Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 147

Full-Text Articles in Internet Law

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller Aug 2014

Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller

Benjamin Miller

Abstract In F.T.C. v. Actavis, Inc. the Supreme Court resolved a circuit split regarding the proper evaluation of reverse payment settlements under federal antitrust law, holding that they must be evaluated under a rule of reason analysis. However, the Court simultaneously created significant uncertainty by declaring that the lower courts were responsible for structuring the analysis. While a few cases are currently in the pre-trial phase, the only decisions relating to reverse payments since Actavis have been rulings on pre-trial motions—there have been no decisions on the merits. Given the intricate intersection between antitrust and intellectual property principles in these …


Reforming Copyright Interpretation, Zahr K. Said Aug 2014

Reforming Copyright Interpretation, Zahr K. Said

Zahr K Said

This Article argues that copyright law needs to acknowledge and reform its interpretive choice regime. Even though judges face potentially outcome-determinative choices among competing sources of interpretive authority when they adjudicate copyrightable works, their selection of interpretive methods has been almost entirely overlooked by scholars and judges alike. This selection among competing interpretive methods demands that judges choose where to locate their own authority: in the work itself; in the context around the work, including its reception, or in the author’s intentions; in expert opinions; or in judicial intuition. Copyright’s interpretive choice regime controls questions of major importance for the …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman Mar 2014

Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman

Bill D. Herman

With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania Mar 2014

Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania

Tejas N. Narechania

For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.

Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …


Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz Feb 2014

Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz

Yafit Lev-Aretz

Copyright literature has been long familiar with the lack of licensing choices in various creative markets. In the absence of a lawful licensing alternatives, consumers of works as well as secondary creators wishing to use protected elements of preexisting works are often left with no choice but to either infringe on the copyright of the rightholder or refrain from the use. As further creation is regularly impeded, the dearth of licensing greatly conflicts with the utilitarian foundation of copyright and its constitutional goal to promote creative progress. Legal scholarship has submitted various recommendations in response to the licensing failure, homing …


Copyright And Inequality, Lea Shaver Feb 2014

Copyright And Inequality, Lea Shaver

Lea Shaver

The prevailing theory of copyright law imagines a marketplace efficiently serving up new works to an undifferentiated world of consumers. Yet the reality is that all consumers are not equal. The majority of the world’s people experience copyright law not as a boon to consumer choice, but as a barrier to acquiring knowledge and taking part in cultural life. The resulting patterns of privilege and disadvantage, moreover, reinforce and perpetuate preexisting social divides. Class and culture combine to explain who wins, and who loses, from copyright protection. Along the dimension of class, the insight is that just because new works …


Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr. Jan 2014

Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

The public’s interest in medicine and good health is substantial. However, this interest is harmed when important medical devices or pharmaceuticals, although infringing on valid patents, are suddenly taken off the market after a court grants a permanent injunction. While permanent injunctions were automatically granted by the Federal Circuit before the Supreme Court’s holding in eBay v. MercExchange, courts now have more discretion to deny injunctive relief. Now that courts have this newfound discretion after eBay, the public should no longer expect to be harmed by the sudden removal of medical supplies. Unfortunately, this has not been the course that …


Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll Jan 2014

Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq Aug 2013

The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq

Vincent J Roth Esq

Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …


The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq Aug 2013

The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq

Vincent J Roth Esq

Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …


Reports Of Its Death Are Greatly Exaggerated: Ebay, Bosch, And The Presumption Of Irreparable Harm In Hatch-Waxman Litgation, Kenneth C. Louis Jul 2013

Reports Of Its Death Are Greatly Exaggerated: Ebay, Bosch, And The Presumption Of Irreparable Harm In Hatch-Waxman Litgation, Kenneth C. Louis

Kenneth C. Louis

No abstract provided.


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr. Apr 2013

Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.

Richard Sanvenero Jr.

This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …


Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower Apr 2013

Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower

Richard Cameron Gower

Despite some difficulties, state tort law can be argued to create a unique exception to patent law. Specifically, the prevented rescue doctrine suggests that charities and others can circumvent patents on certain critical medications when such actions are necessary to save individuals from death or serious harm. Although this Article finds that the prevented rescue tort doctrines is preempted by federal patent law, all hope is not lost. A federal substantive due process claim may be brought that uses the common law to demonstrate a fundamental right that has long been protected by our Nation’s legal traditions. Moreover, this Article …


Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio Mar 2013

Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

For most of human history the essential nature of creativity was understood to be cumulative and collective. This notion has been largely forgotten by modern policies regulating creativity and speech. As hard as it may be to believe, the most valuable components of our immortal culture were created under a fully open regime with regard to access to pre-existing expressions and reuse. From the Platonic mimēsis to the Roman imitatio, from Macrobius’ Saturnalia to the imitatio Vergili, from medieval auctoritas and Chaucer the compilator to Anon the singer and social textuality, from Chrétien’s art of rewriting to Shakespeare’s “borrowed feathers,” …


Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio Mar 2013

Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

In the last two decades, the industry has endlessly deployed the rhetoric of the “digital threat” in order to demand harsher measures against digital piracy, peer-to-peer file sharing and the like. In fact, the uneasiness in sharing the view that harsher measures are an adequate response to copyright infringement in the digital environment comes from the uncertain grounds on which the heavy-handed reaction against digital piracy has been based. Two related arguments might run against this heavy-handed approach. First, market conditions might incentivize piracy. Additionally, there are raising doubts over the argument that piracy is a threat to creativity, especially …


Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras Mar 2013

Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras

Jorge L Contreras

Technical interoperability standards are critical elements of mobile telephones, laptop computers, digital files, and thousands of other products in the modern networked economy. Most such standards are developed in so-called voluntary standards-development organizations (SDOs) that require participants to license patents essential to the standard on terms that are “fair, reasonable and non-discriminatory” (FRAND). FRAND commitments are thought to avoid the problem of patent hold-up: the imposition of excessive royalty demands after a standard has been widely adopted in the market. While, at first blush, FRAND commitments seem to assure product vendors that patents will not obstruct the manufacture and sale …


Desktop Piracy Factories: Will Existing Law Be Enough?, Andrew J. Daddono Mar 2013

Desktop Piracy Factories: Will Existing Law Be Enough?, Andrew J. Daddono

Andrew J Daddono

A brief essay on how the disruptive technology found in 3D printing will affect the future of our existing legal regimes for intellectual property, what foreseeable problems there are, and possible ways that we may address them.


A Case For The Public Domain, Clark Asay Feb 2013

A Case For The Public Domain, Clark Asay

Clark Asay

Over the past several decades open license movements have proven highly successful in the software and content worlds. Such movements rely in part on the belief that greater freedom of use triggers innovative activity that is superior to what a restrictive IP approach produces. Ironically, such open license movements also rely on IP rights to promote their vision of freedom and openness. They do so through IP licenses that, while granting significant freedoms, also impose certain conditions on users such as the “copyleft” requirement in the software world. Such movements rely on this IP-based approach due to fears that, without …


Copyright Freeconomics, John M. Newman Feb 2013

Copyright Freeconomics, John M. Newman

John M. Newman

Innovation has wreaked creative destruction on traditional content platforms. During the decade following Napster’s rise and fall, industry organizations launched litigation campaigns to combat the dramatic downward pricing pressure created by the advent of zero-price, copyright-infringing content. These campaigns attracted a torrent of debate, still ongoing, among scholars and stakeholders—but this debate has missed the forest for the trees. Industry organizations have abandoned litigation efforts, and many copyright owners now compete directly with infringing products by offering licit content at a price of $0.

This sea change has ushered in an era of “copyright freeconomics.” Drawing on an emerging body …


Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou Feb 2013

Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou

Hong Lou

In China, the amount of copyright infringement disputes cases related to ISPs is rapid increasing, and current legislation seems to be insufficient to regulate these problems. Moreover, there is a chaos in different courts around China using different approaches and standards on search engines' secondary liability.Therefore, how to improved Chinese copyright legislation and unite relevant judgments with reasonable approaches has become an urgent task. The purpose of this essay is to compare legislation and legal practice in China and the US, to point out the tendency of ISPs' secondary copyright liability in these two countries, and to make useful suggestions …


Patents And The University, Peter Lee Feb 2013

Patents And The University, Peter Lee

Peter Lee

This Article advances two novel claims about the internalization of academic science within patent law and the concomitant evolution of “academic exceptionalism.” Historically, relations between patent law and the university were characterized by mutual exclusion, based in part on normative conflicts between academia and exclusive rights. These normative distinctions informed “academic exceptionalism”—the notion that the patent system should exclude the fruits of academic science or treat academic entities differently than other actors—in patent doctrine. As universities began to embrace patents, however, academic science has become internalized within the traditional commercial narrative of patent protection. Contemporary courts frequently invoke universities’ commercial …