Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (64)
- Computer Law (45)
- Internet Law (44)
- Privacy Law (41)
- Law and Society (19)
-
- Law and Economics (16)
- Constitutional Law (13)
- Courts (13)
- Dispute Resolution and Arbitration (10)
- Health Law and Policy (10)
- Legal Education (10)
- Social and Behavioral Sciences (10)
- Legal Ethics and Professional Responsibility (9)
- Judges (8)
- Communications Law (7)
- Administrative Law (6)
- Comparative and Foreign Law (6)
- Entertainment, Arts, and Sports Law (6)
- Legislation (6)
- Criminal Procedure (5)
- Economics (5)
- Environmental Law (5)
- Law and Politics (5)
- Antitrust and Trade Regulation (4)
- Evidence (4)
- Fourth Amendment (4)
- International Law (4)
- Public Affairs, Public Policy and Public Administration (4)
- Institution
-
- UIC School of Law (37)
- BLR (19)
- Schulich School of Law, Dalhousie University (16)
- University of Michigan Law School (11)
- SelectedWorks (7)
-
- Duke Law (6)
- University of Pennsylvania Carey Law School (6)
- Maurer School of Law: Indiana University (4)
- Selected Works (4)
- Boston University School of Law (3)
- American University Washington College of Law (2)
- Columbia Law School (2)
- Georgetown University Law Center (2)
- University of Oklahoma College of Law (2)
- Villanova University Charles Widger School of Law (2)
- Washington and Lee University School of Law (2)
- Case Western Reserve University School of Law (1)
- Lewis & Clark Law School (1)
- New York Law School (1)
- Penn State Law (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Massachusetts Amherst (1)
- University of Missouri-Kansas City School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of New Hampshire (1)
- University of Richmond (1)
- University of San Diego (1)
- Vanderbilt University Law School (1)
- Keyword
-
- Science and Technology (19)
- Technology (12)
- Intellectual Property Law (9)
- Corte Suprema de la República Argentina (8)
- Law and Society (8)
-
- Patent law (6)
- Case comment (5)
- Computer Law (5)
- Environmental Law (5)
- Health Law and Policy (5)
- Patents (5)
- Biotechnology (4)
- Copyright (4)
- Innovation (4)
- Internet (4)
- Law and Economics (4)
- Patents & Technology (4)
- Searches (4)
- Arts and Entertainment (3)
- Bioethics (3)
- Communications Law (3)
- Comparative and Foreign Law (3)
- Constitutional Law (3)
- Economics (3)
- Federal Circuit (3)
- Human Rights Law (3)
- Katz v. United States (3)
- Legislation (3)
- Medical Jurisprudence (3)
- Politics (3)
- Publication
-
- ExpressO (19)
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- UIC Review of Intellectual Property Law (17)
- Canadian Journal of Law and Technology (16)
- Horacio M. LYNCH (8)
-
- All Faculty Scholarship (7)
- Faculty Scholarship (7)
- Duke Law & Technology Review (4)
- Michigan Law Review (4)
- Michigan Telecommunications & Technology Law Review (4)
- Articles by Maurer Faculty (3)
- Georgetown Law Faculty Publications and Other Works (2)
- Oklahoma Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Villanova Law Review (2)
- American University Law Review (1)
- Animal Law Review (1)
- Articles (1)
- Articles & Chapters (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Books (1)
- Faculty Publications (1)
- Faculty Works (1)
- Indiana Journal of Global Legal Studies (1)
- Jennifer M. Urban (1)
- Laura Quilter (1)
- Law Faculty Publications (1)
- Law Faculty Scholarship (1)
- Marren Sanders (1)
- Nevada Law Journal (1)
- Publication Type
- File Type
Articles 1 - 30 of 138
Full-Text Articles in Science and Technology Law
Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz
Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz
ExpressO
No abstract provided.
Re-Reifying Data, James Gibson
Re-Reifying Data, James Gibson
Law Faculty Publications
There's a war on between those who view digital technology as a reason to expand intellectual property law and those who oppose this expansion. One front in the war is technological: the pro-expansionists enclose their products in restrictive code, which the anti-expansionists circumvent and hack. A second is legislative: the pro-expansionists seek extended copyright duration, favorable changes to contract law, and other new legal entitlements, while the anti-expansionists lobby for the opposite. And a third front is a combination of the first two: it is technological. On this battlefield, the pro-expansionists use the law to fortify their technological protections. But …
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Laura Quilter
No abstract provided.
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner
Jennifer M. Urban
No abstract provided.
Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola
Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola
Michigan Telecommunications & Technology Law Review
Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …
The Experimental Purpose Doctrine And Biomedical Research, Tao Huang
The Experimental Purpose Doctrine And Biomedical Research, Tao Huang
Michigan Telecommunications & Technology Law Review
The experimental use doctrine is a common law rule in patent law that until a few years ago excused accused infringers who made and used patented products or processes on the basis of an experimental, educational, or nonprofit purpose when there was de minimis economic injury to the patent owner and de minimis economic gain to the infringer. While the application of the experimental purpose doctrine was always narrow, two recent Federal Circuit decisions indicate that there is not much left under its aegis. In Madey v. Duke University, the Federal Circuit strictly limited the application of the experimental purpose …
Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine
Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine
Michigan Telecommunications & Technology Law Review
Some inventions never see the light of day. Others enter the spotlight after long delays and the factors that slowed the arrival of that innovation are ignored. Technology suppression is a real occurrence involving well known and widely used products. In this Article, we examine the topic of technology suppression, seeking to reveal the tactics of suppression and the patterns and conditions under which it occurs. Current examples of US technologies are used to highlight the significance of this phenomenon. We consider related factors, including market and innovation forces, and we identify suppressive tactics, using illustrative cases where patent nonuse …
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Electronic Discovery Sanctions In The Twenty-First Century, Shira A. Scheindlin, Kachana Wangkeo
Michigan Telecommunications & Technology Law Review
At the federal level, the Civil Rules Advisory Committee has responded to the "unique and necessary feature of computer systems--the automatic recycling, overwriting, and alteration of electronically stored information"--with a proposed amendment to Rule 37. The proposed Rule 37(f) would shield litigants from sanctions for the destruction of electronic data if the party "took reasonable steps to preserve the information after it knew or should have known the information was discoverable in the action" and "the failure resulted from the loss of the information because of the routine operation of the party's electronic information system." The safe harbor provision would …
An Examination Of Patents, Licensing, Research Tools, And The Tragedy Of The Anticommons In Biotechnology Innovation, Michael S. Mireles
An Examination Of Patents, Licensing, Research Tools, And The Tragedy Of The Anticommons In Biotechnology Innovation, Michael S. Mireles
University of Michigan Journal of Law Reform
The continued development of and affordable access to potentially life saving pharmaceuticals, gene therapies and diagnostics is unquestionably a socially important issue. However, crafting government policy to encourage the development of and allowing affordable access to those services and products is difficult. On one hand, the development of those services and products requires a large investment of funds because of the complexity, collaborative nature, and uncertainty of the development of those products and services. Accordingly, investors require the safety of strong and stable patent rights to ensure a return on their investment in the development of a commercial end-product or …
Terrorism, Technology, And Information Privacy: Finding The Balance, Fred H. Cate
Terrorism, Technology, And Information Privacy: Finding The Balance, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
Ancillary Joint Ventures And The Unanswered Questions After Revenue Ruling 2004-51, Gabriel O. Aitsebaomo
Ancillary Joint Ventures And The Unanswered Questions After Revenue Ruling 2004-51, Gabriel O. Aitsebaomo
ExpressO
Ever since the Internal Revenue Service (the "Service") issued Revenue Ruling 98-15… in which it emphasized "control" as a critical factor in determining whether a tax-exempt hospital that enters into a whole-hospital joint venture with a for-profit entity would continue to maintain its tax-exemption, practitioners and scholars alike have sought guidance from the Service regarding whether such "control" would also be required of an exempt organization that enters into an "ancillary joint venture" with a for-profit entity. In response, the Service issued Revenue Ruling 2004-51 on May 6, 2004.
… In Revenue Ruling 2004-51, the Service enunciated that a tax-exempt …
Protecting The Next Small Thing: Nanotechnology And The Reverse Doctrine Of Equivalents, Andrew Wasson
Protecting The Next Small Thing: Nanotechnology And The Reverse Doctrine Of Equivalents, Andrew Wasson
Duke Law & Technology Review
If even a fraction of the predictions about nanotechnology are realized, our society will be a dramatically different and better place than it is today. Yet, due to the infancy of the field, it is still unclear how traditional patent doctrine will be applied to nanotechnology. As it stands, the creators of nanoscale versions of traditional products might face infringement claims from traditional patent holders. The reverse doctrine of equivalents serves as a possible mechanism to equitably excuse the literal infringement of traditional patents by nanotech inventors in a way that encourages the progress of science.
Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves
Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves
ExpressO
No abstract provided.
Privacy Concerns Regarding The Monitoring Of Instant Messaging In The Workplace: Is It Big Brother Or Just Business?, Ira David
Nevada Law Journal
No abstract provided.
On Software Regulation, Polk Wagner
On Software Regulation, Polk Wagner
All Faculty Scholarship
This Article develops a novel analytic framework for the evaluation of regulatory policy in cyberspace, flowing from a reconceptualization of cyberlaw’s central premise: software code as complementary to law rather than its substitute. This approach emphasizes the linkage between law and software; for every quantum of legal-regulatory impact, there is a corresponding equilibria of regulation-bysoftware. The absence of a legal right will stimulate a technological response—and such incentives will moderate with increased rights. Rather than “code is law,” this is “code meets law.” The implications of this methodological shift are explored in the context of the emerging (and intensely controversial) …
Owning Music: From Publisher's Privilege To Composer's Copyright, Michael W. Carroll
Owning Music: From Publisher's Privilege To Composer's Copyright, Michael W. Carroll
ExpressO
More than four years after Napster demonstrated the power of the Internet as a means of distributing music, we still are in the midst of a cultural and legal debate about what the respective rights of music copyright owners, follow-on creators, disseminators, and purchasers should be. A common assumption underlying much of the debate is that whatever settlement emerges, it will apply equally to all forms of expression. This Article questions that assumption by investigating the early history of copyright in music.
For the first time in legal scholarship, the Article reveals and examines the distinct early history of copyright …
Media Policy Out Of The Box: Content Abundance, Attention Scarcity, And The Failures Of Digital Markets, Ellen P. Goodman
Media Policy Out Of The Box: Content Abundance, Attention Scarcity, And The Failures Of Digital Markets, Ellen P. Goodman
ExpressO
No abstract provided.
Clasificación De Las Causas De La Revocación De Sentencias Por Operación Del Recurso Extraordinario (Gráficos), Horacio M. Lynch
Clasificación De Las Causas De La Revocación De Sentencias Por Operación Del Recurso Extraordinario (Gráficos), Horacio M. Lynch
Horacio M. LYNCH
No abstract provided.
Case Comment: Society Of Composers, Authors And Music Publishers Of Canada V. Canadian Association Of Internet Service Providers, Barry Sookman
Case Comment: Society Of Composers, Authors And Music Publishers Of Canada V. Canadian Association Of Internet Service Providers, Barry Sookman
Canadian Journal of Law and Technology
The exponential growth of the Internet has raised serious issues related to liability for copyright infringement. Who should compensate authors and publishers for the use of their works? What activities constitute infringement? Are Internet intermediaries such as Internet service providers (ISPs) liable for infringement when they provide connectivity to subscribers, when they provide hosting services, or when they use caching technologies? Where does infringement occur? Is the scope of the Copyright Act limited to acts of infringement that occur wholly within Canada or does the Act apply to acts that take place partly in Canada and partly outside of Canada? …
Three Years Under The Pipeda: A Disappointing Beginning, Christopher Berzins
Three Years Under The Pipeda: A Disappointing Beginning, Christopher Berzins
Canadian Journal of Law and Technology
As of January 1, 2004, after a three-year phase-in period, the Personal Information Protection and Electronic Documents Act (PIPEDA) came fully into force. Although considerable uncertainty currently prevails due to unanticipated events such as the resignation and replacement of Commissioner George Radwanski and the late constitutional challenge by Quebec, there is now sufficient experience with the legislation to begin to assess how the PIPEDA is working. It is also a timely juncture to do so with the extension of the legislation to the provincially regulated private sector.
Privacy Of Genetic Information In Canada: A Brief Examination Of The Legal And Ethical Tools That Should Frame Canada's Regulatory Response, Stephen Orr
Canadian Journal of Law and Technology
This article investigates the legal and ethical tools that should inform Canada's regulation of the privacy of genetic information. We are the first generation faced with resolving the unique challenges presented by genetic information. Unfortunately, the patchwork of instruments that could regulate genetic information in Canada is insufficient. The prospect of Canadians increasingly generating genetic information without a satisfactory structure for protecting the information is rather alarming. It is therefore important that we commit to reexamining regulations regarding genetic information. Different loci of governance will likely be required. Canada should look to international law and comparative law for inspiration regarding …
Video Surveillance, Evidence And Pipeda: A Comment On Ferenszy V. Mci Medical Clinic, Anne Uteck
Video Surveillance, Evidence And Pipeda: A Comment On Ferenszy V. Mci Medical Clinic, Anne Uteck
Canadian Journal of Law and Technology
One of the most common uses of surveillance is in the area of evidence gathering for investigation by litigators. Private investigators have long been retained for this purpose, and law enforcement officers routinely utilize surveillance devices to assist in the prosecution of a crime. The admissibility of video surveillance evidence obtained by private and government investigators is obviously not a new issue. What has come to the fore- front is the application of the Personal Information Protection and Electronic Documents Act in the context of video surveillance evidence, and its impact on civil litigators. Privacy interests inherent in the collection, …
No Lego, Yes Logo: The Federal Court Of Appeal Protects Innovation In Kirkbi Ag And Lego Canada Inc. V. Ritvik Holdings Inc., Sean Robertson
No Lego, Yes Logo: The Federal Court Of Appeal Protects Innovation In Kirkbi Ag And Lego Canada Inc. V. Ritvik Holdings Inc., Sean Robertson
Canadian Journal of Law and Technology
This article will discuss the case at the trial and appellate levels. It will specifically address the underlying policy debate between the majority and the dissenting decisions at the Federal Court of Appeal. The author will compare this debate to two similar international cases involving Lego’s infamous intellectual property litigation. With this recent finding in the 40-year-old saga of international case law surrounding Lego’s trade-mark enforcement strategy, the Appeal Division of the Federal Court of Canada joins the ranks of several other courts that have similarly excluded protection for Lego based on the doctrine of functionality. The comment concludes with …
The Law Of Privacy In Canada (Student Edition) By Barbara A. Mcisaac, Rick Shields, Kris Klein (Toronto: Thomson Carswell, 2004), John D. Gregory
The Law Of Privacy In Canada (Student Edition) By Barbara A. Mcisaac, Rick Shields, Kris Klein (Toronto: Thomson Carswell, 2004), John D. Gregory
Canadian Journal of Law and Technology
To help lawyers advise their clients on their rights and obligations in this complex and novel field, the various legal publishers have offered an array of guides and textbooks analyzing the law of privacy. Thomson/Carswell turned for its book to the national law firm of McCarthy Tétrault. Three McCarthy lawyers (Barbara McIsaac, Rick Shields, and Kris Klein) are listed as authors of The Law of Privacy in Canada, and several others have contributed significant parts of the text, and they have done a creditable job in pulling it all together. It seems to be the only thorough and up-to-date analysis …
Rethinking The Unilateral Application Of The Lanham Act, Jinku Hwang
Rethinking The Unilateral Application Of The Lanham Act, Jinku Hwang
ExpressO
No abstract provided.
Amicus Curiae: Intervención De Amigos Del Tribunal, Horacio M. Lynch, María Clara Pujol
Amicus Curiae: Intervención De Amigos Del Tribunal, Horacio M. Lynch, María Clara Pujol
Horacio M. LYNCH
Cuadro realizado en base a la Acordada 28/2004 (14Jul04) de la Corte Suprema de Justicia de la Nación.
Diamond V. Chakrabarty: Gauging Congress’ Response To Dynamic Statutory Interpretation By The Supreme Court , Anna E. Lumelsky
Diamond V. Chakrabarty: Gauging Congress’ Response To Dynamic Statutory Interpretation By The Supreme Court , Anna E. Lumelsky
ExpressO
In this article, I consider the 1980 Supreme Court decision, Diamond v. Chakrabarty, and Congress’ response to it in light of several contemporary views on statutory interpretation. I conclude that in science and technology-related cases in which delay could significantly hamper the advancement of the field, the Supreme Court should interpret federal statutes dynamically in response to a changing social context, but should also attempt to conform its interpretations to legislative preferences in order to avoid a legislative override.
The Parent Trap: Uncovering The Myth Of "Coerced Parenthood" In Frozen Embryo Disputes, Ellen Waldman
The Parent Trap: Uncovering The Myth Of "Coerced Parenthood" In Frozen Embryo Disputes, Ellen Waldman
American University Law Review
No abstract provided.
Reingeniería De La Corte Suprema De La Nación 2: Información Sobre La Tarea Del Alto Tribunal, Horacio M. Lynch, María Clara Pujol
Reingeniería De La Corte Suprema De La Nación 2: Información Sobre La Tarea Del Alto Tribunal, Horacio M. Lynch, María Clara Pujol
Horacio M. LYNCH
La información es clave para tomar decisiones. En el trabajo REINGENIERÍA (1) hicimos amplia referencia a la información en general (para el tribunal, las partes, el público, el extranjero). En este caso nos limitamos a uno sólo de estos aspectos: la información sobre la tarea de la Corte con el exclusivo propósito de dar fundamentos a las propuestas de cambio que se sugieran.