Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (6)
- Science and Technology Law (5)
- Administrative Law (3)
- Litigation (3)
- Communications Law (2)
-
- Legal History (2)
- Legislation (2)
- Antitrust and Trade Regulation (1)
- Civil Procedure (1)
- Common Law (1)
- Constitutional Law (1)
- Contracts (1)
- Health Law and Policy (1)
- International Humanitarian Law (1)
- International Law (1)
- Internet Law (1)
- Jurisprudence (1)
- Labor and Employment Law (1)
- Law and Economics (1)
- Law and Race (1)
- Military, War, and Peace (1)
- Privacy Law (1)
- Transportation Law (1)
- Keyword
-
- Patent law (3)
- Case law (2)
- Copyright (2)
- Patent trolls (2)
- 19th century (1)
-
- 20th century (1)
- ABC Test (1)
- Abrogation (1)
- Abstractness and inventive concept test (1)
- Accountability (1)
- Administrative Procedure Act (1)
- Administrative procedure (1)
- Algorithms (1)
- Alice v. CLS (1)
- Anticompetetive purpose (1)
- Antitrust law (1)
- Appendix of Forms (1)
- Armed conflicts (1)
- Ashcroft v. Iqbal (1)
- Attacks (1)
- Authors (1)
- Bandwidth (1)
- Bell Atlantic v. Twombly (1)
- Berne Convention (1)
- Berne Convention Implementation Act (1)
- Big data (1)
- Body marking (1)
- Brands (1)
- Business models (1)
- Clinical trials (1)
Articles 1 - 11 of 11
Full-Text Articles in Law
Patent Privateers And Antitrust Fears, Matthew Sipe
Patent Privateers And Antitrust Fears, Matthew Sipe
Michigan Telecommunications & Technology Law Review
Patent trolls are categorically demonized as threatening American innovation and industry. But whether they are a threat that antitrust law is equipped to deal with is a complex question that depends on the particular type of patent troll and activities they engage in. This Article looks specifically at privateer patent trolls: entities that acquire their patents from operating entities and assert them against other industry members. In the particular context of privateering, antitrust law is almost certainly not the proper legal solution. Privateering does raise significant issues: circumventing litigation constraints, evading licensing obligations, and raising the cost and frequency of …
Rent-Seeking And Inter Partes Review: An Analysis Of Invalidity Assertion Entities In Patent Law, W. Michael Schuster
Rent-Seeking And Inter Partes Review: An Analysis Of Invalidity Assertion Entities In Patent Law, W. Michael Schuster
Michigan Telecommunications & Technology Law Review
This Essay is the first analysis of a recent entrant on the patent landscape: the Invalidity Assertion Entity (IAE). IAEs engage in rent-seeking by demanding payment from patent holders in exchange for not attempting to invalidate their patents through administrative action before the U.S. Patent and Trademark Office. The response to IAEs has been uniformly negative. Reflexive proposals have been raised in Congress (unsurprisingly) to terminate the IAE business model. In contrast to the common response to IAEs, this Essay discusses how profit-driven IAEs may generate socially beneficial externalities and why legislating to end the IAE business model is imprudent.
Branded: Trademark Tattoos, Slave Owner Brands, And The Right To Have "Free" Skin, Shontavia Johnson
Branded: Trademark Tattoos, Slave Owner Brands, And The Right To Have "Free" Skin, Shontavia Johnson
Michigan Telecommunications & Technology Law Review
Though existing for several millennia in various cultures, body modification through tattooing is becoming more popular in the United States. Twenty percent of Americans have at least one tattoo, and among Millennials this number grows to almost forty percent. As the popularity of tattoos has increased in recent years, so too have questions revolving around concepts of intellectual property and the plausible limitations of any rights stemming therefrom. This Article addresses the implications, for both the tattooist and the tattooed, of using trademarked designations as tattoos. Neither the courts nor Congress have definitively answered the question of how traditional trademark …
Plausible Pleading In Patent Suits: Predicting The Effects Of The Abrogation Of Form 18, Kyle R. Williams
Plausible Pleading In Patent Suits: Predicting The Effects Of The Abrogation Of Form 18, Kyle R. Williams
Michigan Telecommunications & Technology Law Review
On December 1, 2015, amendments to the Federal Rules of Civil Procedure took effect. The changes included, among other things, the abrogation of the Appendix of Forms, which contained templates for summons, complaints, answers, and other litigation documents. Prior to its abrogation, Form 18—a template for a “Complaint for Patent Infringement”—was widely utilized by patent plaintiffs in crafting infringement complaints. Form 18 was created during the Conley pleading regime, when conclusory allegations were generally sufficient to survive a motion to dismiss. Accordingly, the sample allegations in Form 18 were conclusory and bare-bones in nature. Under Conley, plaintiffs who followed this …
A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof
A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof
Michigan Telecommunications & Technology Law Review
For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …
Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan
Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan
Michigan Telecommunications & Technology Law Review
Mayo v. Prometheus and Alice v. CLS are landmark Supreme Court decisions which respectively introduced and then instituted a new, two-step patent-eligibility test. Step One tests the patent claims for abstractness, while Step Two tests for inventive application. This new test was so demanding that in the one-year period after Alice was decided, over 80 percent of all challenged patents had one or more claims invalidated. In fact, at the Federal Circuit over the same time period, only one recorded case of a successful Alice defense exists—DDR Holdings v. Hotels.com. This note explains DDR’s success as an inconsistency …
The Effect Of The 1886 Berne Convention On The U.S. Copyright System's Treatment Of Moral Rights And Copyright Term, And Where That Leaves Us Today, Samuel Jacobs
Michigan Telecommunications & Technology Law Review
The 1886 Berne Convention was the most influential copyright related treaty for over a century, and provided important minimum substantive protections for authors. Key provisions included the establishment of the principle of National Treatment, the abolishment of formalities in order to receive copyright protection, a required copyright term of life of the author plus fifty years, and most offensive to the U.S. copyright system, the mandate that signatories provide authors non-economic moral rights. Despite the international importance and widespread acceptance of the Berne Convention, the U.S. did not join the Convention for over one hundred years, making it one of …
Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty
Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty
Michigan Telecommunications & Technology Law Review
Power outages, manipulations of data, and interruptions of Internet access are all possible effects of cyber operations. Unfortunately, recent efforts to address and regulate cyberspace operations under international law often emphasize the uncommon, though severe, cyber-attacks that cause deaths, injuries, or physical destruction. This paper deals with cyber operations during armed conflicts that cause major disruption or interruption effects – as opposed to deaths, injuries, or physical destruction. The purpose of this paper is to explore the consequences of these cyber operations that cause major disruption or interruption effects, and to argue that they might still constitute “acts of violence,” …
Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig
Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig
Michigan Telecommunications & Technology Law Review
Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …
Blacklining Editorial Privilege, Justin Hurwitz
Blacklining Editorial Privilege, Justin Hurwitz
Michigan Telecommunications & Technology Law Review
Over the past year, FCC Commissioner Mike O’Rielly has drawn valuable attention to various Commission procedures in need of reform. Of these procedures perhaps the most perplexing is that of “editorial privileges” – a process whereby Commission staff is granted permission to continue editing Commission Orders subsequent to their adoption, such that the text of the Order voted on by the Commission is not necessarily the same as that ultimately published in the Federal Register or otherwise released to the public. This procedure is longstanding – predating institutional memory; yet it is also entirely unprecedented in the canon of administrative …
Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii
Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii
Michigan Telecommunications & Technology Law Review
Black-box medicine—the use of big data and sophisticated machine-learning techniques for health-care applications—could be the future of personalized medicine. Black-box medicine promises to make it easier to diagnose rare diseases and conditions, identify the most promising treatments, and allocate scarce resources among different patients. But to succeed, it must overcome two separate, but related, problems: patient privacy and algorithmic accountability. Privacy is a problem because researchers need access to huge amounts of patient health information to generate useful medical predictions. And accountability is a problem because black-box algorithms must be verified by outsiders to ensure they are accurate and unbiased, …