Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

2015

Comparative and Foreign Law

Articles 1 - 5 of 5

Full-Text Articles in Law

Adopting Subsequent Remuneration Right In Chinese Copyright Law, Xi Chen Aug 2015

Adopting Subsequent Remuneration Right In Chinese Copyright Law, Xi Chen

Xi Chen

One heavily and contentiously argued clause in Chinese Copyright Law amendments drafts focuses on the practicality of granting authors of audiovisual works the legal right to collect subsequent remunerations (SRR), when their works are reused in subsequent exploitations.

With the rapid increase of media channels for the Chinese movie industry, and other entertainment industries relying on a heavy usage of audiovisual work, authors demand that they should be entitled to the profit earned from derivative markets and other media channel beyond the first intended market. In order to balance the conflicting interest between the author and the producer, and to …


International Trade V. Intellectual Property Lawyers: Globalization And The Brazilian Legal Profession, Vitor M. Dias Aug 2015

International Trade V. Intellectual Property Lawyers: Globalization And The Brazilian Legal Profession, Vitor M. Dias

Vitor M. Dias

No abstract provided.


The Final Impression Counts - Seeking Common Ground In Design Patent Infringement, Dana Beldiman, Paolo Beconcini Aug 2015

The Final Impression Counts - Seeking Common Ground In Design Patent Infringement, Dana Beldiman, Paolo Beconcini

Dana Beldiman

THE FINAL IMPRESSION COUNTS – Seeking Common Ground in Design Patent Infringement

Dana Beldiman*and Paolo Beconcini

Abstract

The visual appearance of products has become an asset of considerable economic value. Litigation surrounding it is increasingly common and has focused IP law on certain tensions that relate to the visual nature of IP assets.

One such area is design patent infringement. Policy mandates that comparison of two similar designs for purposes of evaluating infringement be performed by a notional purchaser, based on the overall impression of a design as whole. However, in performing the analysis courts are tempted to …


Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno Feb 2015

Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno

Constance E. Bagley

In 2014, the European Commission announced the launch of a study of knowledge transfer by public research organizations and other institutes of higher learning “to determine which additional measures might be needed to ensure an optimal flow of knowledge between the public research organisations and business thereby contributing to the development of the knowledge based economy.” As the European Commission has recognized, the EU needs to take action to “unlock the potential of IPRs [intellectual property rights] that lie dormant in universities, research institutes and companies.” This article builds on our earlier work on structuring efficient pharmaceutical public-private partnerships (PPPPs) …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …