Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
Articles 1 - 30 of 148
Full-Text Articles in Privacy Law
The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren
UIC John Marshall Journal of Information Technology & Privacy Law
In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and …
Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante
Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante
UIC Review of Intellectual Property Law
On February 28, 2014, the Register of Copyrights of the United States and Director of the U.S. Copyright Office Maria A. Pallante delivered a keynote speech on the copyright hearings and related discourse in the nation’s capital. The speech was given at The John Marshall Law School’s 58th Annual Intellectual Property Conference. This article is based on her speech at the Conference.
Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter
Shutting Down The Ex Parte Party: How To Keep Bittorrent Copyright Trolls From Abusing The Federal Court’S Discovery System, 31 J. Marshall J. Info. Tech. & Privacy L. 105 (2014), Jennifer L. Hunter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton
UIC John Marshall Journal of Information Technology & Privacy Law
In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …
The Emerging Reality Of Social Media: Erosion Of Individual Privacy Through Cyber-Vetting And Law’S Inability To Catch Up, 12 J. Marshall Rev. Intell. Prop. L. 551 (2013), Saby Ghoshray
UIC Review of Intellectual Property Law
The rise of social media means that data about a large number of people is available in public and quasi-public digital locations. Employers, keen on taking advantage of this additional data to decrease the risk associated with an offer of employment, are engaging in “cyber-vetting”—non-consenting social media searches conducted by third parties or the employers themselves. To the extent that current law applies to this practice, the regulation it provides is weak and attacks only part of the problem. Left unchecked, cyber-vetting has the potential to fundamentally alter the scope of prospective employees’ rights. This article surveys the legal and …
As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman
As Seen On Tv: Your Compromising Cameo On National Reality Programming, 12 J. Marshall Rev. Intell. Prop. L. 403 (2013), Ryan Westerman
UIC Review of Intellectual Property Law
The pop-culture phenomenon of reality television has taken over national programming. With the click of a remote, viewers can gain an inside look into the daily lives of celebrity families, toddler pageant queens, wealthy housewives, even pregnant teenagers. Reality television also profiles different professions: repo-men, pawn shop owners, and real estate agents all have television time slots. While it seems everyone is desperate for their fifteen minutes of fame, there are still those who wish to avoid the public spotlight. However, a recent Illinois ruling may make avoiding prime-time attention impossible for certain individuals caught on tape in compromising, and …
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes
The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes
UIC Review of Intellectual Property Law
Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …
Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola
Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola
UIC John Marshall Journal of Information Technology & Privacy Law
The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …
The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert
The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Revisiting Reader Privacy In The Age Of The E-Book, 45 J. Marshall L. Rev. 175 (2011), Bradley Schaufenbuel
Revisiting Reader Privacy In The Age Of The E-Book, 45 J. Marshall L. Rev. 175 (2011), Bradley Schaufenbuel
UIC Law Review
No abstract provided.
Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer
Increasing Access To Startup Financing Through Intellectual Property Securitization, 27 J. Marshall J. Computer & Info. L. 613 (2010), Kyle Tondo-Kramer
UIC John Marshall Journal of Information Technology & Privacy Law
This paper will discuss how a private company running a single, nationwide database for filing financing agreements can ease the burden on creditors and pave the way for more creditors to enter this market. Part two offers a brief overview of how intellectual property securitization works and some of the impediments to using this type of securitization. Part three proposes a possible solution to the problem creditors face regarding the filing of a financing statement when attempting to securitize intellectual property, and provides an in depth analysis as to why the suggestion that a private company runs a single, nationwide …
The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan
The Cathedral And The Bizarre: An Examination Of The "Viral" Aspects Of The Gpl, 27 J. Marshall J. Computer & Info. L. 349 (2010), Michael F. Morgan
UIC John Marshall Journal of Information Technology & Privacy Law
While there is a growing body of literature dealing with the General Public License (“GPL”), the potential viral effects of the GPL do not appear to have been analyzed in a detailed technical manner. This paper will attempt to demonstrate that a proper legal analysis of the viral effects of the GPL is dependent on a detailed technical understanding of the specific mechanisms used for each type of program-to-program interaction. Once these technical mechanisms are properly understood it will then be possible to identify the applicable copyright law needed to assess the viral effects of the GPL.
300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin
300 Years Of Copyright Law? A Not So Modest Proposal For Reform, 28 J. Marshall J. Computer & Info. L. 1 (2010), James Gh Griffin
UIC John Marshall Journal of Information Technology & Privacy Law
2010 sees the three hundredth anniversary of the U.K.'s Statute of Anne 1710. This paper suggests that with the increased ability of content recipients to re-use works, there is a need to readdress the concerns of stakeholders, namely authors, publishers and content recipients. The paper sets out in detail how this should be achieved. To do so, it utilises the notion of creativity as the benchmark by which to balance the interests of stakeholders. This has been used in early eighteenth century case law in the U.K., and there are also other historical and theoretical justifications. The paper then proceeds …
Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz
Antitrust Law - A Stranger In The Wikinomics World? Regulating Anti-Competitive Use Of The Drm/Dmca Regime, 27 J. Marshall J. Computer & Info. L. 1 (2009), Rachel Aridor-Hershkovitz
UIC John Marshall Journal of Information Technology & Privacy Law
Unlike traditional markets, Information Technology (“IT”) markets are characterized by special and unique features that shall be discussed in this paper. Competition in IT markets is dynamic; nonmarket based information production models (‘peer production’) play a significant role in IT markets; and IT market are usually data market rather than product market. The combination of the legal rule prohibiting circumvention of technological measure under the DMCA and the use of DRMs, created a new regime, the DRM/DMCA regime, which bestows the entertainment industry with a new and strong right to control the access to and use of the copyrighted work. …
Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer
Application Service Providing, Copyright, And Licensing, 25 J. Marshall J. Computer & Info. L. 79 (2007), Michael P. Widmer
UIC John Marshall Journal of Information Technology & Privacy Law
Application Service Providing ("ASP"), where a vendor hosts a software application on her server and grants customers access to the application over a network -- without the software application itself being installed on the user’s computer -- is used by many, e.g. in the form of Web based e-mail services, and grows ever more important. This article argues that although ASP mainly raises questions (i) that come up in the context of traditional use of computer programs; or (ii) that have been addressed in the context of online use of works other than software, ASP has significantly different copyright implications …
Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana
Slingbox: Copyright, Fair Use, And Access To Television Programming Anywhere In The World, 25 J. Marshall J. Computer & Info. L. 187 (2007), Shekar Sathyanarayana
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier
The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier
UIC John Marshall Journal of Information Technology & Privacy Law
Spatial data and applications play an ever-increasing part in our economy and in our society in general, but the protection of spatial databases by intellectual property rights seems to be a challenge because the Internet and information technology have caused a considerable increase in the copying of data, maps, route descriptions, hiking trails, etc. The illegal copying of spatial data, however, has caused the data producers to turn to several means of protection, such as intellectual property legislation, unfair competition, confidentiality and privacy. This paper begins by determining what is meant by spatial data. Thereafter, the paper reflects on the …
The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos
The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra
Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer
Yours For Keeps: Mgm V. Grokster, 23 J. Marshall J. Computer & Info. L. 209 (2005), Max Stul Oppenheimer
UIC John Marshall Journal of Information Technology & Privacy Law
Millions of people download billions of music files over the Internet, using peer-to-peer ("P2P") services such as Grokster, StreamCast, Morpheus, and Kazaa. This practice has been challenged as violative of copyright and, it has been argued, the magnitude of copyright violations facilitated by P2P services justifies banning the services entirely. This argument has been based on the assumption that most transfers over P2P services violate copyright. The starting point for this discussion is the recent decision of the United States Supreme Court to grant the certiorari petition of Metro-Goldwyn-Mayer Studios et al. to review the Ninth Circuit decision in MGM …
"Electronic Voting Rights And The Dmca: Another Blast From The Digital Pirates Or A Final Wake Up Call For Reform?", 23 J. Marshall J. Computer & Info. L. 533 (2005), Doris E. Long
UIC John Marshall Journal of Information Technology & Privacy Law
Electronic voting machines are the new version of pirated music. Like digital music, electronic voting was designed to make voting rights easily available to the masses. However, technology has once again demonstrated how easy it is to circumvent a good idea through better “hacker” technology. In reality, any electronic voting software can be hacked no matter how good the encryption technology protecting it. The issue is not creating a fool-proof anti-circumvention system – an impossible task – but creating the necessary digital safeguards to make circumvention difficult, to make security breaches more readily detectable, and to provide back-up systems to …
American Courts Are Drowning In The "Gene Pool": Excavating The Slippery Slope Mechanisms Behind Judicial Endorsement Of Dna Databases, 39 J. Marshall L. Rev. 115 (2005), Meghan Riley
UIC Law Review
No abstract provided.
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
Copyright & Privacy - Through The Copyright Lens, 4 J. Marshall Rev. Intell. Prop. L. 212 (2005), Sarah B. Deutsch, Roderick G. Dorman, Michael A. Geist, Hugh C. Hansen, Howard P. Knopf, Ralph Oman, Matthew J. Oppenheim, John G. Palfrey
UIC Review of Intellectual Property Law
This panel examines the recent litigation by the recording industry against peer-to-peer (“P2P”) users in the U.S. and Canada. How are users’ identities being obtained? Is the process working well enough or too well? What are the technical, evidentiary, procedural, privacy and substantive copyright issues in play?
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
Copyright & Privacy - Through The Technology Lens, 4 J. Marshall Rev. Intell. Prop. L. 242 (2005), Michael A. Geist, Doris E. Long, Leslie Ann Reis, David E. Sorkin, Fred Von Lohmann
UIC Review of Intellectual Property Law
How is new technology impacting on the more general question of privacy in cyberspace? Is the original notion of an expectation of anonymity on the internet still viable? Can technology pierce through the expectation of privacy even without judicial interference? Do individuals need protection from such technology? Is there technology available to protect the individual? Should these technological tools be regulated? Should the law differentiate between various types of alleged “illegal” behavior; e.g., IP infringement, defamation, possession of pornography and terrorism? Are there international standards that can assist in regulating the intersection between technology and privacy in cyberspace?
Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters
Copyright & Privacy - Through The Legislative Lens, 4 J. Marshall Rev. Intell. Prop. L. 266 (2005), Marybeth Peters
UIC Review of Intellectual Property Law
The Honorable Marybeth Peters, who has served since 1994 as the Register of Copyrights for the United States Copyright Office of the Library of Congress, presented a post-election report on the legislative agenda in Washington, D.C. regarding rejected, pending and future amendments to the copyright law of the United States. Register Peters also discussed the current policy role of the United States Copyright Office and several court actions that contest the constitutionality of various provisions of the copyright law.
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
Copyright & Privacy - Through The Privacy Lens, 4 J. Marshall Rev. Intell. Prop. L. 273 (2005), Julie E. Cohen, David E. Sorkin, Peter P. Swire
UIC Review of Intellectual Property Law
What legal tools do privacy advocates have available to defend an individual’s right to privacy? How far does this right go? How should these rights be defended—or if necessary—curtailed? What is the role of Government, of the practicing bar and of academics?
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
Copyright & Privacy - Through The Wide-Angle Lens, 4 J. Marshall Rev. Intell. Prop. L. 285 (2005), William W. Fisher Iii, Howard P. Knopf, Fred Von Lohmann, William B.T. Mock, Marybeth Peters, R. Anthony Reese
UIC Review of Intellectual Property Law
Some have proposed “alternative compensation schemes” as a means of compensating copyright owners and creators for P2P activity while avoiding litigation. Some have proposed a streamlined dispute resolution system that would allow for enforcement in a manner analogous to the UDRP model. Others question whether private copying should necessarily be viewed as illegal and whether any alternative compensation scheme is viable. With all of these proposals, the question remains as to whether “alternative compensation” is really alternative.
Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim
Copyright & Privacy - Through The Political Lens, 4 J. Marshall Rev. Intell. Prop. L. 306 (2005), William W. Fisher Iii, Hugh C. Hansen, Christopher Jay Hoofnagle, Howard P. Knopf, Declan Mccullagh, Ralph Oman, Matthew J. Oppenheim
UIC Review of Intellectual Property Law
Veteran beltway players discuss the politics of P2P technology and Privacy. How far can or should Congress go? Can the United States export its values or its laws in this area? Are content owners in a losing Luddite struggle? What is the role of litigators, lobbyists and legislators in this war?