Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Journal

2012

Institution
Keyword
Publication
File Type

Articles 121 - 148 of 148

Full-Text Articles in Law

Indirect Exploitation Of Intellectual Property Rights By Corporations And Investors: Ip Privateering And Modern Letters Of Marque And Reprisal, Tom Ewing Jan 2012

Indirect Exploitation Of Intellectual Property Rights By Corporations And Investors: Ip Privateering And Modern Letters Of Marque And Reprisal, Tom Ewing

UC Law Science and Technology Journal

Competitive pressures and rent-seeking behaviors have motivated companies and investors to develop indirect techniques for beneficially exploiting third-party intellectual property rights (IPRs) that qualitatively depart from the direct exploitation tools honed during the past thirty years of the pro-patent era. Among other things, companies have realized that they do not even need to own IPRs in order to consequently benefit from their exploitation. This phenomenon is labeled here "IP privateering" because of its similarities to an historic method of waging war on the high seas. This Article classifies IP privateering as a species of aggressive non-practicing entities (NPEs). The parameters …


Regulating The Cloud: A Comparative Analysis Of The Current And Proposed Privacy Frameworks In Canada And The European Union, David Krebs Jan 2012

Regulating The Cloud: A Comparative Analysis Of The Current And Proposed Privacy Frameworks In Canada And The European Union, David Krebs

Canadian Journal of Law and Technology

Cloud computing is a growing phenomenon and promises greater efficiency and reduced-cost computing. However, some of the basic technological and business-related features of the Cloud are at odds with personal data protection laws. Canada and the European Union share similar core values related to privacy/data protection, and both regions aim to increase their competitiveness regarding cloud computing. Having these two similarities in mind, this paper explores the current legal and stakeholder landscape in Canada and the European Union with respect to cloud computing, data protection and how adoption of the model can be advanced. The analysis shows that neither of …


In Defence Of A Defence - A Demonstrable Legitimate And Non-Infringing Purpose As A Full Defence To Anti-Circumvention Legislation, Andrew Yolles Jan 2012

In Defence Of A Defence - A Demonstrable Legitimate And Non-Infringing Purpose As A Full Defence To Anti-Circumvention Legislation, Andrew Yolles

Canadian Journal of Law and Technology

In this essay, I will argue that making a demonstrable lawful and non-infringing purpose a full defence to copyright infringement by circumvention of a TPM addresses many of the concerns raised by the currently proposed legislation, while avoiding the pitfalls of directly linking anti-circumvention laws with actual copyright infringement. As the ratification of the WIPO Internet treaties is the foremost concern for this legislation, I will begin with a discussion as to how this model can successfully implement the treaties’ anti-circumvention provisions where the Bill C-60 model may have failed. I will then explain why this model strikes a better …


Book Review: R.L. Campbell, Legal Issues In Electronic Commerce, Robert J. Currie Jan 2012

Book Review: R.L. Campbell, Legal Issues In Electronic Commerce, Robert J. Currie

Canadian Journal of Law and Technology

The juncture of “law and technology” from a legal education point of view is an interesting one. Successfully engaging with law and technology requires stu- dents (of all ages and stripes) to absorb at least some of the substance of many discrete areas of law, as well as to assess how technology creates nexuses between them and challenges some of their underlying notions. As electronic commerce increasingly becomes the bread and butter of many law practices, this need comes into sharper relief — one has to grasp a large variety of fundamentals and simultaneously generate some insight as to where …


Responding To Self-Produced Child Pornography: Examining Legislative Sucessesses And Shortcomings To Reach An Approppriate Solution, Shawn P. Barnes Jan 2012

Responding To Self-Produced Child Pornography: Examining Legislative Sucessesses And Shortcomings To Reach An Approppriate Solution, Shawn P. Barnes

Journal of Law, Technology, & the Internet

No abstract provided.


Becoming Positive About Being Carbon Neutral:Requiring Public Accountability Forinternet Companies, Alexandra L. Pichette Jan 2012

Becoming Positive About Being Carbon Neutral:Requiring Public Accountability Forinternet Companies, Alexandra L. Pichette

Vanderbilt Journal of Entertainment & Technology Law

Every year, worldwide dependence on Internet and other information technology services grows. In many ways, the increased use of electric energy is positive for the environment; after all, using the Internet to access a document uses less energy than printing and distributing that document. Nonetheless, Internet companies expend a great deal of energy when they, for example, fire up their servers to satisfy a search request. Studies show that Internet companies are disproportionately large energy consumers, and are responsible for a growing number of carbon emissions. As a result, environmentalists are becoming concerned about the effects of these emissions on …


The Evolution Of Consumer Privacy Law: How Privacy By Design Can Benefit From Insights In Commercial Law And Standardization, Muharem Kianieff Jan 2012

The Evolution Of Consumer Privacy Law: How Privacy By Design Can Benefit From Insights In Commercial Law And Standardization, Muharem Kianieff

Canadian Journal of Law and Technology

This article considers the effectiveness of the present privacy regimes in North America as it relates to the protection of consumer information that is gathered in the ordinary course of business. It is argued that the present moves towards a Privacy by Design approach shows great potential and can gain valuable insights from established doctrines in commercial and consumer protection law. Moreover, it is proposed that the aims of such an approach can be achieved by deeming personal information and behavioral data to be the property of the individual that it pertains to. It is then suggested that a regulatory …


International And Canadian Law Rules Applicable To Cyber Attacks By State And Non-State Actors, Matthew E. Castel Jan 2012

International And Canadian Law Rules Applicable To Cyber Attacks By State And Non-State Actors, Matthew E. Castel

Canadian Journal of Law and Technology

This essay, which contains a broad ranging overview of several important issues raised by the recent number of cyber attacks in Canada and elsewhere, begins with a definition of cyberspace and cyber war. It is followed by a brief survey of some cyber attacks that have occurred in Canada and elsewhere in recent years. The first part addresses the question whether present rules of international law applicable to armed attacks using kinetic weapons apply to the wide notion of cyber attacks by a state actor against the government and critical civilian infrastructures of another state and concludes that they do. …


Book Review: William F. Patry, How To Fix Copyright, Graham Reynolds Jan 2012

Book Review: William F. Patry, How To Fix Copyright, Graham Reynolds

Canadian Journal of Law and Technology

In How to Fix Copyright, William F. Patry, one of America’s leading experts on copyright, calls for a “top-to-bottom, systemic overhaul” of copyright laws. For a Canadian readership in the midst of our own process of copyright reform, such a call to action is both timely and relevant.


Leveraging Bias In Forensic Science, Roger Koppl Jan 2012

Leveraging Bias In Forensic Science, Roger Koppl

Fordham Urban Law Journal

Dr. Simon Cole calls for a more hierarchical organization of forensic science in his challenging Article, Acculturating Forensic Science: What is ‘Scientific Culture’, and How can Forensic Science Adopt it? Koppl thinks Dr. Cole is right to say that there are different roles in forensic science, but somewhat mistaken in his call for hierarchy.


Extraterritorial Protection Of Trade Secret Rights In China: Do Section 337 Actions At The Itc Really Prevent Trade Secret Theft Abroad?, 11 J. Marshall Rev. Intell. Prop. L. 523 (2012), Steven E. Feldman, Sherry L. Rollo Jan 2012

Extraterritorial Protection Of Trade Secret Rights In China: Do Section 337 Actions At The Itc Really Prevent Trade Secret Theft Abroad?, 11 J. Marshall Rev. Intell. Prop. L. 523 (2012), Steven E. Feldman, Sherry L. Rollo

UIC Review of Intellectual Property Law

With an ever increasing number of United States ("U.S.") companies conducting business abroad or conducting business with foreign entities there is more need than ever for the U.S. companies to consider how they can protect their intellectual property assets. The Federal Circuit‘s recent TianRui Grp.Co. v. Int’l Trade Comm’n and Amsted Indus. decision highlights the potential of section 337 of the U.S. Patent Act as a tool to prevent the exploitation of misappropriated trade secrets embodied in products that are imported into the United States. This article explores the potential impact of the TianRui decision on business practices abroad, particularly …


Managing Peer-To-Peer Traffic In Mainland China And Hong Kong, 11 J. Marshall Rev. Intell. Prop. L. 548 (2012), Ke Steven Wan Jan 2012

Managing Peer-To-Peer Traffic In Mainland China And Hong Kong, 11 J. Marshall Rev. Intell. Prop. L. 548 (2012), Ke Steven Wan

UIC Review of Intellectual Property Law

For over a decade, copyright infringement using peer-to-peer ("P2P") file sharing has plagued the content industries. Response came in the form of massive lawsuits against file sharers and the use of technologies including digital rights management and technical protection measures. However, illegal P2P file sharing is still rampant. Increasingly, internet service providers ("ISPs") have begun to monitor network traffic with deep packet inspection. Under the Digital Millennium Copyright Act ("DMCA"), ISPs are usually only responsible for their own direct copyright infringing acts. To mitigate potential liability, some ISPs have agreed to partner with copyright owners to serve warnings to subscribers …


Comparison Of Chinese And U.S. Patent Reform Legislation: Which, If Either, Got It Right?, 11 J. Marshall Rev. Intell. Prop. L. 567 (2012), Wayne C. Jaeschke, Zhun Lu, Paul Crawford Jan 2012

Comparison Of Chinese And U.S. Patent Reform Legislation: Which, If Either, Got It Right?, 11 J. Marshall Rev. Intell. Prop. L. 567 (2012), Wayne C. Jaeschke, Zhun Lu, Paul Crawford

UIC Review of Intellectual Property Law

Chinese patent law has a short history whereas the United States ("U.S.") system has a more robust history. This article chronicles important remaining differences between Chinese and U.S. patent laws including the utility model successfully employed at State Intellectual Property Office of the People’s Republic of China ("SIPO") and in the Chinese courts, but not available under U.S. law. Some differences are discussed in regard of patent appeals, reexaminations for invalidity, China’s lack of a reissue process to correct major errors, China’s inventors remuneration process and compulsory licensing of patents, and China’s unique requirement of post termination compensation to support …


Rights Of Joint Patent Owners In China, 11 J. Marshall Rev. Intell. Prop. L. 601 (2012), Yunling Ren, Yan Hong Jan 2012

Rights Of Joint Patent Owners In China, 11 J. Marshall Rev. Intell. Prop. L. 601 (2012), Yunling Ren, Yan Hong

UIC Review of Intellectual Property Law

In the past decade, Chinese courts began to recognize joint patent owners’ rights and obligations that are distinguishable from other proprietary property rights, but the law did not reflect these concerns. It was not until the Third Revision of the Chinese Patent Act in 2009 that the law recognized the existence of joint-ownership rights in patents. Part of the reason for this change was not only to conform to the standards of the international intellectual property community, but also to promote the commercialization of patented inventions and technology transfer. Article 15 of the Patent Act was added to allow joint-owners …


Fighting Poison With Poison? The Chinese Experience With Pharmaceutical Patent Linkage, 11 J. Marshall Rev. Intell. Prop. L. 623 (2012), Benjamin Liu Jan 2012

Fighting Poison With Poison? The Chinese Experience With Pharmaceutical Patent Linkage, 11 J. Marshall Rev. Intell. Prop. L. 623 (2012), Benjamin Liu

UIC Review of Intellectual Property Law

Countries after countries are adopting a controversial regulatory system of linking the market approval for pharmaceuticals to the status of potentially blocking patents as part of their bilateral and multilateral trade agreement package with the United States. Surprisingly, China took up pharmaceutical patent linkage in the absence of any treaty obligations and became the first country to adopt this regulatory regime outside of North America, despite the presence of a flourishing generics pharmaceutical industry and its developing country status. In fact, the Chinese regulation promised more intellectual property ("IP") protection than what even the United States FDA is capable of …


Cloud Computing And The Doctrine Of Joint Infringement: ‘Current Impact’ And Future Possibilities, 11 J. Marshall Rev. Intell. Prop. L. 673 (2012), Nicole D. Galli, Edward Gecovich Jan 2012

Cloud Computing And The Doctrine Of Joint Infringement: ‘Current Impact’ And Future Possibilities, 11 J. Marshall Rev. Intell. Prop. L. 673 (2012), Nicole D. Galli, Edward Gecovich

UIC Review of Intellectual Property Law

The computing landscape is changing in that businesses – and individuals – are increasingly turning to “the cloud” for computing solutions. In an attempt to maintain patent portfolios that keep pace with the changing computing landscape, an increasing number of corporations are filing for patent protection on cloud computing related technologies. Cloud computing patents, however, may be difficult to enforce in light of current Federal Circuit case law relating to the Joint Infringement Doctrine. Two cases, Akamai Technologies, Inc. v. Limelight Networks, Inc. and McKesson Technologies, Inc. v. Epic Systems Corp., decided by the Federal Circuit in 2010 and in …


The Paradox That Wasn't: Federal Preemption Of State-Law Voice Misappropriation Claims, 11 J. Marshall Rev. Intell. Prop. L. 694 (2012), Zachary M. Vaughan Jan 2012

The Paradox That Wasn't: Federal Preemption Of State-Law Voice Misappropriation Claims, 11 J. Marshall Rev. Intell. Prop. L. 694 (2012), Zachary M. Vaughan

UIC Review of Intellectual Property Law

There exists in the law of copyright preemption what some have identified as a paradox: that in certain cases involving claims for voice misappropriation in which a plaintiff’s voice has merely been imitated, claims have been allowed to proceed, while other cases that involve actual uses of a plaintiff’s voice—that is, samples from sound recordings—have been held to be preempted by the federal Copyright Act. This article argues that this apparent paradox is actually no conflict at all. After a brief background section, this article collects and explains cases, discusses the strengths and weaknesses of one possible harmonization of the …


“There’S A Hole In The Bucket:” The Effective Elimination Of The Inequitable Conduct Doctrine,11 J. Marshall Rev. Intell. Prop. L. 717 (2012), Katherine E. White Jan 2012

“There’S A Hole In The Bucket:” The Effective Elimination Of The Inequitable Conduct Doctrine,11 J. Marshall Rev. Intell. Prop. L. 717 (2012), Katherine E. White

UIC Review of Intellectual Property Law

The year 2011 proved to be a momentous year in patent law. The doctrine of inequitable conduct was particularly rocked by changes to the law. Both the Federal Circuit’s decision in Therasense, Inc. v. Becton, Dickinson and Co. and the America Invents Act effectively gutted the inequitable conduct cause of action. Therasense tightened the materiality and intent standards, thus lowering the duty of candor standard that will be enforced in the courts. The America Invents Act created an escape clause for those who fail to disclose adequately during initial examination through the supplemental examination process. Did Congress and the Federal …


A New Institutional Economics Perspective On Trademarks: Rebuilding Post Conflict Zones In Sierra Leone And Croatia, 11 J. Marshall Rev. Intell. Prop. L. 745 (2012), Roya Ghafele, Benjamin Gibert Jan 2012

A New Institutional Economics Perspective On Trademarks: Rebuilding Post Conflict Zones In Sierra Leone And Croatia, 11 J. Marshall Rev. Intell. Prop. L. 745 (2012), Roya Ghafele, Benjamin Gibert

UIC Review of Intellectual Property Law

This paper evaluates the role of collective trademarks in enhancing the ability of tourism clusters to stimulate economic growth, local ownership and innovative governance. Illustrating how intellectual property (IP) law can be leveraged to achieve this, we offer a new economic rationale for trademarks in the context of tourism. Two post-conflict case studies of Sierra Leone and Croatia provide a crash test for this approach. By emphasizing the role of law, institutions and infrastructure in stimulating tourism in post-conflict zones, this paper echoes new institutional economics perspectives that highlight the impact of legal structure on development. Despite widespread acknowledgement of …


Exploring Apple’S Ipad Trademark Blunder: Chinese Trademark Approval Procedure Is A Trademark Protection Safeguard Or Another National Protectionism?, 11 J. Marshall Rev. Intell. Prop. L. 777 (2012), Arthur Tan-Chi Yuan Jan 2012

Exploring Apple’S Ipad Trademark Blunder: Chinese Trademark Approval Procedure Is A Trademark Protection Safeguard Or Another National Protectionism?, 11 J. Marshall Rev. Intell. Prop. L. 777 (2012), Arthur Tan-Chi Yuan

UIC Review of Intellectual Property Law

It is well-reported that Apple’s iPad® product embodies technological advances that are protected by U.S. and foreign patents. One would also assume that it is protected by trademarks in various jurisdictions, including China. However, to this day, Apple struggles to prefect its iPad trademark rights in China, the second largest economy in the world. While the Chinese trademark registration approval process is different from that in the U.S. practice, such approval step is essential to every international corporation doing business in China. This article explains where Apple may have overlooked this step in the overall trademark registration process in China …


India’S Use It Or Lose It: Time To Revisit Trips?, 11 J. Marshall Rev. Intell. Prop. L. 797 (2012), Levon Barsoumian Jan 2012

India’S Use It Or Lose It: Time To Revisit Trips?, 11 J. Marshall Rev. Intell. Prop. L. 797 (2012), Levon Barsoumian

UIC Review of Intellectual Property Law

India is one of a number of countries which impose a “local working” requirement on patented inventions. This finds its source in sections 83, 84, and 89 of India’s Patent Act. A recent decision by the Controller of Patents granting a compulsory license to Natco for a Bayer-patented anti-cancer drug confirms that importation will not satisfy this requirement. Corporations seeking to produce and market products for international sale will receive varying degrees of patent protection from different nations. This comment proposes an amendment to the Agreement on Trade-Related Aspects of Intellectual Property Rights (“TRIPS”) defining what local working requirements are …


Cybersex: Protecting Sexual Content In The Digital Age, 11 J. Marshall Rev. Intell. Prop. L. 815 (2012), Nicole Chaney Jan 2012

Cybersex: Protecting Sexual Content In The Digital Age, 11 J. Marshall Rev. Intell. Prop. L. 815 (2012), Nicole Chaney

UIC Review of Intellectual Property Law

Advertisers employ bare-skinned models and sex appeal to seduce American consumers with every magazine, billboard, and television advertisement. The ubiquity of sexual gratification has reached a tangible quality in American culture, but sex is still somehow taboo in our legal system. Despite the vast market for online adult entertainment, obscenity laws have been used to strike down claims for adult content copyright owners. These content owners are producing creative sexual expression for the public benefit, but they are being denied the same economic incentives granted to their mainstream counterparts. Ironically, Playboy Co. is an outlier in the adult entertainment industry …


The Public Good V. A Monetary Profit: The News Organizations’ Utilization Of The Fair Use Doctrine, 11 J. Marshall Rev. Intell. Prop. L. 841 (2012), Frank J. Lukes Jan 2012

The Public Good V. A Monetary Profit: The News Organizations’ Utilization Of The Fair Use Doctrine, 11 J. Marshall Rev. Intell. Prop. L. 841 (2012), Frank J. Lukes

UIC Review of Intellectual Property Law

The main purpose of copyright law is to promote the arts and sciences for the public good. The secondary purpose of copyright law is to ensure the copyright holder retains a benefit for their work. Additionally, the Fair Use Doctrine allows a defense to an individual who uses the copyrighted work without permission, so long as a four-factor test under the Doctrine is properly met. The four factors this test analyzes are the Purpose Factor, The Nature of the Work Factor, The Amount Used Factor, and The Effect on the Market Factor. When news organizations have sought protection under the …


For Sale. Patents. Never Used: Gaps In The Tax Code For Patent Sales, 11 J. Marshall Rev. Intell. Prop. L. 859 (2012), Khurram Naik Jan 2012

For Sale. Patents. Never Used: Gaps In The Tax Code For Patent Sales, 11 J. Marshall Rev. Intell. Prop. L. 859 (2012), Khurram Naik

UIC Review of Intellectual Property Law

Patent sales are an underappreciated means of monetizing patents. Recent blockbuster patent sales indicate heightened demand for patent acquisitions. There is evidence that such patent sales transfer patents to parties more skilled in patent enforcement, reducing litigation. Patent sales also move capital to innovators, which enhance incentives to innovate. But crucially, C corporations do not benefit from advantaged tax treatment. Efforts by other nations to encourage patent use and sales by providing “patent box” preferential tax regimes may provide some guidance for remedying this gap in the tax code.


The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes Jan 2012

The Ownership And Exploitation Of Personal Identity In The New Media Age, 12 J. Marshall Rev. Intell. Prop. L. 1 (2012), Thomas Hemnes

UIC Review of Intellectual Property Law

Personally Identifiable Information (“PII”) has never been more valuable. In today’s networked world, seemingly trivial facts can be collected, molded into a marketable economic profile, and transferred in the blink of an eye. To be sure, the commodification of PII allows for provision of dramatically more efficient and effective services. Yet the potential for privacy abuses is substantial. What interest does one have in the constellation of facts that defines one’s identity? Is it something one can own, like their right of publicity? Or are others free to use what they learn about a person? This article surveys current privacy …


Fostering Web 2.0 Innovation: The Role Of The Judicial Interpretation Of The Dmca Safe Harbor, Secondary Liability And Fair Use, 12 J. Marshall Rev. Intell. Prop. L. 70 (2012), Susanna Monseau Jan 2012

Fostering Web 2.0 Innovation: The Role Of The Judicial Interpretation Of The Dmca Safe Harbor, Secondary Liability And Fair Use, 12 J. Marshall Rev. Intell. Prop. L. 70 (2012), Susanna Monseau

UIC Review of Intellectual Property Law

Web 2.0 has generated a surplus of creativity, encouraging innovation of new technologies and further creative expansion of the internet. Social media platforms have demonstrated a significant growth during this time and have been used to create and disseminate a wealth of information and cultural material. While it is important that copyright owners receive legal protection of the content they create, it is necessary not to simultaneously stifle the creativity of end-users. Copyright owners have more power in bargaining for their rights, and their rights are well established through statutory protections. However, internet innovators and end-users, who may have a …


Taking, Tort, Or Crown Right?: The Confused Early History Of Government Patent Policy, 12 J. Marshall Rev. Intell. Prop. L. 145 (2012), Sean M. O'Connor Jan 2012

Taking, Tort, Or Crown Right?: The Confused Early History Of Government Patent Policy, 12 J. Marshall Rev. Intell. Prop. L. 145 (2012), Sean M. O'Connor

UIC Review of Intellectual Property Law

From the early days of the Republic, Congress and the federal courts grappled with the government’s rights to own or use patents it issued. Courts rejected the British “Crown Rights” rule that allowed the sovereign to practice whatever patents it issued. Instead, the federal government was conceptualized as a legal person on par with any other persons with regard to issued patents. But, this simple rule presented challenges as complexities arose in three intertwined patent rights scenarios. The first involved inventions by government employees. The second revolved around government and government contractor use of patents held by private citizens. And …


You Say, “普拉达” I Say "Counterfeit": The Perils Of Civil Litigation As A Trademark Protection Strategy In China, 12 J. Marshall Rev. Intell. Prop. L. 261 (2012), Tricia M. Brauer Jan 2012

You Say, “普拉达” I Say "Counterfeit": The Perils Of Civil Litigation As A Trademark Protection Strategy In China, 12 J. Marshall Rev. Intell. Prop. L. 261 (2012), Tricia M. Brauer

UIC Review of Intellectual Property Law

Over the past century, China has been depicted as being solely to blame for the world’s most serious commercial piracy problem. But this characterization is not entirely China’s fault. Multinational corporations and international brand owners in China have adopted a flawed approach to combating trademark infringement that is actually making the problem worse within Chinese walls. Companies and brand owners have primarily implemented one dimensional, enforcement only approaches that rely specifically on litigation as a means to curb counterfeiting and trademark infringement. Since 2001, China has made substantial strides in the laws governing trademarks and has trended toward positive treatment …