Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

17,066 Full-Text Articles 11,684 Authors 10,798,193 Downloads 209 Institutions

All Articles in Intellectual Property Law

Faceted Search

17,066 full-text articles. Page 1 of 542.

Jurisdictional Issues For Cross-Border Copyright Infringement: A Study On Fansite Products, Naura Nabila Ikhsani Aulia Wibowo 2024 Bahar Law Consulting

Jurisdictional Issues For Cross-Border Copyright Infringement: A Study On Fansite Products, Naura Nabila Ikhsani Aulia Wibowo

Journal of Private International Law Studies

Korean pop (K-Pop) and its fandom culture have penetrated Indonesia, resulting in a flourishing K-pop product sector. Fansite goods, fan-made merchandise originating in Korea, are one of the most popular merchandise among fans. However, because Indonesian fans' purchasing power is still restricted, many of them resort to copyright infringement of fansite goods in order to either own or gain profit from the merchandise. This article will explain whether fansite goods are protected by copyright from which country, and if so, which jurisdiction and law is applicable to rule on a dispute of fansite goods copyright infringement perpetrated by an Indonesian …


The Evolving Scope Of Ipr Estoppel As Applied To System And Product Prior Art, Michael Rueckheim, Richard Jung 2024 Chicago-Kent College of Law

The Evolving Scope Of Ipr Estoppel As Applied To System And Product Prior Art, Michael Rueckheim, Richard Jung

Chicago-Kent Journal of Intellectual Property

No abstract provided.


Consider The Grecian Urn: Why Prior Art Has No Place In Analyzing Substantial Similarity Under The Copyright Act, Steven T. Lowe, Scott Alan Burroughs 2024 Chicago-Kent College of Law

Consider The Grecian Urn: Why Prior Art Has No Place In Analyzing Substantial Similarity Under The Copyright Act, Steven T. Lowe, Scott Alan Burroughs

Chicago-Kent Journal of Intellectual Property

No abstract provided.


The Ethics Of Patents In The Medical Field: An Analysis Of Drug And Pharmaceutical Patents And Their Enforcement In The U.S. And France, Andrew Slutsky 2024 Chicago-Kent College of Law

The Ethics Of Patents In The Medical Field: An Analysis Of Drug And Pharmaceutical Patents And Their Enforcement In The U.S. And France, Andrew Slutsky

Chicago-Kent Journal of Intellectual Property

No abstract provided.


Ipr Estoppel And A Search For The Skilled Searcher Standard, Gabriel Steinberg 2024 Chicago-Kent College of Law

Ipr Estoppel And A Search For The Skilled Searcher Standard, Gabriel Steinberg

Chicago-Kent Journal of Intellectual Property

Interpretation of post-AIA IPR estoppel, codified in U.S.C. § 315(e)(2), is an issue at the forefront of patent litigation and plays an important role in the litigation process and strategy. The Federal Cir-cuit’s April 2023 ruling in Ironburg Inventions Ltd. v. Valve Corp., adopted the “skilled searcher standard” and provided some clarity re-garding the meaning of the § 315(e)(2) language, “reasonably could have raised.” While Ironburg did hold that prior art which “reasonably could have been raised” is that which “a skilled searcher conducting a diligent search reasonably would have been expected to discover,” questions pertaining to what exactly is …


Iconic Copiestm, Felicia Caponigri 2024 Chicago-Kent College of Law

Iconic Copiestm, Felicia Caponigri

Chicago-Kent Journal of Intellectual Property

There is a word that is prevalent today in marketing campaigns, ed-itorials, and our everyday language: iconic. “Iconic” is not only preva-lent as a word in everyday life. Iconic can also have legal significance. As I introduce in this article, the concept of iconic and its use by brands in trademark registrations, oppositions, and litigation has significant and underappreciated consequences under the law. There has yet been no study on the word “iconic” or the legal significance of iconic, de-spite the word’s creeping use in legal filings and claims. My article fills this gap by introducing the concept of iconic …


Review Of Patent Owner Estoppel Under 37 C.F.R. § 42.73(D), Daniel Sloan, Sarah Geers, Jack Graves, Sabrina Bellantoni, Matt Johnson 2024 Chicago-Kent College of Law

Review Of Patent Owner Estoppel Under 37 C.F.R. § 42.73(D), Daniel Sloan, Sarah Geers, Jack Graves, Sabrina Bellantoni, Matt Johnson

Chicago-Kent Journal of Intellectual Property

No abstract provided.


How Redistricting Affects Native Representation: The Turtle Mountain Band Of Chippewa, Ryland Mahre 2024 Seattle University School of Law

How Redistricting Affects Native Representation: The Turtle Mountain Band Of Chippewa, Ryland Mahre

American Indian Law Journal

No abstract provided.


Digital Allotment And Vanishing Indians: Idsov And Llms, Sam McVeety 2024 University of Washington

Digital Allotment And Vanishing Indians: Idsov And Llms, Sam Mcveety

American Indian Law Journal

No abstract provided.


Participation In Paradise?: Indigenous Participation And Environmental Decisionmaking In HawaiʻI, Lindsay Peterson 2024 Florida State University

Participation In Paradise?: Indigenous Participation And Environmental Decisionmaking In HawaiʻI, Lindsay Peterson

American Indian Law Journal

No abstract provided.


Obtaining Trademark Registration For Marks Containing Political Commentary: A Look Into Vidal V. Elster, Annick Runyon 2024 University of Miami School of Law

Obtaining Trademark Registration For Marks Containing Political Commentary: A Look Into Vidal V. Elster, Annick Runyon

University of Miami Law Review

For decades, courts have struggled with balancing trademark law with the First Amendment—specifically with cases challenging the denial of trademark registration of certain marks. Congress codified trademark registration through the Lanham Act, also known as the Trademark Act of 1946. This statute outlines the registration process and expands the rights of trademark owners. In recent years, a string of cases have ruled certain provisions of the Lanham Act that bar certain marks from registration unconstitutional.

Currently under review by the Supreme Court, the case Vidal v. Elster involves an applicant who was denied trademark registration for his mark “Trump Too …


Limitations And Exceptions In The Wipo Instrument On Genetic Resources And Associated Traditional Knowledge, Sean Flynn 2024 American University Washington College of Law

Limitations And Exceptions In The Wipo Instrument On Genetic Resources And Associated Traditional Knowledge, Sean Flynn

Joint PIJIP/TLS Research Paper Series

One of the hot topics in the World Intellectual Property Organization (WIPO) diplomatic conference on an instrument on “Intellectual Property, Genetic Resources and Traditional Knowledge Associated with Genetic Resources” is whether and what exceptions language should be included in the text. At the brief public report from Committee I on May 15, 2024, the Chair reported: “There appears to be adequate support for eliminating Article 4, limitations and exceptions. Some parties opposed.” This Blog provides some background information on the Article and analysis of potentially applicable models and concepts for the provision, including analysis of similar treaties with no exceptions.


Era Of Confusion: The State Of Patent Eligibility Jurisprudence And The Need For Intervention, Alyssa Boggs 2024 St. Mary's University

Era Of Confusion: The State Of Patent Eligibility Jurisprudence And The Need For Intervention, Alyssa Boggs

St. Mary's Law Journal

No abstract provided.


Sanctions For Non Disclosure, As Set Out In Article 6 Of The Wipo Basic Proposal On Intellectual Property, Genetic Resources And Traditional Knowledge, Should Include Possible Revocation Of A Patent, James Love, Claire Cassedy 2024 Knowledge Ecology International (KEI)

Sanctions For Non Disclosure, As Set Out In Article 6 Of The Wipo Basic Proposal On Intellectual Property, Genetic Resources And Traditional Knowledge, Should Include Possible Revocation Of A Patent, James Love, Claire Cassedy

Joint PIJIP/TLS Research Paper Series

The basic proposal for an international legal instrument relating to intellectual property, genetic resources and traditional knowledge associated with genetic resources prepared by the World Intellectual Property Organization (WIPO) Secretariat (GRATK/DC/3) sets out in its Article 3 a narrow obligation to disclose (1) the country of origin of the genetic resource, or if not known, its source, and (2) the Indigenous Peoples or local community that provided traditional knowledge associated with the genetic resource, or the source of such knowledge.

Article 6 of the basic proposal sets out the sanctions and remedies for failures to make such disclosures. Among the …


A Right To Republish: Redesigning Copyright Law For Research Works, Faith O. Majekolagbe 2024 University of Minnesota Law School

A Right To Republish: Redesigning Copyright Law For Research Works, Faith O. Majekolagbe

Minnesota Journal of Law, Science & Technology

No abstract provided.


Generative Ai, Plagiarism, And Copyright Infringement In Legal Documents, Amy B. Cyphert 2024 University of Minnesota Law School

Generative Ai, Plagiarism, And Copyright Infringement In Legal Documents, Amy B. Cyphert

Minnesota Journal of Law, Science & Technology

No abstract provided.


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel 2024 University at Albany, SUNY

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie 2024 Washington State University

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, LTC Ekzhin Ear, Dr. Shouhuai Xu 2024 University of Colorado, Colorado Springs (UCCS)

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar 2024 University at Albany

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Digital Commons powered by bepress