Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

University of Michigan Law School

Journal

2007

Technology

Articles 1 - 2 of 2

Full-Text Articles in Law

What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George Jan 2007

What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George

Michigan Telecommunications & Technology Law Review

Importantly, at least a few relevant patent holders are inevitably left out of an industry organization's collection of patents. These left-out patent holders, known as "holdouts," can undermine the collective arrangement with demand letters and infringement suits.[...] The first part of this Note explains why holdouts exist in the first place, given the benefits of joining an organization of collected patents. In the second part of this Note, I explore the lack of legal protections against holdout demands offered by pre-eBay patent law. The third part of this Note introduces the eBay decision as revolutionary addition to list of legal …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …