Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


Cybersecurity-Corporate Espionage, Amy J. Ramson Jul 2020

Cybersecurity-Corporate Espionage, Amy J. Ramson

Open Educational Resources

The goals of this team activity in the area of criminal law, cybersecurity and cyber crime are to facilitate team work, critical thinking and presentation skills. Students will be grouped into two teams. As a team, they will analyze cases about corporate espionage committed by nation states and industry competitors through the questions presented in the activity. They will present their analysis to the class.


Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan May 2020

Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan

Articles in Law Reviews & Other Academic Journals

It was certainly an odd thing for the Department of Justice attorney arguing for the United States to appear before the Ninth Circuit to tell the appellate judges that a federal agency was wrong. This was what happened in a Federal Trade Commission enforcement action against Qualcomm Inc., a semiconductor technology company. As a substantial holder of patents on mobile communications technologies and also a leading manufacturer of chips used in that same industry, the FTC charged Qualcomm with anticompetitive conduct; the district court agreed and enjoined Qualcomm from certain patent licensing practices. It was that award of injunctive relief …


National Cybersecurity Innovation, Tabrez Y. Ebrahim Jan 2020

National Cybersecurity Innovation, Tabrez Y. Ebrahim

Faculty Scholarship

National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …


The Dtsa At One: An Empirical Study Of The First Year Of Litigation Under The Defend Trade Secrets Act, David S. Levine, Christopher B. Seaman Jan 2018

The Dtsa At One: An Empirical Study Of The First Year Of Litigation Under The Defend Trade Secrets Act, David S. Levine, Christopher B. Seaman

Scholarly Articles

This article represents the first comprehensive empirical study of the Defend Trade Secrets Act (“DTSA”), the law enacted by Congress in 2016 that created a federal civil cause of action for trade secret misappropriation. The DTSA represents the most significant expansion of federal involvement in intellectual property law in at least 30 years. In this study, we examine publicly-available docket information and pleadings to assess how private litigants have been utilizing the DTSA. Based upon an original dataset of nearly 500 newly-filed DTSA cases in federal court, we analyze whether the law is beginning to meet its sponsors’ stated goals …


Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson Oct 2015

Contemporary Practice Of The United States Relating To International Law., Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: • Agreement on Iran Nuclear Program Goes into Effect • United States and China Reach Agreement Regarding Economic Espionage and International Cybersecurity Norms • United States Ratifies the International Convention for the Suppression of Acts of Nuclear Terrorism • United States Reaches Agreement with Turkey on Use of Incirlik Air Base for Strikes on ISIL; “Safe Zone” Not Part of the Deal


Comment With The Copyright Office Regarding A Proposed Exemption Under 17 U.S.C. Section 1201 For Software Security Research (Class 25), Candice Hoke Feb 2015

Comment With The Copyright Office Regarding A Proposed Exemption Under 17 U.S.C. Section 1201 For Software Security Research (Class 25), Candice Hoke

Law Faculty Reports and Comments

Professor Candice Hoke, Cleveland State University, and others (Douglas W. Jones, University of Iowa; Professor Deirdre Mulligan, University of California, Berkeley; Professor Vern Paxson, University of California, Berkeley;Professor Pamela Samuelson, University of California, Berkeley; Bruce Schneier Erik Stallman, Center for Democracy & Technology (CDT); comment addressing Proposed Class 25: Software Security Research and an exemption for software security research in order to promote the active research and testing efforts necessary to keep pace with evolving cybersecurity risks. Software and related access controls are increasingly embedded in a wide range of systems, from consumer goods to medical devices to infrastructure to …


Here Come The Trade Secret Trolls, David S. Levine, Sharon Sandeen Jan 2015

Here Come The Trade Secret Trolls, David S. Levine, Sharon Sandeen

Faculty Scholarship

Within the past few years, the U.S. federal government has been forced to confront the massive but hard-to-quantify problem of foreign and state-sponsored cyberespionage against U.S. corporations, from Boeing to small technology start-ups, and (as of this writing) perhaps Sony Pictures Entertainment. As part of that effort, Congress has taken up the Defend Trade Secrets Act and the Trade Secret Protection Act, which would create a private cause of action under the federal Economic Espionage Act. This Article addresses the possibility of introducing trolling behavior — using litigation as a means to extract settlement payments from unsuspecting defendants — to …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …