Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4441 - 4470 of 7422

Full-Text Articles in Science and Technology Law

Honey Get My Gun, The Transgenic Seeds Are In The Field Again, 11 J. Marshall Rev. Intell. Prop. L. 439 (2011), Christian B. Miller Jan 2011

Honey Get My Gun, The Transgenic Seeds Are In The Field Again, 11 J. Marshall Rev. Intell. Prop. L. 439 (2011), Christian B. Miller

UIC Review of Intellectual Property Law

The proliferation of genetically modified (“GM”) crops in the United States has dramatically increased in the past two decades. This increase has led to fears of dwindling biodiversity in this country’s staple crops. Consumer health and environmental advocates have attempted to slow the deregulation of such crops through administrative challenges. Such tactics were largely undermined in the 2010 Supreme Court case of Monsanto Co. v. Geertson. Anti-GM groups have subsequently attempted to invalidate patents for GM crops on moral grounds. This comment explores the futility of administrative and moral challenges to GM crop proliferation, and looks ahead to the proper …


The Conditional Sale Doctrine In A Post-Quanta World And Its Implications On Modern Licensing Agreements, 11 J. Marshall Rev. Intell. Prop. L. 295 (2011), William Lafuze, Justin Chen, Lavonne Burke Jan 2011

The Conditional Sale Doctrine In A Post-Quanta World And Its Implications On Modern Licensing Agreements, 11 J. Marshall Rev. Intell. Prop. L. 295 (2011), William Lafuze, Justin Chen, Lavonne Burke

UIC Review of Intellectual Property Law

The exclusive rights of a patent owner to exclude others from making, using, or selling patented inventions are limited by the doctrine of patent exhaustion. This doctrine, also known as the first sale doctrine, states that upon the first authorized sale of a patented article in the United States, the article is removed from the patent monopoly, thus losing its patent protection. As a result of this first sale, any subsequent use or sale of the patented article is not an infringement of its corresponding patent. The Federal Circuit further established the conditional sale doctrine in Mallinckrodt, Inc. v. Medipart, …


Nature Or Nurture: Is There A Case Basis For A Judicially Created ‘Product Of Nature’ Exclusion? Are Genes Somehow Different?, 11 J Marshall Rev. Intell. Prop. L. 318 (2011), W. Lesser Jan 2011

Nature Or Nurture: Is There A Case Basis For A Judicially Created ‘Product Of Nature’ Exclusion? Are Genes Somehow Different?, 11 J Marshall Rev. Intell. Prop. L. 318 (2011), W. Lesser

UIC Review of Intellectual Property Law

The Myriad Genetics decision has rekindled the product of nature debate. This article analyzes legal decisions spanning the past century for products ranging from plants to man-made elements, which in sum provide guidance to the patentability of genes. The product of nature argument it is concluded confuses rather than clarifies patentability considerations. Patentability in the evaluated cases as well as for genes can be resolved more precisely under the utility, non-obviousness, disclosure, and enablement patentability requirements without a need for any additional judicially-created stipulation. As regards genes, there is an additional dimension for consideration which in the case law and …


Paying It Forward: The Case For A Specific Statutory Limitation On Exclusive Rights For User-Generated Content Under Copyright Law, 11 J. Marshall Rev. Intell. Prop. L. 240 (2011), Warren B. Chik Jan 2011

Paying It Forward: The Case For A Specific Statutory Limitation On Exclusive Rights For User-Generated Content Under Copyright Law, 11 J. Marshall Rev. Intell. Prop. L. 240 (2011), Warren B. Chik

UIC Review of Intellectual Property Law

This article examines user-generated content (“UGC”) and the significance of re-inventions in the context of an increasingly user-centric internet environment and an information sharing society. It will explain the need to provide a statutory limitation in the form of an exception or exemption for socially beneficial UGC on the exclusive rights under copyright law. This will also have the effect of protecting the internet intermediary that hosts and shares UGC. Nascent but abortive attempts have been made by Canada to introduce just such a provision into her copyright legislation, while some principles and rules have also emerged from various interest …


Patent Law In The Antitrust Scope: Between Social Advancement And Competition Impingement, 11 J. Marshall Rev. Intell. Prop. L. 367 (2011), Yaniv Gal Jan 2011

Patent Law In The Antitrust Scope: Between Social Advancement And Competition Impingement, 11 J. Marshall Rev. Intell. Prop. L. 367 (2011), Yaniv Gal

UIC Review of Intellectual Property Law

In the past couple of decades, many scholars have debated the worthiness of the limited monopoly that patent law provides. The widespread attitude has always been, since the progress of the technological era, that in order to stimulate inventors and possessors of knowledge to embody their knowledge by innovative products, and produce ameliorations into society, they should be given strong proprietary rights over their innovative information and ideas. With the rise of the economic analysis of law, dissident opinions have been starting to emerge, evoking the social damage absorbed due to the current patent system monopoly character in form of …


Caveat Bibliotheca: The First Sale Doctrine And The Future Of Libraries After Omega V. Costco, 11 J. Marshall Rev. Intell. Prop. L. 414 (2011), Thomas J. Bacon Jan 2011

Caveat Bibliotheca: The First Sale Doctrine And The Future Of Libraries After Omega V. Costco, 11 J. Marshall Rev. Intell. Prop. L. 414 (2011), Thomas J. Bacon

UIC Review of Intellectual Property Law

Having discovered that several of its watches, which were manufactured in Europe, were imported into the United States and sold without authorization, Omega, S.A. ("Omega") commenced an action against Costco Wholesale Corp. in 2005. These watches are a typical example of what are referred to either as parallel imports or gray market goods. In finding for Omega, the Ninth Circuit held that the first sale doctrine does not apply to goods created or produced outside the United States. Such a rule, however, poses grave problems for libraries, in that circulation materials are not required to have a place of manufacture …


The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price Jan 2011

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti Jan 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak Jan 2011

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Nexus Crystals: Crystallizing Limits On Contractual Control Of Virtual Worlds, Joshua A.T. Fairfield Jan 2011

Nexus Crystals: Crystallizing Limits On Contractual Control Of Virtual Worlds, Joshua A.T. Fairfield

Scholarly Articles

Can a video game developer or publisher successfully sue a video game player for copyright infringement for not “playing a game nicely,” “cheating,” or “buying software from a third party”? This article suggests a new reason why it cannot.

The founding social contract of the new millennium is the End User License Agreement (EULA), not the U.S. Constitution. Website terms of use (TOU) and software EULAs now have an enormous impact on how citizens must act and how their rights and redresses are defined. EULAs contain not only traditional intellectual property licensing conditions but complicated directives regarding what members of …


A Case For Coordinating Economic Development Planning With Energy Planning, Leighton Lord, Jeff Ruble Jan 2011

A Case For Coordinating Economic Development Planning With Energy Planning, Leighton Lord, Jeff Ruble

South Carolina Journal of International Law and Business

No abstract provided.


Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. §230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Scholarly Works

This paper discusses the growth and increasing significance of e-mail in the business and personal environment, and how unsolicited bulk commercial e-mail, also known as spam, has become a significant drain on technical and economic resources. It analyzes the statutory and self-help efforts to combat spam, with a specific focus on block lists and automated spam filters, and describes how alleged spammers have brought lawsuits in U.S. courts claiming they had been wrongfully included within block lists and filters. Finally, it describes some possible claims under U.S. law, then argues for a revision to current statutes to mandate a higher …


Is Internet Exceptionalism Dead?, Tim Wu Jan 2011

Is Internet Exceptionalism Dead?, Tim Wu

Faculty Scholarship

Is there such a thing as Internet exceptionalism? If so, just what is the Internet an exception to? It may appear technical, but this is actually one of the big questions of our generation, for the Internet has shaped the United States and the world over the last twenty years in ways people still struggle to understand. The question is not merely academic. The greatest Internet firms can be succinctly defined as those that have best understood what makes the Internet different.


Eyes On A Climate Prize: Rewarding Energy Innovation To Achieve Climate Stabilization, Jonathan H. Adler Jan 2011

Eyes On A Climate Prize: Rewarding Energy Innovation To Achieve Climate Stabilization, Jonathan H. Adler

Faculty Publications

Stabilizing atmospheric concentrations of greenhouse gases at double their pre-industrial levels (or lower) will require emission reductions far in excess of what can be achieved with current or projected levels of technology at a politically acceptable cost. Substantial technological innovation is required if the nations of the world are to come anywhere close to proposed emission reduction targets. Neither traditional federal support for research and development of new technologies nor traditional command-and-control regulations are likely to spur sufficient innovation. Technology inducement prizes, on the other hand, have the potential to incentivize and accelerate the rate of technological innovation in the …


Masthead, Volume 2 Issue 1 (2011) Jan 2011

Masthead, Volume 2 Issue 1 (2011)

Journal of Law, Technology, & the Internet

No abstract provided.


Volume 2 Issue 1 (2011), Journal Of Law, Technology, & The Internet Jan 2011

Volume 2 Issue 1 (2011), Journal Of Law, Technology, & The Internet

Journal of Law, Technology, & the Internet

No abstract provided.


Reverse Payments: When The Federal Trade Commission Can Attack The Validity Of Underlying Patents, Gabrielle Lahatte Jan 2011

Reverse Payments: When The Federal Trade Commission Can Attack The Validity Of Underlying Patents, Gabrielle Lahatte

Journal of Law, Technology, & the Internet

No abstract provided.


Collateral Damage: Insecurity Assets In The Rising Virtual Age Of E-Commerce, Steven Chang Jan 2011

Collateral Damage: Insecurity Assets In The Rising Virtual Age Of E-Commerce, Steven Chang

Journal of Law, Technology, & the Internet

No abstract provided.


Pay Per Click: Keyword Advertising And The Search For Limitations Of Online Trademark Infringement Liability, Thomas H. Watson Jan 2011

Pay Per Click: Keyword Advertising And The Search For Limitations Of Online Trademark Infringement Liability, Thomas H. Watson

Journal of Law, Technology, & the Internet

No abstract provided.


Masthead, Volume 2 Issue 2 (2011) Jan 2011

Masthead, Volume 2 Issue 2 (2011)

Journal of Law, Technology, & the Internet

No abstract provided.


Volume 2 Issue 2 (2011), Case Western Reserve Journal Of Law, Technology & The Internet Jan 2011

Volume 2 Issue 2 (2011), Case Western Reserve Journal Of Law, Technology & The Internet

Journal of Law, Technology, & the Internet

No abstract provided.


Short-Sighted Value Of Inefficiency: Why We Should Mind The Gap In The Reimbursement Of Outpatient Prescription Drugs, The, Jennifer L. Herbst Jan 2011

Short-Sighted Value Of Inefficiency: Why We Should Mind The Gap In The Reimbursement Of Outpatient Prescription Drugs, The, Jennifer L. Herbst

Journal of Law, Technology, & the Internet

No abstract provided.