Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano Oct 2016

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions …


Chapter Three: Intellectual Property, Tracy Mitrano Oct 2016

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter Mar 2015

Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter

Megan M Carpenter

This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank Pasquale

Frank A. Pasquale

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Defending Cyberproperty, Patricia L. Bellia Oct 2013

Defending Cyberproperty, Patricia L. Bellia

Patricia L. Bellia

This Article explores how the law should treat legal claims by owners of Internet-connected computer systems to enjoin unwanted uses of their systems. Over the last few years, this question has become increasingly urgent and controversial, as system owners have sought protection from unsolicited commercial e-mail and from robots that extract data from Web servers for competitive purposes. In the late 1990s and early 2000s, courts utilizing a wide range of legal doctrines upheld claims by network resource owners to prevent unwanted access to their computer networks. The vast weight of legal scholarship has voiced strong opposition to these cyberproperty …


Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq. Nov 2012

Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.

Rodolfo C. Rivas

The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …


Convergence And Incongruence: Trademark Law And Icann’S Introduction Of New Generic Top-Level Domains, Christine Haight Farley Apr 2010

Convergence And Incongruence: Trademark Law And Icann’S Introduction Of New Generic Top-Level Domains, Christine Haight Farley

Christine Haight Farley

This paper demonstrates how problematic convergences between Internet technology, the demands of a burgeoning e-market and trademark laws have created myriad issues in international governance of domain names. The Internet Corporation for Assigned Names and Numbers (ICANN), the body that governs internet's infrastructure, recently approved a new policy that would allow it to accept applications for additional generic top-level domains (gTLDs). What ICANN contemplates is a uniform system to approve generic top level domains that is expected to have profound implications. Under this new plan anyone can apply for a new gTLD at any time and it could be literally …