Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 34

Full-Text Articles in Internet Law

Blockchain And Smart Contract For Peer-To-Peer Energy Trading Platform: Legal Obstacles And Regulatory Solutions, 19 Uic Rev. Intell. Prop. L. 285 (2020), Joseph Lee, Vere Marie Khan Jan 2020

Blockchain And Smart Contract For Peer-To-Peer Energy Trading Platform: Legal Obstacles And Regulatory Solutions, 19 Uic Rev. Intell. Prop. L. 285 (2020), Joseph Lee, Vere Marie Khan

UIC Review of Intellectual Property Law

This paper discusses the implications of smart contracts in energy trading for the protection of consumer and individual rights. It examines the legal risks and regulatory solutions for a peer-to-peer energy trading platform (P2P-ETP) in creating a sustainable energy ecosystem. Part I discusses the conceptual framework of P2PETP, which enables consumers to become energy ‘producers' and traders. Smart technologies—smart contracts, smart meters, and distributed ledger technology (DLT) platforms, are the main components of this platform. The study examines the legal basis for these components. Part II analyzes the legal uncertainty of the smart contract, such as its enforceability, and the …


Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi Jan 2017

Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi

UIC Review of Intellectual Property Law

The prevalence of ad blocking software (software that prevents the loading of web based advertisements) is a growing problem for website owners and content creators who rely on advertising revenue to earn money. While the number of ad block users continues to increase, there has thus far been no significant legal challenge to ad blocking in the United States. This comment examines how a website owner, through a combination of technological improvements and the anti-circumvention provisions of the Digital Millennium Copyright Act, could successfully raise a legal challenge against the purveyors of ad blocking software.


Commercial Creations: The Role Of End User License Agreements In Controlling The Exploitation Of User Generated Content, 16 J. Marshall Rev. Intell. Prop. L. 382 (2017), Neha Ahuja Jan 2017

Commercial Creations: The Role Of End User License Agreements In Controlling The Exploitation Of User Generated Content, 16 J. Marshall Rev. Intell. Prop. L. 382 (2017), Neha Ahuja

UIC Review of Intellectual Property Law

This article considers the current licensing regime used to control the exploitation of copyright protected works within the online interactive entertainment sector—particularly virtual worlds including multiplayer online games—to further author new copyrightable works. This article aims to identify the gaps that have arisen on account of the nature of these subsequently authored works and the potential for their exploitation under the said licensing regime. Users and the proprietors of virtual worlds often end up in conflict over the monetization and commercialization of user generated content on account of contradictory yet overlapping rights created by copyright law when controlled by contract …


Apis And Copyright Protection: The Potential Impact On Software Compatibility In The Programming Industry, 16 J. Marshall Rev. Intell. Prop. L. 153 (2016), Daria Vasilescu-Palermo Jan 2016

Apis And Copyright Protection: The Potential Impact On Software Compatibility In The Programming Industry, 16 J. Marshall Rev. Intell. Prop. L. 153 (2016), Daria Vasilescu-Palermo

UIC Review of Intellectual Property Law

In Oracle v. Google, the Federal Circuit set precedent when it decided to grant copyright protection to APIs. This comment examines the potential impact the computer programming industry will face now that APIs are deemed copyrightable. This comment also discusses Google s success in using fair use as an affirmative defense in order to use copyrightable APIs and what that means for the rest of the computer programming industry. Due to the fast-paced and ever-changing world of technology, this comment also proposes that the abstract-filtration-comparison test is the appropriate test to be used in determining API copyrightability if the issue …


Did Copyright Kill The Radio Star? Why The Recorded Music Industry And Copyright Act Should Welcome Webcasters Into The Fold, 14 J. Marshall Rev. Intell. Prop. L. 292 (2015), Patrick Koncel Jan 2015

Did Copyright Kill The Radio Star? Why The Recorded Music Industry And Copyright Act Should Welcome Webcasters Into The Fold, 14 J. Marshall Rev. Intell. Prop. L. 292 (2015), Patrick Koncel

UIC Review of Intellectual Property Law

The Copyright Act has not kept pace with the times, and the next revolution is going full stream ahead. Rather than adapt, entrenched interests at the Copyright table push for more protection, while new technologies are demonized and underrepresented. The resulting Copyright Act’s provisions relating to internet-based radio, ranging from passive over-the-air broadcasts to fully interactive music hosting sites, are a patchwork of accommodations and concessions to these interests. For all non-interactive services, licensing music typically occurs within the Copyright Act’s compulsory licensing system. For interactive webcasters, licensing negotiations take place with the copyright holders directly. These negotiations have proven …


The Great Decentralization: How Web 3.0 Will Weaken Copyrights, 15 J. Marshall Rev. Intell. Prop. L. 136 (2015), Nick Vogel Jan 2015

The Great Decentralization: How Web 3.0 Will Weaken Copyrights, 15 J. Marshall Rev. Intell. Prop. L. 136 (2015), Nick Vogel

UIC Review of Intellectual Property Law

Bitcoin’s popularity increased as its value increased and people became excited about the prospect of a trustless, decentralized currency that could be used on the Internet. Within the last two years, however, people and organizations began exploiting the potential of the block chain that powers the bitcoin network. These people realized that the block chain—a transparent public ledger that cannot be altered—can be used for more than digital currency. One such organization calls itself Ethereum and its developers plan to use block chains to allow decentralized autonomous applications to operate free of government censorship or corruption. While such a network …


Inventing A New Way Of Dealing With Circumvention: A Patent-Based Alternative To The Dmca, 15 J. Marshall Rev. Intell. Prop. L. 91 (2015), Priya Desai Jan 2015

Inventing A New Way Of Dealing With Circumvention: A Patent-Based Alternative To The Dmca, 15 J. Marshall Rev. Intell. Prop. L. 91 (2015), Priya Desai

UIC Review of Intellectual Property Law

Over time, it has become easier for consumers to steal music. Some technologies, like ReDigi, have been specifically designed to allow copyright infringement by giving consumers the ability to sell digitally purchased music files. While copyright laws have been updated to deal with changing technologies, the laws have not been sufficient to keep up. This comment highlights the failings of modern copyright law and questions whether patent laws are a viable way to ensure that technologies that induce copyright infringement do not find marketplace success.


The Conflict Between An Athlete’S Right Of Publicity And The First Amendment, 15 J. Marshall Rev. Intell. Prop. L. 117 (2015), Edward Kuester Jan 2015

The Conflict Between An Athlete’S Right Of Publicity And The First Amendment, 15 J. Marshall Rev. Intell. Prop. L. 117 (2015), Edward Kuester

UIC Review of Intellectual Property Law

The recent rise of fantasy sports has created a conflict between an athlete’s right of publicity and the First Amendment of the Constitution. The legal question being discussed is whether athletes have a right of publicity in their identity, specifically their performance statistics and biographical information. If a right of publicity violation does exist, courts will have to determine whether a fantasy provider’s First Amendment privilege can prevail against an athlete’s publicity rights. This comment examines recent litigation surrounding athletes’ identities and the problems courts have in balancing the conflict between an athlete’s right of publicity and the First Amendment. …


Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot Jan 2014

Navigating Cybersquatting Enforcement In The Expanding Internet, 13 J. Marshall Rev. Intell. Prop. L. 321 (2014), Jordan A. Arnot

UIC Review of Intellectual Property Law

It has always been a considerable task to police something as vast at the Internet for trademark violations and abuse. As the Internet develops with the ongoing launch of hundreds of new generic Top-Level Domains, so does the host of enforcement options available to those seeking to protect the value of trademarks and other intellectual property. This article outlines seven criteria to consider when selecting a remedy, or combination of remedies. The traditional cease and desist letter is still a viable and effective option, and so, of course, is litigation. These tools were greatly enhanced in 1999 when the Internet …


Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante Jan 2014

Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante

UIC Review of Intellectual Property Law

On February 28, 2014, the Register of Copyrights of the United States and Director of the U.S. Copyright Office Maria A. Pallante delivered a keynote speech on the copyright hearings and related discourse in the nation’s capital. The speech was given at The John Marshall Law School’s 58th Annual Intellectual Property Conference. This article is based on her speech at the Conference.


Aerevolution: Why We Should, Briefly, Embrace Unlicensed Online Streaming Of Retransmitted Broadcast Television Content, 13 J. Marshall Rev. Intell. Prop. L. 577 (2014), Bradley Ryba Jan 2014

Aerevolution: Why We Should, Briefly, Embrace Unlicensed Online Streaming Of Retransmitted Broadcast Television Content, 13 J. Marshall Rev. Intell. Prop. L. 577 (2014), Bradley Ryba

UIC Review of Intellectual Property Law

The United States has long recognized broadcast television programming’s importance to the public’s information and entertainment needs. Accordingly, Congress has historically offered strong copyright protections for broadcast television networks. Those strong protections allowed broadcast networks to withstand business threats from innovations like cable television and VCRs. However, Congress’ recent silence on DVRs and cloud computing technology has allowed an entrepreneur to create the networks’ next biggest threat, Aereo. The creators of Aereo and similar businesses designed their services specifically around ambiguities within copyright law that could allow them to transmit networks’ content without paying the otherwise necessary consent fees. These …


Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte Jan 2013

Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte

UIC Review of Intellectual Property Law

Technology provides consumers with new ways to avoid advertisements, such as fast forwarding through TV commercials and using filtering software to block pop-up ads. Accordingly brand sponsors and their advertising marketing firms have sought alternative methods to pierce through consumer resistance to ads. Social media offers an optimal platform to reach millions of consumers on a nearly daily basis who interact and often rely heavily on the reviews and rankings of fellow consumers. However, many of today’s branding campaigns now mask sponsored ads as ordinary consumer reviews or “Like” and “Don’t Like” responses to a service or product. Unbeknownst to …


The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray Jan 2013

The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray

UIC Review of Intellectual Property Law

The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …


How The Internet Has Removed The Historical Rationale For "Non-Analogous Arts", 13 J. Marshall Rev. Intell. Prop. L. 68 (2013), Hal Milton Jan 2013

How The Internet Has Removed The Historical Rationale For "Non-Analogous Arts", 13 J. Marshall Rev. Intell. Prop. L. 68 (2013), Hal Milton

UIC Review of Intellectual Property Law

The growth of the Internet has affected countless aspects of daily life, including the patent system. Internet-based legal research has grown considerably, given the convenience of general search agents such as Google, legally-focused search agents such as Westlaw and Lexis, and patent-focused search agents such as the PAIR system of the United States Patent and Trademark Office. These legal research tools have not only made it easier to find prior art, they have also expanded the volume of information that is available to one of ordinary skill in the art. Consequently, the traditional rules of so-called “analogous arts” are changing. …


Copyright Trolls, Defining The Line Between Legal Ransom Letters And Defending Digital Rights: Turning Piracy Into A Business Model Or Protecting Creative From Internet Lawlessness?, 13 J. Marshall Rev. Intell. Prop. L. 170 (2013), Luke S. Curran Jan 2013

Copyright Trolls, Defining The Line Between Legal Ransom Letters And Defending Digital Rights: Turning Piracy Into A Business Model Or Protecting Creative From Internet Lawlessness?, 13 J. Marshall Rev. Intell. Prop. L. 170 (2013), Luke S. Curran

UIC Review of Intellectual Property Law

The scarlet letter of the term “troll” has long been affixed to the lapel of businesses within the patent context. This pejorative term, however, has had little relevance or widespread public recognition within the domain of copyright law until 2010. Since the awakening of the “copyright troll,” several non-author rights holders have recently adopted and propagated a substantially modified version of this sue-to-settle paradigm within the context of copyright law while introducing it to the scale of mass-litigation. Further, the amorphous term “copyright troll” traditionally characterizes a business practice of acquiring unenforced copyrights that are being infringed upon through various …


Memetic Theory, Trademarks & The Viral Meme Mark, 13 J. Marshall Rev. Intell. Prop. L. 96 (2013), Shontavia Jackson Johnson Jan 2013

Memetic Theory, Trademarks & The Viral Meme Mark, 13 J. Marshall Rev. Intell. Prop. L. 96 (2013), Shontavia Jackson Johnson

UIC Review of Intellectual Property Law

This Article proposes that memetic theory is a useful lens through which to view trademarks, particularly as there has been a rise in the number of applications for culturally-driven words and catchphrases in the United States Patent and Trademark Office. Memetic theory, or memetics, is a scientific field related to how units of information evolve and replicate. These units of information, called memes, undergo a process of natural selection comparable to that of genes. To survive as trademarks, memes must not only exist in the proper form, but they must also subsist in an environment where replication, variation, and selection …


Fostering Web 2.0 Innovation: The Role Of The Judicial Interpretation Of The Dmca Safe Harbor, Secondary Liability And Fair Use, 12 J. Marshall Rev. Intell. Prop. L. 70 (2012), Susanna Monseau Jan 2012

Fostering Web 2.0 Innovation: The Role Of The Judicial Interpretation Of The Dmca Safe Harbor, Secondary Liability And Fair Use, 12 J. Marshall Rev. Intell. Prop. L. 70 (2012), Susanna Monseau

UIC Review of Intellectual Property Law

Web 2.0 has generated a surplus of creativity, encouraging innovation of new technologies and further creative expansion of the internet. Social media platforms have demonstrated a significant growth during this time and have been used to create and disseminate a wealth of information and cultural material. While it is important that copyright owners receive legal protection of the content they create, it is necessary not to simultaneously stifle the creativity of end-users. Copyright owners have more power in bargaining for their rights, and their rights are well established through statutory protections. However, internet innovators and end-users, who may have a …


The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes Jan 2012

The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes

UIC Review of Intellectual Property Law

Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …


Hotfile, Megaupload, And The Future Of Copyright On The Internet: What Can Cyberlockers Tell Us About Dmca Reform?, 12 J. Marshall Rev. Intell. Prop. L. 205 (2012), Ross Drath Jan 2012

Hotfile, Megaupload, And The Future Of Copyright On The Internet: What Can Cyberlockers Tell Us About Dmca Reform?, 12 J. Marshall Rev. Intell. Prop. L. 205 (2012), Ross Drath

UIC Review of Intellectual Property Law

More than a decade ago, Napster brought the issue of copyright infringement by file-sharing to the center of the public stage. How would a body of copyright law built to regulate tangible objects apply in the digital realm? The safe harbor provisions of the Digital Millennium Copyright Act, intended as a compromise between the interests of copyright owners and webhosts, have instead introduced legal uncertainty and allocated the costs of online enforcement both inefficiently and disproportionately. While Napster and several other major peer-to-peer services have been shuttered in the intervening period, the scope of online copyright infringement continues to grow …


Cybersex: Protecting Sexual Content In The Digital Age, 11 J. Marshall Rev. Intell. Prop. L. 815 (2012), Nicole Chaney Jan 2012

Cybersex: Protecting Sexual Content In The Digital Age, 11 J. Marshall Rev. Intell. Prop. L. 815 (2012), Nicole Chaney

UIC Review of Intellectual Property Law

Advertisers employ bare-skinned models and sex appeal to seduce American consumers with every magazine, billboard, and television advertisement. The ubiquity of sexual gratification has reached a tangible quality in American culture, but sex is still somehow taboo in our legal system. Despite the vast market for online adult entertainment, obscenity laws have been used to strike down claims for adult content copyright owners. These content owners are producing creative sexual expression for the public benefit, but they are being denied the same economic incentives granted to their mainstream counterparts. Ironically, Playboy Co. is an outlier in the adult entertainment industry …


Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman Jan 2011

Right Of Publicity: Is Behavioral Targeting Violating The Right To Control Your Identity Online?, 10 J. Marshall Rev. Intell. Prop. L. 811 (2011), Andrea Stein Fuelleman

UIC Review of Intellectual Property Law

Behavioral targeting (“BT”) is an advertising technique that receives a great deal of attention due in part to the balkanized self-regulatory policies that address consumer protection issues. The majority of the self-regulation policies, including the BT principles proposed by the Federal Trade Commission (“FTC”) focus on privacy issues but fail to discuss the impact BT may have on the right to control the commercial use of one’s identity. In discussing the right of publicity, many legal scholars agree that everyone has a right to control the commercial use of his or her identity, regardless of his or her status as …


Trademarks, Identity, And Justice, 11 J. Marshall Rev. Intell. Prop. L. 133 (2011), Rita Heimes Jan 2011

Trademarks, Identity, And Justice, 11 J. Marshall Rev. Intell. Prop. L. 133 (2011), Rita Heimes

UIC Review of Intellectual Property Law

Intellectual property scholars have written extensively against expanding the scope of intellectual property laws, using social justice and distributive justice principles to support their arguments. A typical argument attacks broad adoption and enforcement of copyright laws that prevent access to information and therefore knowledge, or broad patent protection that reduces access to medicines and other important technologies. In recent years, a few scholars have begun to suggest that certain areas of intellectual property law—primarily copyright—may play a positive role in social justice. These arguments are founded on views of social and distributive justice that consider personal empowerment and freedom to …


Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas Jan 2011

Fifteen Years Of Fame: The Declining Relevance Of Domain Names In The Enduring Conflict Between Trademark And Free Speech Rights, 11 J. Marshall Rev. Intell. Prop. L. 1 (2011), Jude A. Thomas

UIC Review of Intellectual Property Law

Domain name disputes have been the subject of substantial litigation, legislative action, and scholarly debate over the course of the past fifteen years. Much of the debate is the product of disagreement concerning whether trademark rights naturally extend into the domain name space and to what extent those rights are limited by principles of free speech. Gripe sites are paradigmatic examples of this debate. Society’s investment in defining these rights continues to grow, even as the relevance of domain names may be declining, due to: (1) changes in the way users locate content on the Internet; (2) the growth of …


Rights Versus Commerce: Balancing Online Trademark Policing With The Emerging Marketplace, 11 J. Marshall Rev. Intell. Prop. L. 217 (2011), Jessica L. Hilliard Jan 2011

Rights Versus Commerce: Balancing Online Trademark Policing With The Emerging Marketplace, 11 J. Marshall Rev. Intell. Prop. L. 217 (2011), Jessica L. Hilliard

UIC Review of Intellectual Property Law

In 2008, jeweler Tiffany & Co. (“Tiffany”) commenced an action against eBay after discovering that a significant amount of counterfeit Tiffany jewelry was being sold on the online auction house. Tiffany had previously used eBay’s Verified Rights Owner program to report the infringement and pursued enforcement actions against individual sellers. Nevertheless, Tiffany sued eBay for various causes of action, including contributory trademark infringement. The Second Circuit held that online service providers like eBay are not liable for contributory trademark infringement unless they have specific knowledge of particular instances of infringement. Due to the ruling, Tiffany bears the burden for policing …


Paying It Forward: The Case For A Specific Statutory Limitation On Exclusive Rights For User-Generated Content Under Copyright Law, 11 J. Marshall Rev. Intell. Prop. L. 240 (2011), Warren B. Chik Jan 2011

Paying It Forward: The Case For A Specific Statutory Limitation On Exclusive Rights For User-Generated Content Under Copyright Law, 11 J. Marshall Rev. Intell. Prop. L. 240 (2011), Warren B. Chik

UIC Review of Intellectual Property Law

This article examines user-generated content (“UGC”) and the significance of re-inventions in the context of an increasingly user-centric internet environment and an information sharing society. It will explain the need to provide a statutory limitation in the form of an exception or exemption for socially beneficial UGC on the exclusive rights under copyright law. This will also have the effect of protecting the internet intermediary that hosts and shares UGC. Nascent but abortive attempts have been made by Canada to introduce just such a provision into her copyright legislation, while some principles and rules have also emerged from various interest …


The New Ontologies: The Effect Of Copyright Protection On Public Scientific Data Sharing Using Semantic Web Ontologies, 10 J. Marshall Rev. Intell. Prop. L. 181 (2010), Andrew Clearwater Jan 2010

The New Ontologies: The Effect Of Copyright Protection On Public Scientific Data Sharing Using Semantic Web Ontologies, 10 J. Marshall Rev. Intell. Prop. L. 181 (2010), Andrew Clearwater

UIC Review of Intellectual Property Law

The semantic web is going to become an important tool for scientists who need to accurately share data given context through structured relationships. The structure that defines contextual relationships on the semantic web is known as an ontology; which is a hierarchical organization of a knowledge domain that contains entities and their relations. This paper seeks to answer whether semantic web ontologies are protectable by copyright, and regardless of the outcome, what the best practices are for the scientific community. The best practices for the scientific community should include the adoption of a machine readable ontology license which disclaims copyright …


American Exceptionalism, The French Exception, Intellectual Property Law, And Peer-To-Peer File Sharing On The Internet, 10 J. Marshall Rev. Intell. Prop. L. 95 (2010), Lyombe Eko Jan 2010

American Exceptionalism, The French Exception, Intellectual Property Law, And Peer-To-Peer File Sharing On The Internet, 10 J. Marshall Rev. Intell. Prop. L. 95 (2010), Lyombe Eko

UIC Review of Intellectual Property Law

A fundamental problem confronting policy makers is how to apply intellectual property rules and regulations developed for tangible intellectual property assets in real space to intangible,dematerialized intellectual property in cyberspace. The United States and France are self-described exceptionalist countries. American exceptionalism refers to the historical tendency of the United States to emphasize its unique status as the beacon of liberty, while l’exception française (the French exception) refers to the French ideological posture that emphasizes the specificity and superiority of French culture. American exceptionalism and l’exception française are functionally equivalent theoretical constructs that describe and explain how the United States and …


Twitter: New Challenges To Copyright Law In The Internet Age, 10 J. Marshall Rev. Intell. Prop. L. 231 (2010), Rebecca Haas Jan 2010

Twitter: New Challenges To Copyright Law In The Internet Age, 10 J. Marshall Rev. Intell. Prop. L. 231 (2010), Rebecca Haas

UIC Review of Intellectual Property Law

Twitter is part of the new wave of internet communication. It is unique because messages sent via Twitter are limited to 140 characters. Many of these messages are about mundane details of daily life, but some are creative, even literary, and may qualify for copyright protection. The problem,then, is not necessarily whether a Tweet can qualify for copyright protection, but how that protection is enforced. Current infringement policies and procedures are not designed to effectively handle copyright infringement on the internet. Internet infringement is widespread and not easy to monitor or regulate, therefore there is a need for a regulatory …


Social Networking And Blogging: The New Legal Frontier, 9 J. Marshall Rev. Intell. Prop. L. 500 (2009), Robert Newman, Liisa Thomas Jan 2009

Social Networking And Blogging: The New Legal Frontier, 9 J. Marshall Rev. Intell. Prop. L. 500 (2009), Robert Newman, Liisa Thomas

UIC Review of Intellectual Property Law

Improvements in communication technology have effectively made the world a smaller place. As businesses attempt to exploit these new technological improvements to better communicate their messages to their clients, these same improvements continue to raise new and difficult legal issues related to fair trade practices, privacy, and freedom of speech. This article identifies current legal developments related to advertising in the online world and analyzes the actions taken to resolve these new and difficult legal issues within the framework of United States federal and state law and private industry-specific self-governance.


Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu Jan 2008

Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu

UIC Review of Intellectual Property Law

Commentators have attributed China’s piracy and counterfeiting problems to the lack of political will on the part of Chinese authorities. They have also cited the many political, social, economic, cultural, judicial, and technological problems that have arisen as a result of the country’s rapid economic transformation and accession to the WTO. This provocative essay advances a third explanation. It argues that the failure to resolve piracy and counterfeiting problems in China can be partly attributed to the lack of political will on the part of U.S. policymakers and the American public to put intellectual property protection at the very top …