Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

All Faculty Scholarship

Law

Business

University of Pennsylvania Carey Law School

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Law

Life After Bilski, Mark A. Lemley, Michael Risch, Ted Sichelman, R. Polk Wagner Jan 2011

Life After Bilski, Mark A. Lemley, Michael Risch, Ted Sichelman, R. Polk Wagner

All Faculty Scholarship

In Bilski v. Kappos, the Supreme Court declined calls to categorically exclude business methods—or any technology—from the patent law. It also rejected as the sole test of subject matter eligibility the Federal Circuit’s deeply-flawed machine-or-transformation test, under which no process is patentable unless it is tied to a particular machine or transforms an article to another state or thing. Subsequent developments threaten to undo that holding, however. Relying on the Court’s description of the Federal Circuit test as a “useful and important clue,” the U.S. Patent and Trademark Office, patent litigants, and district courts have all continued to rely on …


Embracing Risk, Sharing Responsibility, Tom Baker Jan 2008

Embracing Risk, Sharing Responsibility, Tom Baker

All Faculty Scholarship

No abstract provided.


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …