Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Intellectual property (4)
- Copyright (3)
- Privacy (3)
- Apple (2)
- BIPA (2)
-
- Biometric (2)
- Consumer protection (2)
- EULA (2)
- Google (2)
- Hacking (2)
- IP (2)
- Litigation (2)
- Microsoft (2)
- Patent (2)
- Samsung (2)
- Social media (2)
- Terms of service (2)
- 3ds (1)
- AG (1)
- ANDA (1)
- Actavis (1)
- Algorithmic Bias (1)
- Alice (1)
- Allegran (1)
- Amazon (1)
- American Indian (1)
- Anticommons (1)
- Arbitration (1)
- Aro Mfg (1)
- Art (1)
Articles 1 - 30 of 34
Full-Text Articles in Law
Care For A Sample? De Minimis, Fair Use, Blockchain, And An Approach To An Affordable Music Sampling System For Independent Artists, Sean M. Corrado
Care For A Sample? De Minimis, Fair Use, Blockchain, And An Approach To An Affordable Music Sampling System For Independent Artists, Sean M. Corrado
Fordham Intellectual Property, Media and Entertainment Law Journal
Thanks, in part, to social media and the digital streaming age of music, independent artists have seen a rise in popularity and many musicians have achieved mainstream success without the affiliation of a major record label. Alongside the growth of independent music has come the widespread use of music sampling. Sampling, which was once depicted as a crime perpetrated by hip-hop artists, is now prevalent across charttopping hits from all genres. Artists have used sampling as a tool to integrate cultures, eras, and styles of music while experimenting with the bounds of musical creativity. Artists whose works are sampled have …
Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley
Data Scraping As A Cause Of Action: Limiting Use Of The Cfaa And Trespass In Online Copying Cases, Kathleen C. Riley
Fordham Intellectual Property, Media and Entertainment Law Journal
In recent years, online platforms have used claims such as the Computer Fraud and Abuse Act (“CFAA”) and trespass to curb data scraping, or copying of web content accomplished using robots or web crawlers. However, as the term “data scraping” implies, the content typically copied is data or information that is not protected by intellectual property law, and the means by which the copying occurs is not considered to be hacking. Trespass and the CFAA are both concerned with authorization, but in data scraping cases, these torts are used in such a way that implies that real property norms exist …
A Patent Reformist Supreme Court And Its Unearthed Precedent, Samuel F. Ernst
A Patent Reformist Supreme Court And Its Unearthed Precedent, Samuel F. Ernst
Fordham Intellectual Property, Media and Entertainment Law Journal
How is it that the Supreme Court, a generalist court, is leading a project of innovation reform in our times while the court of appeals established to encourage innovation is having its precedent stricken down time and again? This decade the Supreme Court has issued far more patent law decisions than in any decade since the passage of the Patent Act of 1952. In doing so, the Supreme Court has overruled the Federal Circuit in roughly threequarters of the patent cases in which the Supreme Court has issued opinions. In most of these cases, the Supreme Court has established rules …
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon
Fordham Intellectual Property, Media and Entertainment Law Journal
Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.
After objectively selecting and analyzing …
Barbie In Bondage: What Orly Lobel’S Book “You Don’T Own Me: How Mattel V. Mga Entertainment Exposed Barbie’S Dark Side” Tells Us About The Commoditization Of The Female Body, Ann Bartow
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen
Shopping For Privacy: How Technology In Brick-And-Mortar Retail Stores Poses Privacy Risks For Shoppers, Vincent Nguyen
Fordham Intellectual Property, Media and Entertainment Law Journal
As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy …
Laundering The Art Market: A Proposal For Regulating Money Laundering Through Art In The United States, Alessandra Dagirmanjian
Laundering The Art Market: A Proposal For Regulating Money Laundering Through Art In The United States, Alessandra Dagirmanjian
Fordham Intellectual Property, Media and Entertainment Law Journal
As high-net worth individuals have increasingly viewed art as a method of diversifying their portfolios, prices in the high-end global art market have exploded in the past several years. At the same time, investors have developed new methods for accessing art’s liquidity, such as art lending services and exchanges. While the changing character of art towards an asset class has opened the door to new investment opportunities, it has also left the art market particularly vulnerable to money laundering schemes. Existing characteristics of the art market, including a lack of uniform record-keeping standards among dealers and the speculative nature of …
Sovereign Immunity For Rent: How The Commodification Of Tribal Sovereign Immunity Reflects The Failures Of The U.S. Patent System, Katrina G. Geddes
Sovereign Immunity For Rent: How The Commodification Of Tribal Sovereign Immunity Reflects The Failures Of The U.S. Patent System, Katrina G. Geddes
Fordham Intellectual Property, Media and Entertainment Law Journal
Last year, a Fortune 500 pharmaceutical company attempted to rent the sovereign immunity of an American Indian tribe in order to shield its patents on a dry-eye drug from invalidation by generic competitors in inter partes review. Pharmaceutical firms are notorious for pursuing unconventional methods to extend the duration of their patents and, in this sense, the maneuver is unsurprising. The exploitation, however, of an historically disenfranchised community with limited economic opportunities is particularly unsettling. This Article will provide, firstly, a factual summary of the legal background of this case; secondly, a review of the February 2018 decision of the …
The Power Of Distant Rewards: Driving International Innovation Through United States Patent Incentives, Richard S. Gruner
The Power Of Distant Rewards: Driving International Innovation Through United States Patent Incentives, Richard S. Gruner
Fordham Intellectual Property, Media and Entertainment Law Journal
Technological innovation outside the United States is increasing. The United States remains the largest single source of new inventions, but the rest of the world produces most technological advances. Yet, even as innovation capacity outside the United States grows, the production of advances remains underincentivized in many developed and developing countries. Weak incentives apply to the outlier advances that are the province of patent laws. These outlier advances—typically reflecting material departures from prior technical knowledge and potentially establishing fundamentally new lines of technological development and consumer products—are particularly important components of technological development. By shortchanging incentives for outlier advances, society …
A History Of Competition: The Impact Of Antitrust On Hong Kong’S Telecommunications Markets, Sandra Marco Colino
A History Of Competition: The Impact Of Antitrust On Hong Kong’S Telecommunications Markets, Sandra Marco Colino
Fordham Intellectual Property, Media and Entertainment Law Journal
Hong Kong has only had cross-sector competition law since 2015, but the city’s telecommunications markets have been subject to sector-specific antitrust provisions for over two decades. The importance of nurturing an efficient, innovative, and competitive telecoms industry for Hong Kong’s economic prosperity was acknowledged already at the time the sector was liberalized in the 1990s. Yet until the late 2000s, the government vehemently opposed the adoption of competition law in virtually all other sectors of the economy. This paper examines the effectiveness of the regulatory framework set up to guarantee the protection of competition in the telecommunications sector in Hong …
Dirty Little Secrets: Fracking Fluids, Dubious Trade Secrets, Confidential Contamination, And The Public Health Information Vacuum, Elliot Fink
Fordham Intellectual Property, Media and Entertainment Law Journal
While the carbon energy industry has frequently claimed that hydraulic fracturing processes and ingredients are proprietary and protected by trade secret laws, their large scale and volume nationwide and the well-documented dangers that they pose to public health have brought fracking under scrutiny. When individuals have been adversely impacted in their own backyards, weak federal and state laws and regulation have generally left these impacted citizens with little to no recourse and part of this problem stems from questionable uses of privacy law, specifically dubious claims of trade secrecy. Focusing specifically on Pennsylvania as a model of insufficient state regulation …
The Private-Sector Ecosystem Of User Data In The Digital Age, Fordhamiplj@Gmail.Com
The Private-Sector Ecosystem Of User Data In The Digital Age, Fordhamiplj@Gmail.Com
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Fictitious Commodities: A Theory Of Intellectual Property Inspired By Karl Polanyi’S “Great Transformation”, Alexander Peukert
Fictitious Commodities: A Theory Of Intellectual Property Inspired By Karl Polanyi’S “Great Transformation”, Alexander Peukert
Fordham Intellectual Property, Media and Entertainment Law Journal
The puzzle this Article addresses is this: how can it be explained that intellectual property (IP) laws and IP rights (IPRs) have continuously grown in number and expanded in scope, territorial reach, and duration, while at the same time have been contested, much more so than other branches of property law? This Article offers an explanation for this peculiar dynamic by applying insights and concepts of Karl Polanyi’s book “The Great Transformation” to IP. It reconstructs and then applies core Polanyian concepts of commodification (infra, II), fictitious commodities (infra, III), and countermovements (infra, IV) to the three main areas of …
The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani
The Gdpr-Blockchain Paradox: Exempting Permissioned Blockchains From The Gdpr, Anisha Mirchandani
Fordham Intellectual Property, Media and Entertainment Law Journal
When considering the legal landscape emerging after the General Data Protection Regulation went into effect on May 25, 2018, the uncertainty surrounding the Regulation reaches its peak when it is applied to blockchain technology. While the goals of storing personal data on permissioned blockchains may align with the goals of accuracy and transparency emulated by the GDPR, the language of the Regulation makes it likely that blockchain technology, as a whole, violates the GDPR. Permissioned blockchains have promising use cases and developments that have not only streamlined data storage, but also allowed users to have increased control over who accesses …
The Fourth Amendment And Technological Exceptionalism After Carpenter: A Case Study On Hash-Value Matching, Denae Kassotis
The Fourth Amendment And Technological Exceptionalism After Carpenter: A Case Study On Hash-Value Matching, Denae Kassotis
Fordham Intellectual Property, Media and Entertainment Law Journal
The Fourth Amendment has long served as a barrier between the police and the people; ensuring the government acts reasonably in combating crime. Fourth Amendment jurisprudence is more dynamic than other constitutional guarantees, and has undergone periodic shifts to account for technological and cultural changes. The Supreme Court’s 2018 decision in United States v. Carpenter marks the most recent jurisprudential shift, as the Court departed from the well-settled reasonable expectation of privacy test to account for a new technology (CSLI records). This Note examines Carpenter’s impact on future Fourth Amendment cases, using another novel surveillance technique, hash-value matching, as a …
Bringing Swirly Music To Life: Why Copyright Law Should Adopt Patent Law Standards For Joint Authorship Of Sound Engineers, Andrew Nietes
Bringing Swirly Music To Life: Why Copyright Law Should Adopt Patent Law Standards For Joint Authorship Of Sound Engineers, Andrew Nietes
Fordham Intellectual Property, Media and Entertainment Law Journal
Geoff Emerick, acclaimed sound engineer for The Beatles, passed away in October of 2018. Emerick helped shape The Beatles’ sound and worked to create many of their most recognized songs, yet, under the current joint authorship standards he likely would not be considered an author of these songs. This Note details the work carried out by sound engineers in the music industry and describes how current joint authorship standards affect them. It then proposes a reinterpretation of joint authorship in the copyright statute to ease these standards by borrowing from another area of intellectual property law.
A Tale Of Sovereignty And Liberalism: The Lockean Myth Of Intellectual Property, Shaoul Sussman
A Tale Of Sovereignty And Liberalism: The Lockean Myth Of Intellectual Property, Shaoul Sussman
Fordham Intellectual Property, Media and Entertainment Law Journal
The influence of John Locke’s thought upon the general legal perception of property rights cannot be overstated. Locke’s Labor theory of property holds that property originally comes about through individual exertion upon natural objects and that legal rights in the result of this labor are in fact property rights. The Lockean theory of property has dominated the Anglo-American legal discourse and is frequently used to justify various property regulation schemes. Despite this fact, many scholars have struggled to apply the theory to the field of intellectual property, and in particular to the field of patents and copyright. Many have attempted …
Standing Up For Stand-Up Comedy: Joke Theft And The Relevance Of Copyright Law And Social Norms In The Social Media Age, Hannah Pham
Fordham Intellectual Property, Media and Entertainment Law Journal
This Article reveals that while social norms offer protection to stand-up comedians against joke theft within the stand-up comedy industry, they do little to prevent joke theft outside the traditional comedy community. Joke theft has risen with the increased popularity and use of social media. In particular, joke aggregators such as “The Fat Jew” take and publish on social media jokes by other comedians. In the social media world, the norms system underperforms. Norms do little to protect against joke theft by joke aggregators because they exist outside of the industry and are unaffected by norms governing stand-up comedians.
This …
The Concealed Cost Of Convenience: Protecting Personal Data Privacy In The Age Of Alexa, Lauren Bass
The Concealed Cost Of Convenience: Protecting Personal Data Privacy In The Age Of Alexa, Lauren Bass
Fordham Intellectual Property, Media and Entertainment Law Journal
In today’s interconnected, internet-dependent, global information economy, consumers willingly, but often unwittingly, divulge to tech companies their personal and private data—frequently with little regard for its safekeeping or intended future use.
Enter Alexa, Amazon’s voice-activated, natural-language processing digital smart assistant. A sophisticated artificial intelligence (“AI”), Alexa insinuates itself into a user’s personal sphere, learns from and adapts to the surrounding environment, siphons personal information and data, and ultimately produces for the user a perfectly tailored, concierge experience. Convenience is the product. Data privacy is the cost.
Over one half of American consumers own an Alexa-enabled device or other AI-powered digital …
Platform Society: Copyright, Free Speech, And Sharing On Social Media Platforms, Fordhamiplj@Gmail.Com
Platform Society: Copyright, Free Speech, And Sharing On Social Media Platforms, Fordhamiplj@Gmail.Com
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Controlling Cargo: Amazon’S Predatory Attempt To Disrupt The Fashion Industry By Dominating The International Transportation Of Goods, Mary Kate Brennan
Controlling Cargo: Amazon’S Predatory Attempt To Disrupt The Fashion Industry By Dominating The International Transportation Of Goods, Mary Kate Brennan
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
The Future Of Facial Recognition Is Not Fully Known: Developing Privacy And Security Regulatory Mechanisms For Facial Recognition In The Retail Sector, Elias Wright
Fordham Intellectual Property, Media and Entertainment Law Journal
In recent years, advances in facial recognition technology have resulted in a rapid expansion in the prevalence of private sector biometric technologies. Facial recognition, while providing new potentials for safety and security and personalized marketing by retailers implicates complicated questions about the nature of consumer privacy and surveillance where a “collection imperative” incentivize corporate actors to accumulate increasingly massive reservoirs of consumer data. However, the law has not yet fully developed to address the unique risks to consumers through the use of this technology. This Note examines existing regulatory mechanisms, finding that consumer sensitivities and the opaque nature of the …
Fair Trade-Mark: Proposing An Affirmative Duty On Licensors To Enforce Their Corporate Social Responsibility Codes, Dorothy L. Newman
Fair Trade-Mark: Proposing An Affirmative Duty On Licensors To Enforce Their Corporate Social Responsibility Codes, Dorothy L. Newman
Fordham Intellectual Property, Media and Entertainment Law Journal
Modern consumers are increasingly interested in seeing the brands they love commit to corporate social responsibility (CSR), including fair labor practices and environmental sustainability throughout their supply chains. Many corporations capitalize on this demand through branding strategies that highlight their commitment to CSR. Branding of CSR can include publishing codes of conduct on corporate websites, incorporating a value of doing good while doing well in print and video advertisements, or even publicly partnering with nonprofit organizations. The Lanham Act, the primary federal trademark statute in the United States, articulates federal laws pertaining to branding and advertising, and is rooted in …
The Aftereffects Of Tc Heartland: How To Effectively Approach Motions To Dismiss And Motions To Transfer On The Basis Of Improper Venue, Jennifer Rosenblatt
The Aftereffects Of Tc Heartland: How To Effectively Approach Motions To Dismiss And Motions To Transfer On The Basis Of Improper Venue, Jennifer Rosenblatt
Fordham Intellectual Property, Media and Entertainment Law Journal
Prior to the Supreme Court's decision in TC Heartland, the law of venue in patent infringement actions fluctuated over time. In recent history, the Eastern District of Texas became a notoriously plaintiff-friendly forum in which to litigate patent infringement actions; it was also a widely available choice of forum due to the Court of Appeals for the Federal Circuit's broad reading of the patent venue statute, 28 U.S.C. § 1400(b). However, the Supreme Court in TC Heartland adopted its earlier interpretation of the patent venue statute that is much narrower than subsequent interpretive expansions.
This Note surveys and categorizes motions …
The Market For User Data, Olivier Sylvain
The Market For User Data, Olivier Sylvain
Fordham Intellectual Property, Media and Entertainment Law Journal
Policymakers are today far more alert than ever before to the myriad ways in which tech companies collect and distribute consumers’ data with third-party data brokers and advertisers. We can attribute this new awareness to at least two major news stories from the past six or so years. The first came in 2013, when Edward Snowden, the former National Security Agency contractor, leaked highly classified materials that revealed the ways in which United States national security officials, with the indispensable cooperation of U.S. telecommunications companies, systematically monitored telephone conversations and electronic communications of U.S. citizens and foreign nationals. The story …
Ethnicity And The Recognition Of Asian Surnames Through Trademark Filings, Russell W. Jacobs
Ethnicity And The Recognition Of Asian Surnames Through Trademark Filings, Russell W. Jacobs
Fordham Intellectual Property, Media and Entertainment Law Journal
This Article presents the results of a study using U.S. Patent and Trademark Office (“USPTO”) trademark application records to determine the rates of recognition of surnames held by people belonging to six Asian ethnic groups—Chinese, Filipino, Indian, Japanese, Korean, and Vietnamese. This study follows upon an earlier study that examined a broader dataset of ethnic designations set forth in the 2000 U.S. Census, looking at not just Asian or Pacific Islander names, but also Black, Hispanic, Native American or Alaska Native, and White names. That study looked at the intersection of two sources of data—surnames recorded in the 2000 U.S. …
“Why Do You Want My Password?”: Assessing Ultimate Control Of A Journalist’S Twitter Account Used For Work Purposes, Benjamin Halperin
“Why Do You Want My Password?”: Assessing Ultimate Control Of A Journalist’S Twitter Account Used For Work Purposes, Benjamin Halperin
Fordham Intellectual Property, Media and Entertainment Law Journal
A journalist’s value to an employer can be seen differently in the age of social media. The value to the employer is not necessarily just measured by the number of words or articles produced, or even by how much their work drives increased website traffic or increased subscriptions. In addition to generally maintaining a social media presence, journalists are often encouraged or expected to use their social media accounts. However, such accounts might be in the individual journalist’s name and might pre-date the term of employment with that specific media entity. Therefore, a debate can rise over who might “own” …
Argh, No More Pirating America’S Booty: Improving Copyright Protections For American Creators In China, Johnathan Ling
Argh, No More Pirating America’S Booty: Improving Copyright Protections For American Creators In China, Johnathan Ling
Fordham Intellectual Property, Media and Entertainment Law Journal
The advent of the internet brought about revolutionary changes and challenges to the world. Internet piracy is one area which is presenting new challenges, particularly to copyright holders such as artists, filmmakers, and creators. China has been a hotbed of piracy and is home to the second highest number of file sharing infringers in the world. China has made strides to improve its copyright protection, such as implementing a copyright law in 1990, as well as joining the World Trade Organization and signing on to the Agreement on Trade-Related Aspects of Intellectual Property Rights, which specifies minimum levels of intellectual …
Towards A Jurisprudence Of Fashion, Susan Scafidi
Towards A Jurisprudence Of Fashion, Susan Scafidi
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Face Off: An Examination Of State Biometric Privacy Statutes & Data Harm Remedies, Maya E. Rivera
Fordham Intellectual Property, Media and Entertainment Law Journal
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released. The Illinois Biometric Information Privacy Act is the only statute of the three that enshrines a private right of action for those who fail to properly handle biometric data. Both the Texas Capture or Use Biometric Identifier Act Information Act and the Washington Biometric Privacy Act allow for state Attorneys General to bring suit on behalf of aggrieved consumers. This Note examines these three statutes in the context of data security …