Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (4)
- Entertainment, Arts, and Sports Law (3)
- Internet Law (3)
- Privacy Law (3)
- Computer Law (2)
-
- Fourth Amendment (2)
- International Law (2)
- Legislation (2)
- Commercial Law (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Evidence (1)
- International Humanitarian Law (1)
- Jurisprudence (1)
- Legal Remedies (1)
- Legal Writing and Research (1)
- National Security Law (1)
- Science and Technology Law (1)
- State and Local Government Law (1)
- Institution
Articles 1 - 12 of 12
Full-Text Articles in Law
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
Technology Law, J. Douglas Cuthbertson, Glen L. Gross
University of Richmond Law Review
No abstract provided.
Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba
Quibbles'n Bits: Making A Digital First Sale Doctrine Feasible, Victor F. Calaba
Michigan Telecommunications & Technology Law Review
Whereas the first sale doctrine historically permitted the transfer and resale of copyrighted works, license agreements used by software companies and the DMCA's strict rules prohibiting tampering with access control devices frustrate exercise of the first sale doctrine with respect to many forms of digital works[...] This article explores the first sale doctrine as it pertains to digital works and proposes ways to make a digital first sale doctrine feasible. Part II describes the first sale doctrine as it has traditionally been applied to non-digital works. Part III discusses modern technology's impact on the distribution and use of copyrighted material. …
Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian
Researching Remedies In Intellectual Property Actions Involving Computer Technology: A Research Guide, Daniel N. Kassabian
Michigan Telecommunications & Technology Law Review
The purpose of this research guide is not to answer the question "What remedies are available to an owner of computer related technology whose rights have been infringed?" but to provide a methodology by which a legal practitioner can find the answer to this question. This guide sets forth materials and methods of research that can be used for an inquiry that is broad in scope, such as researching which legal scheme's remedial component best suits a client's technology, but that are also capable of being used for a narrow or limited inquiry, such as looking for specific remedies available …
Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White
Festo: A Case Contravening The Convergence Of Doctrine Of Equivalents Jurisprudence In Germany, The United Kingdom, And The United States, Katherine E. White
Michigan Telecommunications & Technology Law Review
Despite differences in patent law jurisprudence in Germany, the United Kingdom and the United States, the fundamental principles underlying each system serve the same basic purpose: to encourage technological innovation and dissemination of knowledge. In granting exclusive patent rights, it is important that the scope of patent protection not be so broad as to remove existing knowledge from the public domain. The scope of protection should strike a balance between granting adequate patent rights while preserving the public's ownership in the public domain or the prior art. To encourage innovation patentees must attain significant exclusive rights, while potential infringers receive …
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Michigan Telecommunications & Technology Law Review
"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl
Information Operations, Information Warfare, And Computer Network Attack: Their Relationship To National Security In The Information Age, Daniel T. Kuehl
International Law Studies
No abstract provided.
Full Volume 76: Computer Network Attack And International Law
Full Volume 76: Computer Network Attack And International Law
International Law Studies
No abstract provided.
The "Art" Of Procreation: Why Assisted Reproduction Technology Allows For The Preservation Of Female Prisoners' Right To Procreate, Sarah L. Dunn
The "Art" Of Procreation: Why Assisted Reproduction Technology Allows For The Preservation Of Female Prisoners' Right To Procreate, Sarah L. Dunn
Fordham Law Review
No abstract provided.
Online Standardization And The Integration Of Text And Machine, Margaret Jane Radin
Online Standardization And The Integration Of Text And Machine, Margaret Jane Radin
Fordham Law Review
No abstract provided.
The Modern Athlete: Natural Athletic Ability Or Technology At Its Best, Erin E. Floyd
The Modern Athlete: Natural Athletic Ability Or Technology At Its Best, Erin E. Floyd
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
Marketing, Protection And Enforcement Of Ncaa Marks, Scott A. Bearby
Marketing, Protection And Enforcement Of Ncaa Marks, Scott A. Bearby
Marquette Sports Law Review
No abstract provided.