Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

An Orphan Works Affirmative Defense To Copyright Infringement Actions, Jerry Brito, Bridget Dooling Sep 2005

An Orphan Works Affirmative Defense To Copyright Infringement Actions, Jerry Brito, Bridget Dooling

Michigan Telecommunications & Technology Law Review

Laurence Peter once said that "[o]riginality is the fine art of remembering what you hear but forgetting where you heard it." Yet that clever quip is itself unoriginal. Although there may be nothing new under the sun--the arrangement of different bits of existing cultural matter in new and interesting combinations is the source of much originality. Yet today much of our cultural raw material is outside the reach of creators because of the orphan works problem. This problem renders untouchable a large swath of existing artistic, literary, and other works because if a work's copyright owner cannot be found to …


A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori Sep 2005

A Shadow Government: Private Regulation, Free Speech, And Lessons From The Sinclair Blogstorm, Marvin Ammori

Michigan Telecommunications & Technology Law Review

Because of the economics of online information, thousands who do not know each other can band together in hours, without previous organizational coordination or any persistent central coordination, to affect others and conform society to their idea of the social good. This changes the dynamic of political action and the ability of unaffiliated, lone individuals to respond to social acts where government and the market have not. Through ad hoc volunteerism, the Sinclair participants produced regulatory action against a private party with whom they were not transacting--because they believed government failed to do so. Although ad hoc volunteerism has received …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


To Surf And Protect: The Children's Internet Protection Act Policies Material Harmful To Minors And A Whole Lot More, Michael B. Cassidy Apr 2005

To Surf And Protect: The Children's Internet Protection Act Policies Material Harmful To Minors And A Whole Lot More, Michael B. Cassidy

Michigan Telecommunications & Technology Law Review

This Note will examine the constitutional issues raised by installing Internet filtering software in public libraries. Part I explores the First Amendment, the standard of review for restricting Internet material, and the government's role in protecting minors and regulating speech. Part II discusses library patrons' First Amendment rights in public libraries. Part III provides the statutory framework of the E-rate and LSTA programs, as well as the Children's Internet Protection Act (CIPA). Part IV examines the effectiveness of current Internet filtering technology and provides the American Library Association's policies on Internet filtering in public libraries. Part V discusses the district …


Supporting Innovation In Targeted Treatments: Licenses Of Right To Nih-Funded Research Tools, Tanuja V. Garde Apr 2005

Supporting Innovation In Targeted Treatments: Licenses Of Right To Nih-Funded Research Tools, Tanuja V. Garde

Michigan Telecommunications & Technology Law Review

Support for new drug development has taken some interesting turns in current patent law jurisprudence. Beginning with the severe curtailment of scope of the common law experimental use doctrine in Madey v. Duke University, and culminating with the recent Supreme Court decision in Merck KGaA v. Integra Lifesciences I, Ltd., broadening the scope of the statutory research exemption, the freedom to conduct experimental research using another's patented inventions becomes dependent in part on the purpose of the research. That the patent at issue in Merck was characterized by the Federal Circuit as being directed to a research tool raised the …


Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly Apr 2005

Not All Bad: An Historical Perspective On Software Patents, Martin Campbell-Kelly

Michigan Telecommunications & Technology Law Review

This Paper places the current debates about software patents in the historical context of patenting in the information technology industries. The first computer-program products were sold in the mid 1960s when software patents were not generally allowed; as a result, trade secrecy became endemic to the software industry. Software products were also protected by copyright, but in practice this offered little protection against most forms of appropriation by reverse engineering or cloning. By the early 1980s a series of landmark cases led to the acceptance of software patents. It is argued that this development was consistent with the patenting of …


Technology Wars: The Failure Of Democratic Discourse, Gregory N. Mandel Apr 2005

Technology Wars: The Failure Of Democratic Discourse, Gregory N. Mandel

Michigan Telecommunications & Technology Law Review

Conflicts over the use and regulation of various technologies pervade public discourse and have dramatic implications for the public interest. Controversies over the regulation of genetically modified products, nuclear power, and nanotechnology, among others, provoke some of the most socially and politically volatile debates of our time. These technology conflicts extract a substantial price from society--they create costly inefficiencies, prevent society from optimally managing new technologies, consume vast resources, and retard technological growth. This Article develops a framework for understanding technology controversies, and consequently proposes new means for resolving or ameliorating a variety of seemingly intractable legal and regulatory standoffs. …


God In The Machine: A New Structural Analysis Of Copyright's Fair Use Doctrine, Matthew Sag Apr 2005

God In The Machine: A New Structural Analysis Of Copyright's Fair Use Doctrine, Matthew Sag

Michigan Telecommunications & Technology Law Review

Recognition of the structural role of fair use has the potential to mitigate some of the uncertainty of current fair use jurisprudence. The statutory framework for fair use both mitigates and causes uncertainty. It mitigates uncertainty by providing a consistent framework of analysis the four statutory factors. However, when judges apply the statutory factors without articulating or justifying their own assumptions, they increase uncertainty. The statutory factors mean nothing without certain a priori assumptions as to the scope of the copyright owner's rights. A more stable and predictable fair use jurisprudence would begin to emerge if those assumptions were made …


Market For Private Dispute Resolution Services - An Empirical Re-Assessment Of Icann-Udrp Performance, The, Jay P. Kesan, Andres A. Gallo Apr 2005

Market For Private Dispute Resolution Services - An Empirical Re-Assessment Of Icann-Udrp Performance, The, Jay P. Kesan, Andres A. Gallo

Michigan Telecommunications & Technology Law Review

We present a thorough analysis of one of the ADR regimes that is considered a significant success in Internet markets, the Uniform Dispute Resolution Policy (UDRP) implemented by the Internet Corporation for Assigned Names and Numbers (ICANN). In this work, we perform a complete empirical analysis of the UDRP and evaluate its performance. We then extrapolate the results to other sectors of the Internet market and to private dispute resolution in general.[...] In this paper, we thoroughly critique the performance of the UDRP providers and identify the main variables that determine ICANN's efficiency. For example, one of the key variables, …