Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Internet Law

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom Apr 2016

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom

Evan R. Youngstrom

Today, our society is on a precipice of significant advancement in healthcare because 3D printing will usher in the next generation of medicine. The next generation will be driven by customization, which will allow doctors to replace limbs and individualize drugs. However, the next generation will be without large pharmaceutical companies and their justifications for strong intellectual property rights. However, the current patent system (which is underpinned by a social tradeoff made from property incentives) is not flexible enough to cope with 3D printing’s rapid development. Very soon, the social tradeoff will no longer benefit society, so it must be …


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman Jul 2015

Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman

Shlomit Yanisky-Ravid Professor of Law

Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …


Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter Mar 2015

Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter

Megan M Carpenter

This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …


Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler Jan 2015

Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler

Brandon C. Butler

The Supreme Court has said that copyright’s fair use doctrine is a “First Amendment safety valve” because it ensures that certain crucial cultural activities are not unduly burdened by copyright. While many such activities (criticism, commentary, parody) have benefited from the courts’ increased attention to first amendment values, one such activity, education, has been mired for years in a minimalist, market-based vision of fair use that is largely out of touch with mainstream fair use jurisprudence. The latest installment in the history of educational fair use, the 11th Circuit’s opinion in the Georgia State e-reserves case, may be the last …


Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart Aug 2014

Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart

Rebecca K Stewart

Ever since the U.S. Patent and Trademark Office began issuing utility patents for plants, the United States has sat squarely on the frontlines of what have come to be known as the “seed wars.” In the last two decades, the majority of battles in the U.S. seed wars have been waged in the form of patent infringement lawsuits. Typically these suits are filed by biotechnology corporations such as Monsanto against farmers accused of saving and planting patented seed that self-replicates to produce progeny embodying—and thus infringing—the biotech corporations’ patented inventions.

Yet in recent years, the seed wars have begun to …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Patents And The University, Peter Lee Feb 2013

Patents And The University, Peter Lee

Peter Lee

This Article advances two novel claims about the internalization of academic science within patent law and the concomitant evolution of “academic exceptionalism.” Historically, relations between patent law and the university were characterized by mutual exclusion, based in part on normative conflicts between academia and exclusive rights. These normative distinctions informed “academic exceptionalism”—the notion that the patent system should exclude the fruits of academic science or treat academic entities differently than other actors—in patent doctrine. As universities began to embrace patents, however, academic science has become internalized within the traditional commercial narrative of patent protection. Contemporary courts frequently invoke universities’ commercial …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry Jan 2007

When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry

ExpressO

As research has advanced, technologies have become more closely knit, and the relationships between them—both complementary and competitive—have become increasingly important. Unfortunately, the patent system’s use of monopoly power to reward innovators creates inefficient results by overly encouraging the development of substitute technologies and discouraging the development of complementary technologies. This paper explains how an optional patent purchase system could help ameliorate such problems and discusses the implications of such a system.


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Information Privacy As A Function Of Facial Recognition Technology And Wearable Computers, Woodrow Barfield Sep 2006

Information Privacy As A Function Of Facial Recognition Technology And Wearable Computers, Woodrow Barfield

ExpressO

As technological advances are made in the design of smart sensors, the issue of privacy in public places, first discussed by Warren and Brandeis in 1890, becomes an important topic for law and policy. This paper examines issues of privacy that are impacted when an individual’s image is recorded by a video-based wearable computer, analyzed using facial recognition software, and uploaded to the internet. While the Constitutional basis of search and seizure law for individual’s placed under video surveillance is reviewed, a particular focus of the paper is on a less investigated but emerging area of concern, the video recording …


Law And The Science Of Networks: An Overview And An Application To The "Patent Explosion", Katherine J. Strandburg Aug 2006

Law And The Science Of Networks: An Overview And An Application To The "Patent Explosion", Katherine J. Strandburg

ExpressO

The network may be the metaphor of the present era. A network, consisting of “nodes” and “links,” may be a group of individuals linked by friendship; a group of computers linked by network cables; a system of roads or airline flights -- or another of a virtually limitless variety of systems of connected “things.” The past few years have seen an explosion of interest in “network science,” which seeks to move beyond metaphor to analysis in fields from physics to sociology. Network science highlights the role of relationship patterns in determining collective behavior. It underscores and begins to address the …


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Stealing What's Free: Exploring Compensation To Body Parts Sources For Their Contribution To Profitable Biomedical Research, Jo-Anne Yau May 2006

Stealing What's Free: Exploring Compensation To Body Parts Sources For Their Contribution To Profitable Biomedical Research, Jo-Anne Yau

ExpressO

It is undisputed in the biotechnology industry that human body parts play a vital role in research. The body parts donors, referred to as "Sources" in this article, are subjected to physical and financial exploitation. Forbidding the explosion of profits from trickling down to the Source presents an irrational inequity. Despite established law, it is evident from case analysis, prevailing social practices, and constitutional interpretation that Source compensation is a plausible solution.

This article proposes a model of compensation for Sources, whereby Sources are compensated based on a proportionate share of the research profits set aside for the Source as …


Open Access In A Closed Universe: Lexis, Westlaw And The Law School, Olufunmilayo B. Arewa Mar 2006

Open Access In A Closed Universe: Lexis, Westlaw And The Law School, Olufunmilayo B. Arewa

ExpressO

This paper considers issues of open access from the context of the broader legal information industry as a whole. The structure and contours of the legal information industry have shaped the availability of online open access publishing of legal scholarship. The competitive duopoly of Lexis and Westlaw is a particularly important factor in considerations of open access. Also significant is the relationship between Lexis and Westlaw and law schools, which form an important market segment for both Lexis and Westlaw. This paper begins by considering the important role information plays in the law. It then notes the increasing industry concentration …


Global Pharmaceutical Patent Law In Developing Countries- Amending Trips To Promote Access For All, Angela J. Anderson Mar 2006

Global Pharmaceutical Patent Law In Developing Countries- Amending Trips To Promote Access For All, Angela J. Anderson

ExpressO

This comment will analyze the need to amend and revise the current global pharmaceutical patent system under TRIPS to take into account the needs of developing countries and overall public health. This comment will emphasize that the current international trade rules, which although administered by the WTO, are dictated by developed country governments and powerful pharmaceutical companies, and therefore, without reform will further diminish the access of poor people in developing countries to vital medicines. Part II of this comment will provide a general overview of the international trade law governing patents on pharmaceuticals focusing specifically on the development of …


The Children Of Science: Property, People, Or Something In Between?, Star Q. Lopez Mar 2006

The Children Of Science: Property, People, Or Something In Between?, Star Q. Lopez

ExpressO

How should states classify embryos? The war has often waged between two classifications, people versus property. But what if a state assumed something in between, finding the embryo to be a potential person entitled to special respect? If a state adopted this position, how would the law affect medical research?

Presuming embryos constitute potential persons, the debate would continue with how to define “special respect.” The status of a potential person runs along a spectrum between property and personhood. How one defines “special respect” determines where the potential person falls along this spectrum. Special respect would create a spectrum of …


The Expressive Impact Of Patents, Timothy R. Holbrook Mar 2006

The Expressive Impact Of Patents, Timothy R. Holbrook

ExpressO

Patents represent a quid pro quo between the public and the inventor: in exchange for disclosing the invention, the inventor receives the right to exclude others from practicing her invention. They therefore serve as a source technical information. Patents also communicate information to markets and companies that serve to reduce various transaction costs, allowing more efficient transactions and investment. Patents consequently communicate various types of information beyond the technical.

There is no reason, however, that such messages must be limited to the technical or the pecuniary. This Article explores whether patents, like other governmental acts such as legislation, can create …


A New Weapon Against Piracy: Patent Protection As An Alternative Strategy For Enforcement Of Digital Rights, Dennis S. Fernandez, Matthew Chivvis, Mengfei Huang Oct 2005

A New Weapon Against Piracy: Patent Protection As An Alternative Strategy For Enforcement Of Digital Rights, Dennis S. Fernandez, Matthew Chivvis, Mengfei Huang

ExpressO

This article illustrates how patents and copyrights complement each other to provide a better defense for creative works. Copyrights protect expression, and patents protect underlying functions. Currently, the one-time strengths of copyrights are being eroded as courts allow new technologies to flourish which enable digital reproduction and piracy. This has encouraged companies and industries to move increasingly to patent protection and any company that fails to pursue this trend may be left behind. In sum, patents are a worthwhile strategy because they assist copyright owners in controlling the technology that enables infringement while copyrights alone would leave a company vulnerable …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton May 2005

The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton

ExpressO

The Digital Millennium Copyright Act (‘DMCA’) prevents unauthorized copying and distribution of digital copyright works by regulating devices that can be used to circumvent Digital Rights Management (‘DRM’) measures that are used to restrict access to those works. A significant problem is that those devices, like many new technologies, have the potential to be used for both socially harmful and socially beneficial purposes. There is no obvious way for Congress to regulate circumvention devices to prevent the social harms, while at the same time facilitating the social benefits they might provide. Recent judicial interpretations of the DMCA have unsurprisingly erred …


An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann Apr 2005

An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann

ExpressO

In this article, Professor Frischmann combines a number of current debates across many disciplinary lines, all of which examine from different perspectives whether certain resources should be managed through a regime of private property or through a regime of open access. Frischmann develops and applies a theory that demonstrates there are strong economic arguments for managing and sustaining openly accessible infrastructure. The approach he takes differs from conventional analyses in that he focuses extensively on demand-side considerations and fully explores how infrastructure resources generate value for consumers and society. As a result, the theory brings into focus the social value …


Copyright Law, The Production Of Creative Works And Cultural Growth In Cyberspace , Alina Ng Apr 2005

Copyright Law, The Production Of Creative Works And Cultural Growth In Cyberspace , Alina Ng

ExpressO

The Internet has affected information flow in copyrighted content in a profound manner. Authors and artists are enabled through the Internet to assert greater control over the flow of information in their works as these new technologies offer new and different distribution channels for content. These new technologies also allow consumers to use content in ways, which had not been anticipated by the copyright industries. This paper presents that copyright law was developed for a specific purpose, which was to encourage learning and growth. As new technologies emerge and as content industries experience changes in information flow in copyrighted works, …


Copyright Law, The Production Of Creative Works And Cultural Growth In Cyberspace , Alina Ng Apr 2005

Copyright Law, The Production Of Creative Works And Cultural Growth In Cyberspace , Alina Ng

ExpressO

The Internet has affected information flow in copyrighted content in a profound manner. Authors and artists are enabled through the Internet to assert greater control over the flow of information in their works as these new technologies offer new and different distribution channels for content. These new technologies also allow consumers to use content in ways, which had not been anticipated by the copyright industries. This paper presents that copyright law was developed for a specific purpose, which was to encourage learning and growth. As new technologies emerge and as content industries experience changes in information flow in copyrighted works, …