2008

Convergence And Incongruence: Trademark Law And Icann's Introduction Of New Generic Top-Level Domains, 25 J. Marshall J. Computer & Info. L. 625 (2008), Christine Haight Farley

UIC John Marshall Journal of Information Technology & Privacy Law

The author demonstrates how problematic the convergences between Internet technology, the demands of a burgeoning e-market, and trademark laws have created a myriad of issues in international governance of domain names. While the Internet Corporation for Assigned Names and Numbers (“ICANN”) has been tasked with resolving some of the most problematic information ownership issues in e-commerce, she demonstrates that current changes in domain name registries ignore the real world problems posed by these convergences.


Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross Jan 2008

Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross

UIC John Marshall Journal of Information Technology & Privacy Law

This article discusses the process of innovation and releasing so-called negative information to help others in the process to innovate. The article focuses on patent law and asks the questions: Why do people innovate? Does the legal system really reflect how the process of innovation actually occurs?


The Supreme Court's Trademark Jurisprudence: Categorical Divergence In The Interest Of Information Convergence, 25 J. Marshall J. Computer & Info. L. 635 (2008), Sheldon Halpern Jan 2008

The Supreme Court's Trademark Jurisprudence: Categorical Divergence In The Interest Of Information Convergence, 25 J. Marshall J. Computer & Info. L. 635 (2008), Sheldon Halpern

UIC John Marshall Journal of Information Technology & Privacy Law

The author shows that convergence has placed trademark law in the center of some of the hard-fought battles over information ownership in intellectual property. From fights over moral rights, to collisions with patents, trademarks in the new technological age have raised questions that he suggests might be better analyzed if the associative nature of trademarks were recognized and applied.


Access To Computer Programs Under The Dmca, 25 J. Marshall J. Computer & Info. L. 641 (2008), Dennis S. Karjala Jan 2008

Access To Computer Programs Under The Dmca, 25 J. Marshall J. Computer & Info. L. 641 (2008), Dennis S. Karjala

UIC John Marshall Journal of Information Technology & Privacy Law

The author explores the convergences between technology and information in the critical area of computer programs and the DMCA. Examining recent attempts to raise protected access control measures under the DMCA to non-communication related content, he demonstrates that not all fears of unlimited expansion of copyright are justified. To the contrary, courts are showing a remarkable sensitivity to the problem.


When Worlds Collide: The Uneasy Convergence Of Creativity And Innovation, 25 J. Marshall J. Computer & Info. L. 653 (2008), Doris E. Long Jan 2008

When Worlds Collide: The Uneasy Convergence Of Creativity And Innovation, 25 J. Marshall J. Computer & Info. L. 653 (2008), Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

The author contends that in the area of computer software protection convergence has resulted in confusion in the goals of copyright and patent laws to the detriment of both. By confusing “innovation” with “creativity,” she contends that copyright protection has been strained by its efforts to fit the demands of functional code within its expressive protection goals. She concludes by suggesting that we go “back to the future” to resurrect an international sui generis system for software and allow both copyright and patent to go back to their original, and distinctly different, policy goals.


Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer Jan 2007

Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer

UIC John Marshall Journal of Information Technology & Privacy Law

Application Service Providing ("ASP"), where a vendor hosts a software application on her server and grants customers access to the application over a network -- without the software application itself being installed on the user’s computer -- is used by many, e.g. in the form of Web based e-mail services, and grows ever more important. This article argues that although ASP mainly raises questions (i) that come up in the context of traditional use of computer programs; or (ii) that have been addressed in the context of online use of works other than software, ASP has significantly different copyright implications …


Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana Jan 2007

Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier Jan 2006

The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier

UIC John Marshall Journal of Information Technology & Privacy Law

Spatial data and applications play an ever-increasing part in our economy and in our society in general, but the protection of spatial databases by intellectual property rights seems to be a challenge because the Internet and information technology have caused a considerable increase in the copying of data, maps, route descriptions, hiking trails, etc. The illegal copying of spatial data, however, has caused the data producers to turn to several means of protection, such as intellectual property legislation, unfair competition, confidentiality and privacy. This paper begins by determining what is meant by spatial data. Thereafter, the paper reflects on the …


The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos Jan 2006

The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo Jan 2006

Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra Jan 2006

Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer Jan 2005

Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer

UIC John Marshall Journal of Information Technology & Privacy Law

Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …


"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long Jan 2005

"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to …


Is The Acpa A Safe Haven For Trademark Infringers? - Rethinking The Unilateral Application Of The Lanham Act, 22 J. Marshall J. Computer & Info. L. 655 (2004), Jinku Hwang Jan 2004

Is The Acpa A Safe Haven For Trademark Infringers? - Rethinking The Unilateral Application Of The Lanham Act, 22 J. Marshall J. Computer & Info. L. 655 (2004), Jinku Hwang

UIC John Marshall Journal of Information Technology & Privacy Law

The Anticybersquatting Consumer Protection Act (ACPA) was enacted in 1999 as a response to international disputes over Internet domain names because according to the Congress’ point of view, courts could not successfully protected American businesses in cases where nothing more that the registration of a trademark or its variation in a domain name had occurred. This article analyzes recent court decisions regarding domain name disputes after the enactment of ACPA focusing on reverse domain name hijacking in international, trademark related and gTLD disputes. The author argues that the in rem jurisdiction provided by the ACPA and the consequent extraterritorial effect …


Trade Secret Reclamation: An Equitable Approach In A Relative World, 21 J. Marshall J. Computer & Info. L. 227 (2003), William L. O'Brien Jan 2003

Trade Secret Reclamation: An Equitable Approach In A Relative World, 21 J. Marshall J. Computer & Info. L. 227 (2003), William L. O'Brien

UIC John Marshall Journal of Information Technology & Privacy Law

The only possible IP protection is a trade secret. However, trade secrets are inadvertently disclosed in investment disclosures or to prospective customers. The article offers a solution to this dilemma by creating emphasis on the continued retention of the secret, even though confidentiality of it could have been dissipating.


Alcatel Usa, Inc. V. Brown: Does Your Boss Own Your Brain?, 21 J. Marshall J. Computer & Info. L. 295 (2003), Jim C. Lai Jan 2003

Alcatel Usa, Inc. V. Brown: Does Your Boss Own Your Brain?, 21 J. Marshall J. Computer & Info. L. 295 (2003), Jim C. Lai

UIC John Marshall Journal of Information Technology & Privacy Law

Critizing the Alcatel USA, Inc. v. Brown court’s holding that a company owned rights to a software idea that existed entirely in the thoughts of one of it’s former employee’s. Discusses how the court did not take into account that (1) the invention disclosure agreement it secured from the employer was unenforceable, (2) the Solution was not an “invention” as recognized by U.S. intellectual property law, and (3) the development of an automatic decompiler was not within the scope of the company’s business or employee’s work. Arguing while it is reasonable for an employer to require its employees to disclose …


Curbing Copyright Infringement In Cyberspace: Using Mediakey To Stop The Bleeding, 21 J. Marshall J. Computer & Info. L. 325 (2003), John R. Perkins Jr. Jan 2003

Curbing Copyright Infringement In Cyberspace: Using Mediakey To Stop The Bleeding, 21 J. Marshall J. Computer & Info. L. 325 (2003), John R. Perkins Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

This article discusses a solution to copyright infringement on the Internet. The solution combines legal and technical aspects so the solution is very specific but also practical. The paper proposes a solution to use technological protection similar to that found in the federal statute prohibiting circumvention of technological protection measures. The paper then concludes with how difficult his solution and other proposed changes will be to enact because of opposition it will receive from many sides.


Locked Out: The New Hazards Of Reverse Engineering, 21 J. Marshall J. Computer & Info. L. 601 (2003), Carla Meninsky Jan 2003

Locked Out: The New Hazards Of Reverse Engineering, 21 J. Marshall J. Computer & Info. L. 601 (2003), Carla Meninsky

UIC John Marshall Journal of Information Technology & Privacy Law

In this article, Meninsky contends the technological practice of reverse engineering of replacements parts and other interoperable products, which has been used to circumvent digital locks and otherwise gain access to copyrighted material and information protected as trade secrets, has been upheld by courts as fair use. This practice is discussed within the context of the Digital Millenium Copyright Act (“DMCA”), which prohibits methods employed to “circumvent a technological measure that effectively controls access to a copyrighted work” while providing a limited exemption for reverse engineers in certain circumstances. Meninsky finds that the DMCA, in effect, thwarts competition, stunts technological …