Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Acta And The Specter Of Graduated Response, Annemarie Bridy Sep 2010

Acta And The Specter Of Graduated Response, Annemarie Bridy

Joint PIJIP/TLS Research Paper Series

This short paper, prepared for a workshop on the Anti-Counterfeiting Trade Agreement (ACTA) and the Public Interest at American University’s Washington College of Law, considers the draft Internet provisions of ACTA in the context of concerns raised in the media that the treaty will require signatories to mandate graduated response regimes (à la France’s controversial HADOPI system) for online copyright enforcement. Although the Consolidated Text of ACTA, released in late April, confirms that mandatory graduated response is off the table for the treaty’s negotiators, the treaty in its current form both accommodates and promotes the adoption of graduated response. Moreover, …


Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow Apr 2010

Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow

Faculty Publications

Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Ramifications Of Joint Infringement Theory On Emerging Technology Patents, W. Keith Robinson Jan 2010

Ramifications Of Joint Infringement Theory On Emerging Technology Patents, W. Keith Robinson

Faculty Journal Articles and Book Chapters

Two cases decided by the U.S. Court of Appeals for the Federal Circuit articulate the standards for joint infringement. In BMC Resources, Inc. v. Paymentech, L.P., the court ruled that to find liability in situations where steps of a method claim are performed by multiple parties, the entire method must be performed at the control or direction of the alleged direct infringer — the mastermind. Approximately one year later, in Muniauction, Inc. v. Thomson Corp., the Federal Circuit clarified that “the control or direction standard is satisfied in situations where the law would traditionally hold the accused direct infringer vicariously …


Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton Jan 2010

Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton

Articles

The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …