Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Patents And Diversity In Innovation, Brian Kahin Jan 2007

Patents And Diversity In Innovation, Brian Kahin

Michigan Telecommunications & Technology Law Review

Over the past quarter-century, the patent system has expanded in scope and significance, claiming a central position in a U.S. economy increasingly based on knowledge and intangible assets. This historic expansion has come at the cost of controversy and, within the past five years, growing public scrutiny from outside the system--from the press, business, Congress, and finally the Supreme Court. However, proposed reforms are marked by deepening divisions between sectors of the economy. The information technology (IT) and services industries favor strong reforms while pharmaceutical and biotech industries, as well as the patent bar, favor modest, incremental reforms. This yawning …


Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini Jan 2007

Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini

Michigan Telecommunications & Technology Law Review

As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …


The Myth Of Inherent And Inevitable Industry Differences: Diversity As Artifact In The Quest For Patent Reforms, Robert A. Armitage Jan 2007

The Myth Of Inherent And Inevitable Industry Differences: Diversity As Artifact In The Quest For Patent Reforms, Robert A. Armitage

Michigan Telecommunications & Technology Law Review

The University of Michigan Law School hosted a two-day conference entitled "Patents and Diversity in Innovation." The morning of the first day featured a panel devoted to "industry differences." This panel took up the task of dealing with the following questions: How has diversification of innovation and the expansion of patentable subject matter affected patent practice? How do markets for technology vary from sector to sector? And how do they reflect or influence patent practice? To what extent are business practices and competitive markets shaped by the nature of the technology, product, or service?[...] A conference titled "Patents and Diversity" …


A Method For Reforming The Patent System, Peter S. Menell Jan 2007

A Method For Reforming The Patent System, Peter S. Menell

Michigan Telecommunications & Technology Law Review

The principal recent studies of patent reform (NAS (2004), FTC (2003), Jaffe and Lerner (2004)) contend that a uniform system of patent protection must (or should) be available for "anything under the sun made by man" based upon one or more of the following premises: (1) the Patent Act requires this breadth and uniformity of treatment; (2) "discriminating" against any particular field of "technology" would be undesirable; (3) discrimination among technologies would present insurmountable boundary problems and could easily be circumvented through clever patent drafting; and (4) interest group politics stand in the way of excluding any subject matter classes …


What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George Jan 2007

What Is Hiding In The Bushes - Ebay's Effect On Holdout Behavior In Patent Thickets, Gavin D. George

Michigan Telecommunications & Technology Law Review

Importantly, at least a few relevant patent holders are inevitably left out of an industry organization's collection of patents. These left-out patent holders, known as "holdouts," can undermine the collective arrangement with demand letters and infringement suits.[...] The first part of this Note explains why holdouts exist in the first place, given the benefits of joining an organization of collected patents. In the second part of this Note, I explore the lack of legal protections against holdout demands offered by pre-eBay patent law. The third part of this Note introduces the eBay decision as revolutionary addition to list of legal …


Compulsory Patent Licensing: Is It A Viable Solution In The United States, Carol M. Nielsen, Michael R. Samardzija Jan 2007

Compulsory Patent Licensing: Is It A Viable Solution In The United States, Carol M. Nielsen, Michael R. Samardzija

Michigan Telecommunications & Technology Law Review

As technology continues to advance at a rapid pace, so do the number of patents that cover every aspect of making, using, and selling these innovations. In 1996, to compound the rapid change of technology, the U.S. Supreme Court affirmed that business methods are also patentable. Hence in the current environment, scores of patents, assigned to many different parties, may cover a single electronic device or software--making it increasingly impossible to manufacture an electronic device without receiving a cease and desist letter or other notice from a patentee demanding a large royalty or threatening an injunction. Companies, particularly those in …


Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins Jan 2007

Biometrics: Weighing Convenience And National Security Against Your Privacy, Lauren D. Adkins

Michigan Telecommunications & Technology Law Review

The biometric identifier relies on an individual's unique biological information such as a hand, iris, fingerprint, facial or voice print. When used for verification purposes, a "one-to-one" match is generated in under one second. Biometric technology can substantially improve national security by identifying and verifying individuals in a number of different contexts, providing security in ways that exceed current identification technology and limiting access to areas where security breaches are especially high, such as airport tarmacs and critical infrastructure facilities. At the same time, a legitimate public concern exists concerning the misuse of biometric technology to invade or violate personal …