Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Patent Privateers And Antitrust Fears, Matthew Sipe Jul 2016

Patent Privateers And Antitrust Fears, Matthew Sipe

Michigan Telecommunications & Technology Law Review

Patent trolls are categorically demonized as threatening American innovation and industry. But whether they are a threat that antitrust law is equipped to deal with is a complex question that depends on the particular type of patent troll and activities they engage in. This Article looks specifically at privateer patent trolls: entities that acquire their patents from operating entities and assert them against other industry members. In the particular context of privateering, antitrust law is almost certainly not the proper legal solution. Privateering does raise significant issues: circumventing litigation constraints, evading licensing obligations, and raising the cost and frequency of …


Rent-Seeking And Inter Partes Review: An Analysis Of Invalidity Assertion Entities In Patent Law, W. Michael Schuster Jul 2016

Rent-Seeking And Inter Partes Review: An Analysis Of Invalidity Assertion Entities In Patent Law, W. Michael Schuster

Michigan Telecommunications & Technology Law Review

This Essay is the first analysis of a recent entrant on the patent landscape: the Invalidity Assertion Entity (IAE). IAEs engage in rent-seeking by demanding payment from patent holders in exchange for not attempting to invalidate their patents through administrative action before the U.S. Patent and Trademark Office. The response to IAEs has been uniformly negative. Reflexive proposals have been raised in Congress (unsurprisingly) to terminate the IAE business model. In contrast to the common response to IAEs, this Essay discusses how profit-driven IAEs may generate socially beneficial externalities and why legislating to end the IAE business model is imprudent.


Branded: Trademark Tattoos, Slave Owner Brands, And The Right To Have "Free" Skin, Shontavia Johnson Jul 2016

Branded: Trademark Tattoos, Slave Owner Brands, And The Right To Have "Free" Skin, Shontavia Johnson

Michigan Telecommunications & Technology Law Review

Though existing for several millennia in various cultures, body modification through tattooing is becoming more popular in the United States. Twenty percent of Americans have at least one tattoo, and among Millennials this number grows to almost forty percent. As the popularity of tattoos has increased in recent years, so too have questions revolving around concepts of intellectual property and the plausible limitations of any rights stemming therefrom. This Article addresses the implications, for both the tattooist and the tattooed, of using trademarked designations as tattoos. Neither the courts nor Congress have definitively answered the question of how traditional trademark …


Plausible Pleading In Patent Suits: Predicting The Effects Of The Abrogation Of Form 18, Kyle R. Williams Jul 2016

Plausible Pleading In Patent Suits: Predicting The Effects Of The Abrogation Of Form 18, Kyle R. Williams

Michigan Telecommunications & Technology Law Review

On December 1, 2015, amendments to the Federal Rules of Civil Procedure took effect. The changes included, among other things, the abrogation of the Appendix of Forms, which contained templates for summons, complaints, answers, and other litigation documents. Prior to its abrogation, Form 18—a template for a “Complaint for Patent Infringement”—was widely utilized by patent plaintiffs in crafting infringement complaints. Form 18 was created during the Conley pleading regime, when conclusory allegations were generally sufficient to survive a motion to dismiss. Accordingly, the sample allegations in Form 18 were conclusory and bare-bones in nature. Under Conley, plaintiffs who followed this …


A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof Jul 2016

A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof

Michigan Telecommunications & Technology Law Review

For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …


Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan Jan 2016

Before Mayo & After Alice: The Changing Concept Of Abstract Ideas, Magnus Gan

Michigan Telecommunications & Technology Law Review

Mayo v. Prometheus and Alice v. CLS are landmark Supreme Court decisions which respectively introduced and then instituted a new, two-step patent-eligibility test. Step One tests the patent claims for abstractness, while Step Two tests for inventive application. This new test was so demanding that in the one-year period after Alice was decided, over 80 percent of all challenged patents had one or more claims invalidated. In fact, at the Federal Circuit over the same time period, only one recorded case of a successful Alice defense exists—DDR Holdings v. Hotels.com. This note explains DDR’s success as an inconsistency …


The Effect Of The 1886 Berne Convention On The U.S. Copyright System's Treatment Of Moral Rights And Copyright Term, And Where That Leaves Us Today, Samuel Jacobs Jan 2016

The Effect Of The 1886 Berne Convention On The U.S. Copyright System's Treatment Of Moral Rights And Copyright Term, And Where That Leaves Us Today, Samuel Jacobs

Michigan Telecommunications & Technology Law Review

The 1886 Berne Convention was the most influential copyright related treaty for over a century, and provided important minimum substantive protections for authors. Key provisions included the establishment of the principle of National Treatment, the abolishment of formalities in order to receive copyright protection, a required copyright term of life of the author plus fifty years, and most offensive to the U.S. copyright system, the mandate that signatories provide authors non-economic moral rights. Despite the international importance and widespread acceptance of the Berne Convention, the U.S. did not join the Convention for over one hundred years, making it one of …


Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty Jan 2016

Virtual Violence - Disruptive Cyberspace Operations As "Attacks" Under International Humanitarian Law, Ido Kilovaty

Michigan Telecommunications & Technology Law Review

Power outages, manipulations of data, and interruptions of Internet access are all possible effects of cyber operations. Unfortunately, recent efforts to address and regulate cyberspace operations under international law often emphasize the uncommon, though severe, cyber-attacks that cause deaths, injuries, or physical destruction. This paper deals with cyber operations during armed conflicts that cause major disruption or interruption effects – as opposed to deaths, injuries, or physical destruction. The purpose of this paper is to explore the consequences of these cyber operations that cause major disruption or interruption effects, and to argue that they might still constitute “acts of violence,” …


Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig Jan 2016

Valuing Spectrum Allocations, Thomas W. Hazlett, Michael Honig

Michigan Telecommunications & Technology Law Review

Observing trends in which Wi-Fi and Bluetooth have become widely popular, some argue that unlicensed allocations hosting such wireless technologies are increasingly valuable and that administrative spectrum allocations should shift accordingly. We challenge that policy conclusion. A core issue is that the social value of a given spectrum allocation is widely assumed to equal the gains of the applications it is likely to host. This thinking is faulty, as vividly seen in what we deem the Broadcast TV Spectrum Valuation Fallacy – the idea that because wireless video, or broadcast network programs are popular, TV channels are efficiently defined. This …


Blacklining Editorial Privilege, Justin Hurwitz Jan 2016

Blacklining Editorial Privilege, Justin Hurwitz

Michigan Telecommunications & Technology Law Review

Over the past year, FCC Commissioner Mike O’Rielly has drawn valuable attention to various Commission procedures in need of reform. Of these procedures perhaps the most perplexing is that of “editorial privileges” – a process whereby Commission staff is granted permission to continue editing Commission Orders subsequent to their adoption, such that the text of the Order voted on by the Commission is not necessarily the same as that ultimately published in the Federal Register or otherwise released to the public. This procedure is longstanding – predating institutional memory; yet it is also entirely unprecedented in the canon of administrative …


Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii Jan 2016

Privacy And Accountability In Black-Box Medicine, Roger Allan Ford, W. Nicholson Price Ii

Michigan Telecommunications & Technology Law Review

Black-box medicine—the use of big data and sophisticated machine-learning techniques for health-care applications—could be the future of personalized medicine. Black-box medicine promises to make it easier to diagnose rare diseases and conditions, identify the most promising treatments, and allocate scarce resources among different patients. But to succeed, it must overcome two separate, but related, problems: patient privacy and algorithmic accountability. Privacy is a problem because researchers need access to huge amounts of patient health information to generate useful medical predictions. And accountability is a problem because black-box algorithms must be verified by outsiders to ensure they are accurate and unbiased, …