Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Science and Technology Law

Parody In Trademark Law: Dumb Starbucks Makes Trademark Law Look Dumb, 14 J. Marshall Rev. Intell. Prop. L. 143 (2015), Deborah Kemp, Lynn Forsythe, Ida Jones Jan 2015

Parody In Trademark Law: Dumb Starbucks Makes Trademark Law Look Dumb, 14 J. Marshall Rev. Intell. Prop. L. 143 (2015), Deborah Kemp, Lynn Forsythe, Ida Jones

UIC Review of Intellectual Property Law

Comedian Nathan Fielder opened a coffee shop which looked like a Starbucks, but he put the word “dumb” in front of the Starbucks name. Fielder justified his behavior based on the argument that he had created a parody of Starbucks. This article explores when a parody of a trademark may be entitled to protection under the First Amendment. If so, what are the limits of this protection, especially when a trademark holder argues that the parody is diluting his or her trademark by either blurring or tarnishment? The article analyzes federal statutes and judicial decisions. It concludes with recommendations to …


A Rose By Any Other Name: How An Illusionist Used Copyright Law As A Patent, 14 J. Marshall Rev. Intell. Prop. L. 357 (2015), Sydney Beckman Jan 2015

A Rose By Any Other Name: How An Illusionist Used Copyright Law As A Patent, 14 J. Marshall Rev. Intell. Prop. L. 357 (2015), Sydney Beckman

UIC Review of Intellectual Property Law

Teller is a famous illusionist who, in recent years, has been performing a stage act with Penn Jillete in Las Vegas, Nevada. Teller’s signature trick, known as “Shadows,” was copied by a magician in Belgium who offered to sell the method. The Belgian’s trick, titled “The Rose and Her Shadow,” was virtually identical to Teller’s illusion. That which we call a rose by any other name . . . Teller wanted the Belgian magician to stop offering the trick for sale. After an unsuccessful attempt to negotiate, Teller took his dispute to federal court. His goal? To protect that which …


The Remains Of Laches In Copyright Infringement Cases: Implications Of Petrella V. Metro-Goldwyn-Mayer, 14 J. Marshall Rev. Intell. Prop. L. 432 (2015), Daniel Brainard Jan 2015

The Remains Of Laches In Copyright Infringement Cases: Implications Of Petrella V. Metro-Goldwyn-Mayer, 14 J. Marshall Rev. Intell. Prop. L. 432 (2015), Daniel Brainard

UIC Review of Intellectual Property Law

Common law equitable doctrines are fundamentally at odds with modern statutes of limitations. While modern copyright courts found new ways to allow laches and the Copyright Act’s three year statute of limitations to coexist, the foundation for doing so was significantly weakened. The Supreme Court in Petrella v. Metro-Goldwyn-Mayer restricted the use of laches as a defense to copyright infringement to only extraordinary circumstances and provided two Circuit Court cases as demonstrating examples of laches for future use. In actuality, however, it appears the Supreme Court and Circuit Courts failed to analyze the facts in depth and ended up rendering …


Pulling The 'Trigger' On The Hatch-Waxman Act's 180-Day Exclusivity Using Inter Partes Review, 14 J. Marshall Rev. Intell. Prop. L. 453 (2015), Jaimin Shah Jan 2015

Pulling The 'Trigger' On The Hatch-Waxman Act's 180-Day Exclusivity Using Inter Partes Review, 14 J. Marshall Rev. Intell. Prop. L. 453 (2015), Jaimin Shah

UIC Review of Intellectual Property Law

The America Invents Act has put in place quick and efficient mechanisms for challenging granted patents in an Article I adversarial setting. And the Hatch-Waxman Act has been the roadmap for generic drug approval-related patent infringement action in Article III courts. An interesting, heretofore unaddressed question lurks at an intersection of the two pieces of enterprising legislation: What impact should a final decision canceling patent claims under the AIA setting have on the forfeiture of 180-day exclusivity under the Hatch-Waxman Act? The 180-day exclusivity is an important piece in the Hatch-Waxman game of chess. This comment presents both the case …


The Conflict Between An Athlete’S Right Of Publicity And The First Amendment, 15 J. Marshall Rev. Intell. Prop. L. 117 (2015), Edward Kuester Jan 2015

The Conflict Between An Athlete’S Right Of Publicity And The First Amendment, 15 J. Marshall Rev. Intell. Prop. L. 117 (2015), Edward Kuester

UIC Review of Intellectual Property Law

The recent rise of fantasy sports has created a conflict between an athlete’s right of publicity and the First Amendment of the Constitution. The legal question being discussed is whether athletes have a right of publicity in their identity, specifically their performance statistics and biographical information. If a right of publicity violation does exist, courts will have to determine whether a fantasy provider’s First Amendment privilege can prevail against an athlete’s publicity rights. This comment examines recent litigation surrounding athletes’ identities and the problems courts have in balancing the conflict between an athlete’s right of publicity and the First Amendment. …


Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton Jan 2015

Debatable Premises In Telecom Policy, 31 J. Marshall J. Info. Tech. & Privacy L. 453 (2015), Justin (Gus) Hurwitz, Roslyn Layton

UIC John Marshall Journal of Information Technology & Privacy Law

The five premises that this paper considers are:

1. Everyone needs low-cost access to high speed broadband service

2. High-speed broadband is necessary for education, health, government, and other social services

3. Wireless can‟t compete with cable

4. An open Internet is necessary for innovation and necessarily benefits consumers

5. Telecommunications are better somewhere else.


The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran Jan 2015

The Law And 3d Printing, 31 J. Marshall J. Info. Tech. & Privacy L. 505 (2015), Jasper Tran

UIC John Marshall Journal of Information Technology & Privacy Law

Recent years have seen extraordinary growth in the amount of legal scholarship and practice at the intersection of law and 3D printing. To help navigate this emerging field of 3D printing law, I created the accompanying Law and 3D Printing Bibliography. The published bibliography presented herein contains over 100 entries. The brief introductory comments to the published piece discuss the creation and contents of the bibliography, and provide suggestions for where one should begin their research in the area. The comments focus on (1) 3D printing‘s background, (2) historical growth pattern of law and 3D printing scholarship, (3) identification of …


Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Opening Remarks, 31 J. Marshall J. Info. Tech. & Privacy L. 521 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Dual-Use Devices In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 527 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: “Big Data”: Ownership, Copyright, And Protection, 31 J. Marshall J. Info. Tech. & Privacy L. 565 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Drafting And Implementing Effective Social Media Policies In The Workplace, 31 J. Marshall J. Info. Tech. & Privacy L. 549 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015) Jan 2015

Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim Jan 2015

Japanese And American Privacy Laws, Comparative Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015), Jane Kim

UIC John Marshall Journal of Information Technology & Privacy Law

To understand the laws of a foreign nation, one must first under-stand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not …


Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015) Jan 2015

Legal Problems In Data Management: The Impact Of International Data Restriction Laws On U.S. Companies, 31 J. Marshall J. Info. Tech. & Privacy L. 609 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015) Jan 2015

Legal Problems In Data Management: It & Privacy At The Forefront: Developments In Cybersecurity Law And Best Practices, 31 J. Marshall J. Info. Tech. & Privacy L. 587 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015) Jan 2015

Legal Problems In Data Management: Global Approach To Data Privacy: Safe Harbor, 31 J. Marshall J. Info. Tech. & Privacy L. 633 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer Jan 2015

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser Jan 2015

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Three Hundred Nos: An Empirical Analysis Of The First 300+ Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews Prior To In Re Cuozzo Speed Technologies, Llc, 14 J. Marshall Rev. Intell. Prop. L. 112 (2015), Jarrad Wood, Jonathan Stroud Jan 2015

Three Hundred Nos: An Empirical Analysis Of The First 300+ Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews Prior To In Re Cuozzo Speed Technologies, Llc, 14 J. Marshall Rev. Intell. Prop. L. 112 (2015), Jarrad Wood, Jonathan Stroud

UIC Review of Intellectual Property Law

Tasked in 2011 with creating powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeal Board—set to creating a fast-paced trial with limited discovery and concentrated efficiency. For two years, the proceedings have proved potent, holding unpatentable many of the claims that reached decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. The AIA exempted institution decisions from appellate …


Public Standards And Patent Damages, 14 J. Marshall Rev. Intell. Prop. L. 199 (2015), Ben Johnson Jan 2015

Public Standards And Patent Damages, 14 J. Marshall Rev. Intell. Prop. L. 199 (2015), Ben Johnson

UIC Review of Intellectual Property Law

Some markets require legislation in order to exist. The products and/or services offered by those markets may be covered by one or more letters patent. In certain of those markets, a situation arises in which a private party owns a right to exclude others from participating in that publicly-enabled market. These situations may be referred to “public standards.” Like their cousins in the private sector, public standards require special consideration when it comes to determining potential compensation to the patentee from its competitors. Following the lead of the Western District of Washington, this paper recommends a modification of the traditional …


Music As Cultural Heritage: Analysis Of The Means Of Preventing The Exploitation Of Intangible Cultural Heritage, 14 J. Marshall Rev. Intell. Prop. L. 228 (2015), Ronald Inawat Jan 2015

Music As Cultural Heritage: Analysis Of The Means Of Preventing The Exploitation Of Intangible Cultural Heritage, 14 J. Marshall Rev. Intell. Prop. L. 228 (2015), Ronald Inawat

UIC Review of Intellectual Property Law

What started out as a law school requirement quickly snowballed into an analysis of the relationship between intellectual property and cultural heritage. I am a music guy at heart, having played piano since I was five years old, having composed one song (after multiple tries), and now working directly with musicians and artists. So when I began researching a topic for an article that would connect the dots between the cultural heritage and its respective music, I could only come across legal doctrine and articles that focused heavily on tangible art and artifacts. So what happened to the music? After …


Bad News Birkins: Counterfeit In Luxury Brands, 14 J. Marshall Rev. Intell. Prop. L. 249 (2015), Colleen Jordan Orscheln Jan 2015

Bad News Birkins: Counterfeit In Luxury Brands, 14 J. Marshall Rev. Intell. Prop. L. 249 (2015), Colleen Jordan Orscheln

UIC Review of Intellectual Property Law

The luxury fashion industry spends millions of dollars each year fighting counterfeits, yet a fake Louis Vuitton bag is easily purchased on street corners around the world. Proponents of the counterfeits argue that the fakes translate to advertising for the brands, while the luxury brands argue that it damages the future of their brand. The counterfeit market has been linked to child labor, human trafficking, organized crime, and some terrorist groups. The current federal civil and criminal statutes exclude purchasers from prosecution and instead focus on the distributors of the goods. This comment proposes the strengthening of these laws by …


Patently Preempted, 14 J. Marshall Rev. Intell. Prop. L. 268 (2015), Nick Vogel Jan 2015

Patently Preempted, 14 J. Marshall Rev. Intell. Prop. L. 268 (2015), Nick Vogel

UIC Review of Intellectual Property Law

Small and medium size businesses often take advantage of the latest advancements in technology. Doing so, however, now seems to carry the risk of patent infringement. In 2012, so called patent trolls, also known as Non Practicing Entities, began sending letters to small and medium sized businesses demanding money in exchange for a license to use allegedly patented technology. Many saw the demands as an abuse of the patent system. In response, states have passed or are considering statutes that outlaw patent holders from delivering a bad faith notice of infringement. The State of Vermont was the first to address …


Did Copyright Kill The Radio Star? Why The Recorded Music Industry And Copyright Act Should Welcome Webcasters Into The Fold, 14 J. Marshall Rev. Intell. Prop. L. 292 (2015), Patrick Koncel Jan 2015

Did Copyright Kill The Radio Star? Why The Recorded Music Industry And Copyright Act Should Welcome Webcasters Into The Fold, 14 J. Marshall Rev. Intell. Prop. L. 292 (2015), Patrick Koncel

UIC Review of Intellectual Property Law

The Copyright Act has not kept pace with the times, and the next revolution is going full stream ahead. Rather than adapt, entrenched interests at the Copyright table push for more protection, while new technologies are demonized and underrepresented. The resulting Copyright Act’s provisions relating to internet-based radio, ranging from passive over-the-air broadcasts to fully interactive music hosting sites, are a patchwork of accommodations and concessions to these interests. For all non-interactive services, licensing music typically occurs within the Copyright Act’s compulsory licensing system. For interactive webcasters, licensing negotiations take place with the copyright holders directly. These negotiations have proven …


How Law Defines Art, 14 J. Marshall Rev. Intell. Prop. L. 314 (2015), Derek Fincham Jan 2015

How Law Defines Art, 14 J. Marshall Rev. Intell. Prop. L. 314 (2015), Derek Fincham

UIC Review of Intellectual Property Law

Defining art is both hard and subjective. But in lots of contexts the law must arrive at a just solution to hard and subjective questions. The art community has largely neglected the task of defining artworks. This neglect has crept into legal disputes, particularly those involving conceptual art which has loosened the limits of aesthetics, form, function, and composition. This makes crafting a definition of art even more challenging. Yet the Law has an important part to play in resolving art disputes—courts end up defining art no matter how cautiously they approach the question. They do not set out to …


Who's The Vandal? The Recent Controversy Over The Destruction Of 5pointz And How Much Protection Does Moral Rights Law Give To Authorized Aerosol Art?, 14 J. Marshall Rev. Intell. Prop. L. 326 (2015), Susanna Frederick Fischer Jan 2015

Who's The Vandal? The Recent Controversy Over The Destruction Of 5pointz And How Much Protection Does Moral Rights Law Give To Authorized Aerosol Art?, 14 J. Marshall Rev. Intell. Prop. L. 326 (2015), Susanna Frederick Fischer

UIC Review of Intellectual Property Law

This paper considers the extent to which federal moral rights law protects authorized graffiti and aerosol art against destruction, in the context of the controversy over the destruction of 5Pointz. 5Pointz, a sprawling complex of warehouse buildings in Queens, was a Mecca for aerosol art. The buildings’ owners ordered the demolition of 5Pointz after the November 2013 order by New York federal district judge Frederic Block denying the artists a preliminary injunction to stop destruction under the federal moral rights statute, the Visual Artists Rights Act (VARA). This paper argues that Judge Block erred in finding that the transient nature …


The Next Great Copyright Act And The Future Of Radio, 14 J. Marshall Rev. Intell. Prop. L. 378 (2015), Christopher Doval, Don Anque, Maesea Mccalpin Jan 2015

The Next Great Copyright Act And The Future Of Radio, 14 J. Marshall Rev. Intell. Prop. L. 378 (2015), Christopher Doval, Don Anque, Maesea Mccalpin

UIC Review of Intellectual Property Law

With the advancement of digital broadcasting technologies, the lack of a revision to copyright law has created a creative and distribution bottleneck for artists by companies. The current range for compulsory licensing agreements does not protect the interests of artists through modern digital transmission tools, and leaves them fending for themselves if they wish to have access to new digital platforms. Moreover organizations, such as the Recording Industry Association of America, are in greater positions of power when applying existing copyright laws and definitions to new technologies that innovators never intended to be analogous to pre-existing technologies to begin with. …


On Art Attacks: At The Confluence Of Shock, Appropriation, And The Law, 14 J. Marshall Rev. Intell. Prop. L. 392 (2015), Rachel Buker Jan 2015

On Art Attacks: At The Confluence Of Shock, Appropriation, And The Law, 14 J. Marshall Rev. Intell. Prop. L. 392 (2015), Rachel Buker

UIC Review of Intellectual Property Law

Does the law adequately recognize the expansive nature of art, especially in scenarios involving controversial acts of appropriation art? Of particular curiosity is just how the law should treat acts of artistic appropriation involving the creation of artwork on top of other original works of art, or art attacks. This is an issue that has been largely unaddressed by the courts outside the realm of criminal proceedings. However, the legal implications of such acts reach far beyond crimes and property torts, involving copyright, moral rights, freedom of expression, and the preservation of cultural heritage. Indeed, the issues are not just …