Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (46)
- Pepperdine University (19)
- University of Michigan Law School (18)
- Case Western Reserve University School of Law (14)
- Schulich School of Law, Dalhousie University (11)
-
- UC Law SF (10)
- Maurer School of Law: Indiana University (6)
- Santa Clara Law (6)
- Duke Law (3)
- Southern Methodist University (3)
- Vanderbilt University Law School (3)
- University of Maryland Francis King Carey School of Law (2)
- Chicago-Kent College of Law (1)
- Fordham Law School (1)
- Pace University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Missouri-Kansas City School of Law (1)
- University of San Diego (1)
- Keyword
-
- Technology (10)
- Internet (5)
- Law reform (5)
- Patent law (5)
- Police (5)
-
- Information (4)
- Privacy (4)
- Searches (4)
- Genetics (3)
- Intellectual property (3)
- Law (3)
- Legal (3)
- Medicine (3)
- Patent (3)
- Patents (3)
- Patents & Technology (3)
- Regulation (3)
- Science (3)
- Surveillance (3)
- United States Supreme Court (3)
- Biotechnology (2)
- Book reviews (2)
- Children (2)
- Cloning (2)
- Copyright (2)
- DNA (2)
- Discrimination (2)
- Disease (2)
- Employers (2)
- Evidence (2)
- Publication
-
- UIC Review of Intellectual Property Law (24)
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Journal of Law, Technology, & the Internet (14)
- Canadian Journal of Law and Technology (11)
- Pepperdine Law Review (11)
-
- UC Law Science and Technology Journal (10)
- Santa Clara High Technology Law Journal (6)
- The Journal of Business, Entrepreneurship & the Law (6)
- University of Michigan Journal of Law Reform Caveat (6)
- IP Theory (5)
- Michigan Telecommunications & Technology Law Review (4)
- Duke Law & Technology Review (3)
- Michigan Law Review (3)
- SMU Science and Technology Law Review (3)
- UIC Law Review (3)
- Journal of Health Care Law and Policy (2)
- Michigan Journal of Environmental & Administrative Law (2)
- Pepperdine Dispute Resolution Law Journal (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Chicago-Kent Law Review (1)
- Fordham Urban Law Journal (1)
- Indiana Journal of Global Legal Studies (1)
- Michigan Business & Entrepreneurial Law Review (1)
- Michigan Journal of Gender & Law (1)
- Pace Law Review (1)
- San Diego International Law Journal (1)
- Touro Law Review (1)
- UMKC Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Michigan Journal of Law Reform (1)
Articles 61 - 90 of 148
Full-Text Articles in Law
Patents V. Statutory Exclusivities In Biological Pharmaceuticals - Do We Really Need Both, Yaniv Heled
Patents V. Statutory Exclusivities In Biological Pharmaceuticals - Do We Really Need Both, Yaniv Heled
Michigan Telecommunications & Technology Law Review
Over the past decade or so, the United States has been the arena of a boisterous debate regarding the creation of a new regulatory framework for the approval of generic versions of biologics-based pharmaceutical products (also known as "biological products" and "biologics")--an important and increasingly growing class of drugs. The basic purpose of such a framework is to create a fast and less-costly route to FDA approval for biologics that would be similar or identical to already-approved biological products--typically ones that are sold on the market at monopoly rates--thereby allowing cheaper versions of such medicines to enter the market. One …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Res Or Rules - Patents And The (Uncertain) Rules Of The Game, Emily Michiko Morris
Res Or Rules - Patents And The (Uncertain) Rules Of The Game, Emily Michiko Morris
Michigan Telecommunications & Technology Law Review
The Article proceeds as follows. Part I reviews the basics of patent claiming, the traditional view of claims as real property deeds, and why uncertainty as to the boundaries of those deeds is considered undesirable. Part II critiques the analogy between real property deeds and patent claims, highlighting in particular the requisite novelty and conceptual nature of the patent res, the differences between the purposes of the patent system and real property regimes, and the effect of these different purposes on the expected predictability of patent boundaries. Part III then changes the analogy from patent claims as property deeds to …
Enhancing Public Access To Online Rulemaking Information, Cary Coglianese
Enhancing Public Access To Online Rulemaking Information, Cary Coglianese
Michigan Journal of Environmental & Administrative Law
One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …
Induced Infringement As A Strict Liability Claim: Abolishment Of The Specific Intent Requirement, Soonbok Lee
Induced Infringement As A Strict Liability Claim: Abolishment Of The Specific Intent Requirement, Soonbok Lee
UC Law Science and Technology Journal
This Note argues that the specific intent requirement for § 271(b) should be abolished. It shows that the language of § 271(b) does not provide textual support for the specific intent requirement. Additionally, it argues that the specific intent requirement is contrary to early case law before the enactment of the 1952 Patent Act and is in conflict with many aspects of patent law including the utilitarian policies, the doctrine of equivalents and basic risk allocation. Finally, this Note demonstrates that the overlapping scope of § 271(b) and § 271(c) necessitates the specific intent requirement because Congress intended § 271(b) …
Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie
Limiting The Affirmative Defense In The Digital Workplace , Daniel B. Garrie
Michigan Journal of Gender & Law
From 2009 to 2011, there were more than 30,000 sexual harassment claims filed in the United States. The ubiquitous availability of digital technology devices has facilitated many instances of sexual harassment. Such sexual harassment occurs through unprovoked and offensive e-mails, messages posted on electronic bulletin boards, and other means available on the Internet. To date, courts remain silent on this issue. Should this type of sexual harassment be treated differently from physical sexual harassment? The surprising answer is yes. This Article suggests a new judicial framework for addressing sexual harassment perpetrated through digital communications. This framework accounts for the real-world …
Biobanks As A Tissue And Information Semicommons: Balancing Interests For Personalized Medicine, Tissue Donors And The Public Health, Ken Gatter
Journal of Health Care Law and Policy
No abstract provided.
Indefinite Freeze?: The Obligations A Cryopreservation Bank Has To Abandoned Frozen Embryos In The Wake Of The Maryland Stem Cell Research Act Of 2006, Maggie Davis
Journal of Health Care Law and Policy
No abstract provided.
What Trademark Law Could Learn From Employment Law, 12 J. Marshall Rev. Intell. Prop. L. Rev. 118 (2012), Robert A. Kearney
What Trademark Law Could Learn From Employment Law, 12 J. Marshall Rev. Intell. Prop. L. Rev. 118 (2012), Robert A. Kearney
UIC Review of Intellectual Property Law
Trademark litigation is as unpredictable as it is expensive. The Trademark Trial and Appeal Board (“Board”) considers as many as thirteen different factors when evaluating whether a trademark causes a “likelihood of confusion.” Federal courts use many of the same factors, though which factors are chosen differ by jurisdiction, and, do not necessarily overlap with the Board. Further, a party can litigate for a time before the Board, then in federal court, and then back before the Board. And, if this were not enough, the Board’s decisions have little if any preclusive effect on the court, and, a court’s decision …
Are Royalties Reasonable In Patent Infringment Suits? Using Hindsight At The Hypothetical Negotiating Table, 12 J. Marshall Rev. Intell. Prop. L. 241 (2012), Michael J. Carrozza
Are Royalties Reasonable In Patent Infringment Suits? Using Hindsight At The Hypothetical Negotiating Table, 12 J. Marshall Rev. Intell. Prop. L. 241 (2012), Michael J. Carrozza
UIC Review of Intellectual Property Law
Reasonable royalties have become the primary form of relief in patent infringement lawsuits. Once a patent is found valid and infringed, royalties are calculated based on a hypothetical license negotiation between the patent owner and infringer said to take place at the moment infringement began. The calculations seek to arrive at a royalty amount the parties would have agreed upon had an actual license been negotiated. But there is disagreement among courts as to what information should inform the royalty amount. Some take the hypothetical negotiation literally and disallow post-infringement information from entering the calculations because such information would have …
Patent Claim Construction As A Form Of Legal Interpretation, 12 J. Marshall Rev. Intell. Prop. L. 40 (2012), Christian E. Mammen
Patent Claim Construction As A Form Of Legal Interpretation, 12 J. Marshall Rev. Intell. Prop. L. 40 (2012), Christian E. Mammen
UIC Review of Intellectual Property Law
Since the U.S. Supreme Court’s landmark decision, Markman v. Westview Instruments, Inc., courts have employed a textualist approach when construing patent claims. Claim construction has been held to be purely a matter of law, which leaves no room for deference when the construction is reconsidered on appellate review. But as argued in this article, patent claims are a unique type of legal text, and cannot simply be analogized to statutes or contracts, which courts and scholars occasionally attempt to do. Taking lessons from the general legal theory of interpretation, the textualist approach should only be a starting point for the …
Hotfile, Megaupload, And The Future Of Copyright On The Internet: What Can Cyberlockers Tell Us About Dmca Reform?, 12 J. Marshall Rev. Intell. Prop. L. 205 (2012), Ross Drath
UIC Review of Intellectual Property Law
More than a decade ago, Napster brought the issue of copyright infringement by file-sharing to the center of the public stage. How would a body of copyright law built to regulate tangible objects apply in the digital realm? The safe harbor provisions of the Digital Millennium Copyright Act, intended as a compromise between the interests of copyright owners and webhosts, have instead introduced legal uncertainty and allocated the costs of online enforcement both inefficiently and disproportionately. While Napster and several other major peer-to-peer services have been shuttered in the intervening period, the scope of online copyright infringement continues to grow …
A Need For Clearer Language About Patent Law, 11 J. Marshall Rev. Intell. Prop. L. 457 (2012), Paul M. Janicke
A Need For Clearer Language About Patent Law, 11 J. Marshall Rev. Intell. Prop. L. 457 (2012), Paul M. Janicke
UIC Review of Intellectual Property Law
This article addresses the manner by which the principles and rules of United States ("U.S.") patent law are addressed, especially those that are not controversial. We often seem driven to use labels that are misleading to external observers, making the subject seem more complex than it is. The principal misstatements addressed in this article are: (1) saying that under American Invents Act, the U.S. is moving to a first-to-file system; (2) reciting that U.S. patent law has no extraterritorial reach; (3) characterizing the term of a U.S. patent as twenty years from filing; (4) purporting in patent licenses to grant …
Chinese Patent Quality: Running The Numbers And Possible Remedies, 11 J. Marshall Rev. Intell. Prop. L. 478 (2012), Mark Liang
UIC Review of Intellectual Property Law
In an effort to improve its economic and technological prowess, China in recent years has promulgated measures that encourage patenting activity. These measures have had their intended effect. Over a million patent applications were filed at China’s State Intellectual Property Office ("SIPO") in 2010, making it the busiest patent office in the world—by comparison, a mere 600,000 were filed at the United States Patent and Trademark Office, placing it a distant second. The disparity and trend is expected to grow in the coming years. But looking behind the headline numbers raises doubts about the quality of China’s patents and the …
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill
Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon
What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore
Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni
A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni
UIC John Marshall Journal of Information Technology & Privacy Law
In a large and complex society, anti-social behavior cannot be restrained by government intervention alone—without it becoming a police state. Informal social controls are necessary to keep deviance from societal norms and values at a socially acceptable level, and one of the levers of this social pressure is the observation of and reaction to the personal conduct of members of one’s community.
This article argues that in several areas of contemporary American life decreasing privacy by strengthening informal social controls will lessen the need for state surveillance and regulation, which tends to be act with a heavier hand and is …
Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.
Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.