Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (40)
- Schulich School of Law, Dalhousie University (19)
- University of Colorado Law School (16)
- University of Michigan Law School (10)
- American University Washington College of Law (7)
-
- Duke Law (6)
- Maurer School of Law: Indiana University (4)
- University of Pennsylvania Carey Law School (4)
- University of Arkansas at Little Rock William H. Bowen School of Law (3)
- Brooklyn Law School (2)
- Chicago-Kent College of Law (2)
- Fordham Law School (2)
- SelectedWorks (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Richmond (2)
- Washington and Lee University School of Law (2)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Case Western Reserve University School of Law (1)
- Georgetown University Law Center (1)
- Georgia State University College of Law (1)
- Selected Works (1)
- Singapore Management University (1)
- Southern Methodist University (1)
- The Catholic University of America, Columbus School of Law (1)
- University at Buffalo School of Law (1)
- University of Kentucky (1)
- University of Missouri-Kansas City School of Law (1)
- University of Pittsburgh School of Law (1)
- University of Washington School of Law (1)
- Keyword
-
- Technology (7)
- Patents & Technology (6)
- Internet (5)
- Powder River Basin (5)
- San Juan Basin (5)
-
- Wells (5)
- Copyright (4)
- Human Genome Project (4)
- ICANN (4)
- Montana (4)
- New Mexico (4)
- Wyoming (4)
- Bureau of Land Management (3)
- Coalbed methane (3)
- Colorado (3)
- Defamation (3)
- Groundwater (3)
- PIPEDA (3)
- Patents (3)
- Accessibility of judicial opinions (2)
- Agriculture (2)
- BLM (2)
- Behavior (2)
- Changes in media (2)
- Coal seams (2)
- Coalbed methane development (2)
- Criminal liability (2)
- DNA science (2)
- Data (2)
- E-government (2)
- Publication
-
- UIC Review of Intellectual Property Law (20)
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Canadian Journal of Law and Technology (18)
- Coalbed Methane Development in the Intermountain West (April 4-5) (13)
- American University Law Review (7)
-
- All Faculty Scholarship (6)
- Duke Law & Technology Review (6)
- Articles (5)
- Faculty Scholarship (5)
- Book Chapters (3)
- Publications (3)
- The Journal of Appellate Practice and Process (3)
- University of Michigan Journal of Law Reform (3)
- Faculty Publications (2)
- Washington and Lee Law Review (2)
- Articles by Maurer Faculty (1)
- Articles, Book Chapters, & Popular Press (1)
- Brigham Young University Education and Law Journal (1)
- Buffalo Intellectual Property Law Journal (1)
- Edward Ivan Cueva (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty Publications By Year (1)
- Faculty Works (1)
- Federal Communications Law Journal (1)
- Fordham Urban Law Journal (1)
- Horacio M. LYNCH (1)
- Indiana Journal of Global Legal Studies (1)
- Indiana Law Journal (1)
- Journal of Health Care Law and Policy (1)
- Kentucky Law Journal (1)
- Publication Type
Articles 61 - 90 of 141
Full-Text Articles in Law
Fraud And Enforceability: Potential Implications For Federal Circuit Litigation, Michael Kim
Fraud And Enforceability: Potential Implications For Federal Circuit Litigation, Michael Kim
Duke Law & Technology Review
Should fraudulent litigation tactics and testimony affect the validity of underlying patents? What results are possible if the enforceability of a patent turns on the conduct of the applying party not only before the Patent and Trademark Office, but also before circuit courts? The author of the following article considers these questions in light of the recent Aptix Corp. case.
Beyond Napster: Using Antitrust Law To Advance And Enhance Online Music Distribution, Frank Pasquale, Matthew Fagin, Kim Weatherall
Beyond Napster: Using Antitrust Law To Advance And Enhance Online Music Distribution, Frank Pasquale, Matthew Fagin, Kim Weatherall
Faculty Scholarship
No abstract provided.
Two Concepts Of Immortality: Reframing Public Debate On Stem-Cell Research, Frank Pasquale
Two Concepts Of Immortality: Reframing Public Debate On Stem-Cell Research, Frank Pasquale
Faculty Scholarship
No abstract provided.
Beyond Napster--The Future Of The Digital Commons: Introduction, Elizabeth Rindskopf Parker
Beyond Napster--The Future Of The Digital Commons: Introduction, Elizabeth Rindskopf Parker
McGeorge School of Law Scholarly Articles
No abstract provided.
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Before It's Too Late- Addressing Fear Of Genetic Information, Karen H. Rothenberg, Sharon F. Terry
Before It's Too Late- Addressing Fear Of Genetic Information, Karen H. Rothenberg, Sharon F. Terry
Faculty Scholarship
No abstract provided.
The Uniform Domain Name Dispute Resolution Policy: A Practical Guide, Bradley J. Freedman, Robert J.C. Deane
The Uniform Domain Name Dispute Resolution Policy: A Practical Guide, Bradley J. Freedman, Robert J.C. Deane
Canadian Journal of Law and Technology
Disputes involving alleged bad faith registration and use of certain Internet domain names may be arbitrated pursuant to the Uniform Domain Name Dispute Resolution Policy (the Policy) mandated by the Internet Corporation for Assigned Names and Numbers ("ICANN").
The Policy is the first attempt to establish a global set of substantive rules regarding certain kinds of Internet-related trademark disputes, and a single, international system for the arbitration of those disputes. In many respects, the Policy has fulfilled its objective of providing an efficient and cost effective means of resolving certain domain name disputes. In other respects, however, the experience with …
An Enzo White Paper: A New Judicial Standard For A Biotechnology "Written Description" Under 35 U.S.C. § 112, ¶ 1, 1 J. Marshall Rev. Intell. Prop. L. 254 (2002), Harold C. Wegner
An Enzo White Paper: A New Judicial Standard For A Biotechnology "Written Description" Under 35 U.S.C. § 112, ¶ 1, 1 J. Marshall Rev. Intell. Prop. L. 254 (2002), Harold C. Wegner
UIC Review of Intellectual Property Law
The April 2, 2002, Federal Circuit opinion in Enzo Biochem, Inc. v. Gen-Probe Inc., may have the greatest potential impact on a multidimensional basis of any decision from that court in recent years. Far more important than whatever disruption takes place domestically—which may be fixed through Congressional or further judicial action—one must look to the foreign impact of the Enzo opinion. This decision threatens to undermine the patent basis for American protection of biotechnology inventions abroad, once the case is understood and embodied in the several foreign patent laws. Problems with Enzo are not limited to biotechnology. What’s good for …
Business Method Patents: Are There Any Limits?, 2 J. Marshall Rev. Intell. Prop. L. 30 (2002), Bradley C. Wright
Business Method Patents: Are There Any Limits?, 2 J. Marshall Rev. Intell. Prop. L. 30 (2002), Bradley C. Wright
UIC Review of Intellectual Property Law
No abstract provided.
Are You My Parent? Are You My Child? The Role Of Genetics And Race In Defining Relationships After Reproductive Technological Mistakes, 5 Depaul J. Health Care L. 15 (2002), Raizel Liebler
UIC Law Open Access Faculty Scholarship
Imagine that you are a married woman who wants to have a genetically related child with your husband. Your doctor tells you that you are infertile, and therefore you and your husband go to XYZ fertility clinic to receive in vitro treatment. You have your eggs harvested, your husband supplies sperm, and ten embryos are created. Five embryos are implanted in your uterus and five are frozen and kept by the fertility clinic for your later use. You successfully conceive and give birth to twins. You notice that the children you give birth to are of a different race than …
Content-Based Regulation Of Electronic Media: Indecent Speech On The Internet, 21 J. Marshall J. Computer & Info. L. 19 (2002), Kelly M. Slavitt, Matthew Knorr
Content-Based Regulation Of Electronic Media: Indecent Speech On The Internet, 21 J. Marshall J. Computer & Info. L. 19 (2002), Kelly M. Slavitt, Matthew Knorr
UIC John Marshall Journal of Information Technology & Privacy Law
Using an airing of the Victoria Secret fashion show as an example, the author explores the definition of "indecency" in media. She first discusses the how FCC treats indecency in traditional media (radio, broadcast TV and cable). Then, she addresses numerous failed attempts of applying indecency on the Internet. Consequently, she compares and contrasts the different media. Lastly, she suggests a solution in this regard that would likely pass constitutional muster. The FCC can impose fines or prison sentences on radio and broadcasting licensees for "uttering any obscene, indecent or profane language by means of radio communications." As for cable …
The Digital Millennium Copyright Act: A Review Of The Law And The Court's Interpretation, 21 J. Marshall J. Computer & Info. L. 1 (2002), Neil A. Benchell
The Digital Millennium Copyright Act: A Review Of The Law And The Court's Interpretation, 21 J. Marshall J. Computer & Info. L. 1 (2002), Neil A. Benchell
UIC John Marshall Journal of Information Technology & Privacy Law
In this review of the Titles I and II of the Digital Millennium Copyright Act, the author first discusses recent case laws affecting the Act. Then, he analyzes sections of the Act, such as the anti-circumvention provisions, constitutionality of the Act, the ISP safe harbor provision, etc. Within each sectional reviews, the author discusses case laws that exemplify courts' interpretation of the Act. In the end, the author discusses the future of the Act. First, he argues that the Act would be challenged under constitutional grounds. The Framers of the Constitution never intended to grant a perpetual monopoly for copyright …
2002 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 21 J. Marshall J. Computer & Info. L. 99 (2002), Joe Heenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
2002 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 21 J. Marshall J. Computer & Info. L. 37 (2002), Jeffrey M. Brown, Matthew Knorr, Pat Magierski, Charles Lee Mudd Jr., Elizabeth A. Walsh
2002 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 21 J. Marshall J. Computer & Info. L. 37 (2002), Jeffrey M. Brown, Matthew Knorr, Pat Magierski, Charles Lee Mudd Jr., Elizabeth A. Walsh
UIC John Marshall Journal of Information Technology & Privacy Law
In this moot court competition bench memo, the Supreme Court the state of Marshall has three issues to decide: (1) whether the Court of Appeals erred in holding that the Plaintiff failed to established the requisite elements to evidence a theory of intrusion upon seclusion as defined by the Restatement of Torts; (2) whether the Court of Appeals erred in holding that the Defendant’s statements to third parties were not defamatory but rather opinions or fair comment; and (3) whether the Court of Appeals erred in applying a strict breach of contract analysis to Plaintiff’s claim for deceptive business practices, …
2002 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 21 J. Marshall J. Computer & Info. L. 59 (2002), Sheri L. Caldwell
2002 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 21 J. Marshall J. Computer & Info. L. 59 (2002), Sheri L. Caldwell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Windows Xp: Another Court Battle For Microsoft?, 20 J. Marshall J. Computer & Info. L. 193 (2002), Sara Stocky, Reuven R. Levary
Windows Xp: Another Court Battle For Microsoft?, 20 J. Marshall J. Computer & Info. L. 193 (2002), Sara Stocky, Reuven R. Levary
UIC John Marshall Journal of Information Technology & Privacy Law
Microsoft Windows XP's possible antitrust violations are addressed in relation to the U.S. v. Microsoft court of appeals decision. The aftermath and settlement of the Microsoft case are described. The implications of this case on the Microsoft Windows XP are discussed. Windows XP operating system is analyzed within the antitrust framework. Finally, current events that may affect a Windows XP antitrust case are discussed.
Chemical Claims Drafting After Lubrizol, 20 J. Marshall J. Computer & Info. L. 207 (2002), Caroline Frances Barry
Chemical Claims Drafting After Lubrizol, 20 J. Marshall J. Computer & Info. L. 207 (2002), Caroline Frances Barry
UIC John Marshall Journal of Information Technology & Privacy Law
In Exxon Chemical Patents, Inc. v. Lubrizol Corp. and its companion decision, the US Court of Appeals for the Federal Circuit held that a chemical composition claimed in an ingredient-based form is not infringed when there is interaction between the ingredients after they have been combined so as to later either their quantity or their chemical form. This article discusses the impact of the decisions on chemical drafting of chemical inventions. The author argues that the decisions were wrongly decided. Furthermore, the author proposes an amendment to the Patent Act to allow ingredient-based claiming to continue to be used and …
The “Magic Lantern” Revealed: A Report Of The Fbi’S New “Key Logging” Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, 20 J. Marshall J. Computer & Info. L. 287 (2002), Neal Hartzog
UIC John Marshall Journal of Information Technology & Privacy Law
"You already have zero privacy anyway. Get over it." With the FBI's new stealth surveillance tool, the "Magic Lantern," this quote is an understatement. This article takes reader through a revealing journey of how the FBI, under the authority of the USA Patriot Act, conducts surveillance by using the most advanced technology such as the "Magic Lantern" and "Carnivore." The author first explains how these invisible keystroke logging software/worm/Trojan horse functions in acquiring the information for the FBI constantly and consistently over the Internet. Undoubtedly, the extend of individual's privacy invasion would be pervasive. Hence, the author discusses the constitutionality …
Face Recognition Technology: The Potential Orwellian Implications And Constitutionality Of Current Uses Under The Fourth Amendment, 20 J. Marshall J. Computer & Info. L. 321 (2002), Robert H. Thornburg
Face Recognition Technology: The Potential Orwellian Implications And Constitutionality Of Current Uses Under The Fourth Amendment, 20 J. Marshall J. Computer & Info. L. 321 (2002), Robert H. Thornburg
UIC John Marshall Journal of Information Technology & Privacy Law
Did you smile at the 2001 Super Bowl at Tampa's Raymond James Stadium? Hope you did because the facial recognition cameras certainly got your smile, applause, disappointment and kisses in that great American sports night. If you missed your 15-second of fame, try it again at the Salt Lake City Winter Olympics. With the use of facial recognition technology at the 2001 Super Bowl and Salt Lake City Winter Olympics, the author seeks to explore the use of this facial recognition technology. He further discusses the constitutionality of it under the Fourth Amendment. In doing so, he analyzes how facial …
Big Media: Its Effect On The Marketplace Of Ideas And How To Slow The Urge To Merge, 20 J. Marshall J. Computer & Info. L. 247 (2002), Donald R. Simon
Big Media: Its Effect On The Marketplace Of Ideas And How To Slow The Urge To Merge, 20 J. Marshall J. Computer & Info. L. 247 (2002), Donald R. Simon
UIC John Marshall Journal of Information Technology & Privacy Law
"The free flow of information is the life-blood of democracy." Americans are experiencing many media corporate mergers in recent years, and one is likely to ponder whether the idea of "marketplace of ideas" still holds true. In this article, the author discusses how economically driven censorship of journalism is blinding the public by market concentration and cross-ownership of media corporations. The fears of the Founding Fathers still lurk in the background as James Madison wrote: "a popular government without popular information, or the means of acquiring it, is but a prologue to a farce or a tragedy, or perhaps both." …
An "Opposition" To The Recently-Proposed Legislation Related To Business Model Patents, 20 J. Marshall J. Computer & Info. L. 397 (2002), Gregory J. Maier, Thomas J. Fisher, Philippe J. C. Signore
An "Opposition" To The Recently-Proposed Legislation Related To Business Model Patents, 20 J. Marshall J. Computer & Info. L. 397 (2002), Gregory J. Maier, Thomas J. Fisher, Philippe J. C. Signore
UIC John Marshall Journal of Information Technology & Privacy Law
The authors in this article review the history of the business method exception before and after the State Street Bank case. In that case, the Court of Appeals for the Federal Circuit decided that there was no business method exception, and never had been. The court pointed out that previous decisions were decided on other grounds found in the statutes. The authors argue that, because of the timing and economic environment of the decision, the case gained much popularity and discussion. However, the patent law has not changed since then and the business method exception is still not a patentable …
Transnational Evidence Gathering And Local Prosecution Of International Cybercrime, 20 J. Marshall J. Computer & Info. L. 347 (2002), Susan W. Brenner, Joseph J. Schwerha Iv
Transnational Evidence Gathering And Local Prosecution Of International Cybercrime, 20 J. Marshall J. Computer & Info. L. 347 (2002), Susan W. Brenner, Joseph J. Schwerha Iv
UIC John Marshall Journal of Information Technology & Privacy Law
By analyzing two high-profile cybercrime cases, the authors discuss legal and procedural issues involved when gathering evidence across national borders. In US v. Gorshkov, the FBI was asked to investigate a series of intrusions into the computer systems of businesses in the US from Russia. The second incident is when system administrators at the Rom Air Development Center at Griffis Air Force Base in New York discovered hackers had installed password sniffer programs on all system networks. One of the hackers was identified to be a British citizen. The first thing to start a transnational evidence gathering is to determine …
E-Korean Dsl Policy: Implications For The United States, 20 J. Marshall J. Computer & Info. L. 417 (2002), Junseong An
E-Korean Dsl Policy: Implications For The United States, 20 J. Marshall J. Computer & Info. L. 417 (2002), Junseong An
UIC John Marshall Journal of Information Technology & Privacy Law
In a comparative study of the DSL service developments between the US and South Korea, the author discusses the strength of South Korea in this regard and how the US counterpart can learn from the examples. First, the author argues the laws and regulations in South Korea make the DSL deployment flourish. The urban development in Seoul, for example, gets people "wired" easier and cheaper as city dwellers live in multi-dwelling units. In addition, the forward thinking of the South Korean government in laying the Korean Information Infrastructure culminates this rapid development. With a comprehensive plan in place, the economics …
O' Big Brother Where Art Thou?: The Constitutional Use Of Facial-Recognition Technology, 20 J. Marshall J. Computer & Info. L. 471 (2002), Susan Mccoy
UIC John Marshall Journal of Information Technology & Privacy Law
How to balance the protection of personal privacy and security in light of the use of facial recognition technology? The author argues that the use of facial recognition technology does not violate individual's Fourth Amendment rights to privacy. First, there is no reasonable expectation of privacy in public places. Second, the database used only contains the identities of known criminal and terrorists. Third, facial recognition technology only facilitates existing methods of screening and comparing mug shots of known criminals on the street. With these arguments, the author proposes suggestions to legislations that cover facial recognition or other biometric technologies. In …
Does What Works For “.Com” Also Work For “.Cn”?: Comparative Study Of Anti-Cybersquatting Legal Systems In The United States And China, 20 J. Marshall J. Computer & Info. L. 541 (2002), Fang Fang, Jiarui Lui
Does What Works For “.Com” Also Work For “.Cn”?: Comparative Study Of Anti-Cybersquatting Legal Systems In The United States And China, 20 J. Marshall J. Computer & Info. L. 541 (2002), Fang Fang, Jiarui Lui
UIC John Marshall Journal of Information Technology & Privacy Law
On July 24, 2001, the Supreme People's Court issued a judicial interpretation as a guideline for all Chinese courts in deciding cybersquatting cases. However, the interpretation followed closely to the U.S. Anti-Cybersquatting Consumer Protection Act. With inherent legal and judicial differences between the two countries, the authors analyze whether and to what extent China can transplant the American experience to construct Chinese effective legal mechanisms against cybersquatters. In so doing, authors first discuss the Lanham Act and using trademark infringement as a cause of action. Authors are quick to point out that cybersquatters do not use registered trademarks to conduct …
Cybersurgery: Innovation Or A Means To Close Community Hospitals And Displace Physicians?, 20 J. Marshall J. Computer & Info. L. 495 (2002), Thomas R. Mclean
Cybersurgery: Innovation Or A Means To Close Community Hospitals And Displace Physicians?, 20 J. Marshall J. Computer & Info. L. 495 (2002), Thomas R. Mclean
UIC John Marshall Journal of Information Technology & Privacy Law
Cybersurgery is a surgical technique that allows a surgeon, using a telecommunication conduit connected to a robotic instrument, to operate on a remote patient. As a medical doctor, the author discusses the place of cybersurgery in the U.S. health care system of the new millennium. The author first reviews the field of cybersurgery and how the automatic surgeon will make off-line remote surgery possible. Then, he examines the global economy in health care systems and the impact of cybersurgery on closure of community hospitals and displacing physicians. Consequently, he discusses the ability of these entities to protect themselves with trade …
In Re Mastercard International, Inc.: The Inapplicability Of The Wire Act To Tradistional Casino-Style Games, 20 J. Marshall J. Computer & Info. L. 445 (2002), Elizabeth A. Walsh
In Re Mastercard International, Inc.: The Inapplicability Of The Wire Act To Tradistional Casino-Style Games, 20 J. Marshall J. Computer & Info. L. 445 (2002), Elizabeth A. Walsh
UIC John Marshall Journal of Information Technology & Privacy Law
Using the online gambling and gaming as the background, the author discusses the impact of the Wire Communications Act of 1961 and the Racketeer Influenced and Corrupt Organizations Act (RICO) on the gaming industry. The story goes like this: Bob stumbled upon an online gambling Web site. While excited, he charges his credit card to open a gambling account with the site. He did not need to leave home to enjoy this great adventure. However, when the luck runs out, Bob realizes he has $3,000 in debt. Unwilling to pay, Bob decides to sue someone. In the end, Bob decides …
Vietnam’S Antitrust Legislation And Subscription To E-Asean: An End To The Bamboo Firewall Over Internet Regulation, 20 J. Marshall J. Computer & Info. L. 631 (2002), Robert Neil Wilkey
Vietnam’S Antitrust Legislation And Subscription To E-Asean: An End To The Bamboo Firewall Over Internet Regulation, 20 J. Marshall J. Computer & Info. L. 631 (2002), Robert Neil Wilkey
UIC John Marshall Journal of Information Technology & Privacy Law
As a result of an unprecedented congestion of its Internet and mobile phone communications, many technocrats in Vietnam trace such problems to government policy driven by security concerns. Therefore, the author in this article analyzes Vietnam's regulatory response to Internet technology. The author first discusses the historical background of Vietnam's management and regulatory policy over the Internet. He argues that the policy is essentially the result of socialist assumptions of the state's dominant role in the country's economic growth. Under its 1997 decree regarding Internet usage, the General Director of the General Postal Bureau has the exclusive authority and primary …
A Digital Free Trade Zone And Necessarily-Regulated Self-Governance For Electronic Commerce: The World Trade Organization, International Law, And Classical Liberalism In Cyberspace, 20 J. Marshall J. Computer & Info. L. 595 (2002), Kristi L. Bergemann
UIC John Marshall Journal of Information Technology & Privacy Law
In the absence of a world government, cross border trade is always subject to rules that must be politically negotiated among nations that are sovereign in their own realm but not outside their borders. The author explores the development of an international trade and e-commerce paradigm in two main phases as the Internet superhighway bridges nations together. She argues that the construction of an international trading framework must strike the appropriate balance between institutional order and norms and the human and business realities of free trade and democracy. She further argues that the balance can be achieved by creating an …
One Man's Trash Is Another Man's Treasure, Bioprospecting: Protecting The Rights And Interests Of Human Donors Of Genetic Material, Anne Nichols Hill
One Man's Trash Is Another Man's Treasure, Bioprospecting: Protecting The Rights And Interests Of Human Donors Of Genetic Material, Anne Nichols Hill
Journal of Health Care Law and Policy
No abstract provided.