Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (32)
- Schulich School of Law, Dalhousie University (11)
- SelectedWorks (9)
- Selected Works (4)
- University of Maryland Francis King Carey School of Law (2)
-
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- American University Washington College of Law (1)
- Boston University School of Law (1)
- Chicago-Kent College of Law (1)
- Georgia State University College of Law (1)
- Seattle University School of Law (1)
- Southern Methodist University (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- Keyword
-
- Computer Law (14)
- Science and Technology (14)
- Law and Technology (13)
- Intellectual Property Law (8)
- Communications Law (7)
-
- Administrative Law (5)
- Arts and Entertainment (5)
- Copyright (4)
- Law and Society (4)
- Competition (3)
- Intellectual property (3)
- Network neutrality (3)
- Patents (3)
- Air and Space Law (2)
- Aviation (2)
- Broadband (2)
- Constitutional Law (2)
- Consumer Protection Law (2)
- Contracts (2)
- Courts (2)
- Criminal Law and Procedure (2)
- DMCA (2)
- Drones (2)
- Duty of Confidentiality (2)
- ENG (2)
- Electronic News Gathering (2)
- Employment Practice (2)
- Energy and Utilities Law (2)
- FCC (2)
- First Amendment (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (29)
- Canadian Journal of Law and Technology (10)
- All Faculty Scholarship (3)
- UIC Review of Intellectual Property Law (3)
- Articles (2)
-
- Journal of Business & Technology Law (2)
- Rob Frieden (2)
- Sharon K. Sandeen (2)
- Adam Lamparello (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Book Chapters, & Popular Press (1)
- Faculty Scholarship (1)
- Georgia Journal of International & Comparative Law (1)
- Georgia State University Law Review (1)
- Henry H. Perritt, Jr. (1)
- Hillary A Henderson (1)
- Katrina Wu (1)
- Publications (1)
- Richard Warner (1)
- Robert Sprague (1)
- Roger M. Groves (1)
- SMU Science and Technology Law Review (1)
- Sean Brian (1)
- Seattle University Law Review (1)
- Technology Law and Public Policy Clinic (1)
- Tejas N. Narechania (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Publication Type
- File Type
Articles 1 - 30 of 72
Full-Text Articles in Science and Technology Law
City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello
City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello
Adam Lamparello
Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu
The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu
Katrina Wu
The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …
E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk
E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk
Seattle University Law Review
Amazon’s main rival, Apple, went to great lengths and took major risks to enter the e-book market. Why did Apple simply choose not to compete on the merits of its product and brand equity (the iPad and iBookstore) as it does with its other products? Why did Apple decide not to continue to rely on its earlier success of situating its products differently in the market than other electronics and working hard to be different and cutting-edge with its e-book delivery? This Note argues that the combination of Amazon’s 90% market share, network externalities, and an innovative technology market creates …
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Georgia Journal of International & Comparative Law
No abstract provided.
The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden
Rob Frieden
This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
Software Patentability After Prometheus, Joseph Holland King
Software Patentability After Prometheus, Joseph Holland King
Georgia State University Law Review
This Note examines the history of patentability of abstract ideas and the tests that courts have used to make the determination of whether an invention incorporating an abstract idea is patentable. Part I provides a history of the four seminal cases related to patentable subject matter, as well as some more recent on point decisions. Part II changes focus to the various tests and factors that have been used by the courts, exploring the history of each, discussing the treatment by the Supreme Court, and determining the strengths and weaknesses of each. Based on the discussion in Part II, Part …
With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson
With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson
Canadian Journal of Law and Technology
This article will explain the current avenues for intellectual property rights holders to make use of existing anti-counterfeiting policies made available by financial companies dealing in electronic payments, and argue that current policies, while helpful, are not sufficient. The article will conclude by demonstrating that policy makers have options to intervene and regulate the use of online payment services, either directly through legislation or indirectly through facilitating “best practices.”
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Canadian Journal of Law and Technology
This article examines the Voltage decision, with the view that the bona fide standard safeguards intellectual property rights at the cost of online privacy rights and will proceed in three parts. Part I provides a brief contextualization of the issues. Part II is an analysis of the Voltage decision. Part III examines how the bona fide standard is a relatively low threshold. This article concludes by considering the possibility of shifting to a higher standard for disclosure, as well as a possible solution for the effect that a higher standard could have on copyright owners.
Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric
Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric
Canadian Journal of Law and Technology
This article seeks to address what constitutes youth online privacy, how youth conceive of their privacy, whether their privacy needs protecting, and, if so, how youth privacy should be regulated online. First, the article begins by rooting the issue of online youth privacy in the current social, technological, economic, political, and legal context, drawing on social science research to demonstrate both the threats and opportunities created by technology for youth privacy.
Second, the analysis focuses on the relative strengths and weaknesses of current federal legislation as the primary law governing the collection, use, and disclosure of youth’s personal information through …
The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni
The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni
Canadian Journal of Law and Technology
This article will explore the origins and rationale for the first sale doctrine. A review of the most recent American case law shows the court rejecting the doctrine’s applicability in a digital sphere. I suggest that in spite of the court’s rigid interpretation of the U.S. Copyright Act, formulating a digital first sale doctrine is a matter better left to lawmakers. A flourishing digital secondary market can promote competition and innovation while making content more accessible to the public, but its endorsement requires an appreciation of its adverse effect on the primary market for copyright owners. The article fast-forwards to …
Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy
Canadian Journal of Law and Technology
This article aims to respond to the government’s request by explaining the nature of that relationship and by arguing that the combined use of familial searching and analysis of abandoned DNA would present a serious risk for genetic privacy. The risk is particularly acute given that it would effectively circumvent the existing justification for the NDDB, leading to inclusion of individuals whose DNA profiles have not been uploaded directly onto the data bank. To substantiate this main argument, this article proceeds in three parts. The first describes the current Canadian law on familial searching and the ongoing interest in amending …
3d Printers, James Barker, Nicholas Pleasants, Peter Montine, Shudan Zhu
3d Printers, James Barker, Nicholas Pleasants, Peter Montine, Shudan Zhu
Technology Law and Public Policy Clinic
A preliminary report, addressing potential market disruption, the state of the law, and recommendations on future legislative action regarding consumer-grade 3D printing.
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
All Faculty Scholarship
Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Sharon K. Sandeen
As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.
While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Sharon K. Sandeen
As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.
While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …
Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer
Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer
Faculty Scholarship
The Federal Circuit’s expansion of patentable subject matter in the 1990s led to a threefold increase in software patents, many of which contain abstract ideas merely tethered to a general-purpose computer. There is little evidence, however, to suggest this expansion has produced an increase in software innovation. The software industry was highly innovative in the decade immediately prior to this expansion, when the viability of software patentability was unclear and software patents were few. When surveyed, most software developers oppose software patenting, and, in practice, software innovators tend to rely on other tools to capture market share such as first-mover …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr.
Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr.
Journal of Business & Technology Law
No abstract provided.
Near-Field Communication Technology: Regulatory And Legal Recommendations For Embracing The Nfc Revolution, Allan Richarz
Near-Field Communication Technology: Regulatory And Legal Recommendations For Embracing The Nfc Revolution, Allan Richarz
Canadian Journal of Law and Technology
Despite its ease and convenience, NFC technology raises a number of privacy issues. Chief among these concerns are the collection, retention, and usage of personally-identifying information contained within NFC-enabled devices by both private and public entities. Within that category, the most pressing privacy issues inherent in the collection and usage of such information relate to real-time tracking or after-the-fact habit profiling and identity theft. As well, privacy issues persist around the means used, if any, to secure and protect that information from unauthorized third parties both at the end-user and systemic database levels.
In light of these concerns, it is …
Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante
Review And Reflection: Copyright Hearings And Related Discourse In The Nation’S Capital, 13 J. Marshall Rev. Intell. Prop. L. 487 (2014), Maria A. Pallante
UIC Review of Intellectual Property Law
On February 28, 2014, the Register of Copyrights of the United States and Director of the U.S. Copyright Office Maria A. Pallante delivered a keynote speech on the copyright hearings and related discourse in the nation’s capital. The speech was given at The John Marshall Law School’s 58th Annual Intellectual Property Conference. This article is based on her speech at the Conference.
Aerevolution: Why We Should, Briefly, Embrace Unlicensed Online Streaming Of Retransmitted Broadcast Television Content, 13 J. Marshall Rev. Intell. Prop. L. 577 (2014), Bradley Ryba
UIC Review of Intellectual Property Law
The United States has long recognized broadcast television programming’s importance to the public’s information and entertainment needs. Accordingly, Congress has historically offered strong copyright protections for broadcast television networks. Those strong protections allowed broadcast networks to withstand business threats from innovations like cable television and VCRs. However, Congress’ recent silence on DVRs and cloud computing technology has allowed an entrepreneur to create the networks’ next biggest threat, Aereo. The creators of Aereo and similar businesses designed their services specifically around ambiguities within copyright law that could allow them to transmit networks’ content without paying the otherwise necessary consent fees. These …
E-Discovery: Reasonable Search, Proportionality, Cooperation, And Advancing Technology, 30 J. Marshall J. Info. Tech. & Privacy L. 433 (2014), Steven Bennett
E-Discovery: Reasonable Search, Proportionality, Cooperation, And Advancing Technology, 30 J. Marshall J. Info. Tech. & Privacy L. 433 (2014), Steven Bennett
UIC John Marshall Journal of Information Technology & Privacy Law
Rule 26(g)(1)(A) of the Federal Rules of Civil Procedure (the “Federal Rules”) requires that an attorney responding to a discovery request verify by signature, after “reasonable inquiry,” that the disclosure is, to the best of the attorney’s knowledge, “complete and correct.” In a digital environment, with masses of data in multiple formats and locations, the determination of whether a “reasonable” effort to meet the completeness requirement has occurred may turn on an assessment of the practices used to conduct a search of electronic materials. Those practices, in turn, must be judged on a standard of “proportionality” (i.e., that the effort …
From Morris To Nosal: The History Of Exceeding Authorization And The Need For A Change, 30 J. Marshall J. Info. Tech. & Privacy L. 465 (2014), Vasileios Karagiannopoulos
From Morris To Nosal: The History Of Exceeding Authorization And The Need For A Change, 30 J. Marshall J. Info. Tech. & Privacy L. 465 (2014), Vasileios Karagiannopoulos
UIC John Marshall Journal of Information Technology & Privacy Law
This Article discusses and examines the various cases that pertain to the issue of exceeding authorized access throughout the years from United States v. Morris to the recent United States v. Nosal. Further, this Article thoroughly examines the Ninth Circuit’s approach regarding the issue of exceeding authorization; specifically, the need for the Ninth Circuit’s narrower interpretation in United States v. Brekka and Nosal. Finally, this Article proposes an alternative phrasing for the term “exceeding authorization,” and a revised interpretation of the phrase and the relevant offenses under the Computer Fraud and Abuse Act. This recommended interpretation suggests establishing different degrees …
Cloud Computing, Regulatory Compliance, And Student Privacy: A Guide For School Administrators And Legal Counsel, 30 J. Marshall J. Info. Tech. & Privacy L. 511 (2014), Steve Mutkoski
UIC John Marshall Journal of Information Technology & Privacy Law
Rapid change in the technology landscape has resulted in the introduction of a range of new technologies into the classroom. But unlike the past use of technology in schools, many of these new products and services introduce two new dynamics that school counsel (and the teachers and administrators they support) need to understand fully. First, many of these new products and services are run “in the cloud” by a third party service provider as opposed to on servers operated by the school’s information technology (IT) staff. This third party operation and control can raise important new regulatory compliance issues, including …
“Bring Your Own Glass”: The Privacy Implications Of Google Glass In The Workplace, 30 J. Marshall J. Info. Tech. & Privacy L. 607 (2014), Anisha Mehta
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.