Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Law

Comments On Paul R. Michel's Contributions To Justice, 10 J. Marshall Rev. Intell. Prop. L. 279 (2011), James F. Holderman Jan 2011

Comments On Paul R. Michel's Contributions To Justice, 10 J. Marshall Rev. Intell. Prop. L. 279 (2011), James F. Holderman

UIC Review of Intellectual Property Law

No abstract provided.


Chief Judge Michel's Current And Future Contributions To Improving U.S. Intellectual Property Rights, 10 J. Marshall Rev. Intell. Prop. L. 299 (2011), Herbert C. Wamsley Jan 2011

Chief Judge Michel's Current And Future Contributions To Improving U.S. Intellectual Property Rights, 10 J. Marshall Rev. Intell. Prop. L. 299 (2011), Herbert C. Wamsley

UIC Review of Intellectual Property Law

No abstract provided.


Inconsistency Should Not Be Materiality: The Flaws In 37 C.F.R. § 1.56(B)(2), 10 J. Marshall Rev. Intell. Prop. L. 491 (2011), Lawrence Pope Jan 2011

Inconsistency Should Not Be Materiality: The Flaws In 37 C.F.R. § 1.56(B)(2), 10 J. Marshall Rev. Intell. Prop. L. 491 (2011), Lawrence Pope

UIC Review of Intellectual Property Law

The doctrine of inequitable conduct is in need of clarification. The Court of Appeals for the Federal Circuit has recently granted en banc review in Therasense, Inc. v. Becton, Dickinson, & Co. to determine the appropriate standards for each prong of inequitable conduct doctrine: materiality and intent. While the parties and the amici have almost unanimously proposed that the standard of materiality should be less inclusive than “what a reasonable examiner would want to know in deciding upon patentability,” there is much debate regarding how the standard for materiality should be articulated. One proposal is that the courts should look …


You Don’T Own Me: Why Work For Hire Should Not Be Applied To Sound Recordings, 10 J. Marshall Rev. Intell. Prop. L. 695 (2011), William Henslee, Elizabeth Henslee Jan 2011

You Don’T Own Me: Why Work For Hire Should Not Be Applied To Sound Recordings, 10 J. Marshall Rev. Intell. Prop. L. 695 (2011), William Henslee, Elizabeth Henslee

UIC Review of Intellectual Property Law

Many recording artists and songwriters never reap the rewards of their work. America’s first professional songwriter died in poverty at the age of thirty-seven. At the Congressional level the situation has described recording artists as “one group of creators who get ripped off more than anybody else in any other industry”. As we approach 2013, there will be a new line of cases that deal with authors of sound recordings attempting to terminate their copyright assignment to the record companies. While the most efficient and frugal solution would be legislative action, the most probable outcome is expensive, fact-intensive litigation. Congress …


Honey Get My Gun, The Transgenic Seeds Are In The Field Again, 11 J. Marshall Rev. Intell. Prop. L. 439 (2011), Christian B. Miller Jan 2011

Honey Get My Gun, The Transgenic Seeds Are In The Field Again, 11 J. Marshall Rev. Intell. Prop. L. 439 (2011), Christian B. Miller

UIC Review of Intellectual Property Law

The proliferation of genetically modified (“GM”) crops in the United States has dramatically increased in the past two decades. This increase has led to fears of dwindling biodiversity in this country’s staple crops. Consumer health and environmental advocates have attempted to slow the deregulation of such crops through administrative challenges. Such tactics were largely undermined in the 2010 Supreme Court case of Monsanto Co. v. Geertson. Anti-GM groups have subsequently attempted to invalidate patents for GM crops on moral grounds. This comment explores the futility of administrative and moral challenges to GM crop proliferation, and looks ahead to the proper …


Patent Law In The Antitrust Scope: Between Social Advancement And Competition Impingement, 11 J. Marshall Rev. Intell. Prop. L. 367 (2011), Yaniv Gal Jan 2011

Patent Law In The Antitrust Scope: Between Social Advancement And Competition Impingement, 11 J. Marshall Rev. Intell. Prop. L. 367 (2011), Yaniv Gal

UIC Review of Intellectual Property Law

In the past couple of decades, many scholars have debated the worthiness of the limited monopoly that patent law provides. The widespread attitude has always been, since the progress of the technological era, that in order to stimulate inventors and possessors of knowledge to embody their knowledge by innovative products, and produce ameliorations into society, they should be given strong proprietary rights over their innovative information and ideas. With the rise of the economic analysis of law, dissident opinions have been starting to emerge, evoking the social damage absorbed due to the current patent system monopoly character in form of …


The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price Jan 2011

The Board's Responsibility For Information Technology Governance, 28 J. Marshall J. Computer & Info. L. 313 (2011), Lawrence J. Trautman, Kara Altenbaumer-Price

UIC John Marshall Journal of Information Technology & Privacy Law

With accusations that boards of directors of financial institutions were asleep at the wheel while their companies engaged in risky behavior that erased millions of dollars of shareholder value and plunged the country into recession, increasing pressure is now being placed on public company boards to shoulder the burden of risk oversight for the companies they serve. This article provides an overview of some of the main considerations relative to every director’s duty to govern IT risk. In particular, this comment will address directors’ roles in the risk oversight of the corporations they serve, their role in governance of IT, …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti Jan 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, 28 J. Marshall Computer & Info. L. 523 (2011), Moonho Song, Carrie Leonetti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson Jan 2011

My Teacher Sux! [Censored]: Protecting Students' Right To Free Speech On The Internet, 28 J. Marshall J. Computer & Info. L. 385 (2011), Katherine Hokenson

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will discusses the problem posed by student speech made on the Internet, how free speech issues are generally addressed by courts, the Supreme Court cases that have specifically addressed the First Amendment rights of students, and factors that courts dealing with student speech made on the Internet have attempted to use in their decisions. The comment will further look at how courts have analyzed online student speech cases in light of available Supreme Court precedent, and will propose that the Court adopt a hybrid of the Tinker test when addressing student speech made on the Internet, which will …


Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch Jan 2011

Schools: Where Fewer Rights Are Reasonable? Why The Reasonableness Standard Is Inappropriate To Measure The Use Of Rfid Tracking Devices On Students, 28 J. Marshall J. Computer & Info. L. 411 (2011), Alexandra C. Hirsch

UIC John Marshall Journal of Information Technology & Privacy Law

In an unsuccessful attempt to heighten security, schools are implementing a technology that offers access to children’s personal information and minute-by-minute location. Although not entirely new, Radio Frequency Identification (RFID) technology use has recently been expanding within the school arena. Skeptics knowledgeable about the downfalls of the technology, however, have reason to be concerned. In order to understand the true urgency of this issue, this comment will explain the background of RFID technology, specifically what RFID tags are, how they are used, their purposes, and how they have become unsafe. Included will be an explanation of the reasons that schools …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola Jan 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, 28 J. Marshall J. Computer & Info. L. 451 (2011), Taiwo A. Oriola

UIC John Marshall Journal of Information Technology & Privacy Law

The pertinent questions therefore are: first, could software vulnerabilities be obviated simply by ameliorating factors responsible for market failure as canvassed by the literature on the economics of software security, drawing on the strength of the theory of information asymmetry, or are vulnerabilities inevitable irrespective of market dynamics and solutions? Second, to what extent is vulnerabilities research or the surreptitious exploitation of software vulnerabilities by hackers tantamount to trespass, and what are the legal implications, if any? Third, to what extent is the peddling of software vulnerabilities valid or enforceable in law? Fourth, what are the implications of software vulnerabilities …


The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak Jan 2011

The Need For Better Analysis Of High Capacity Services, 28 J. Marshall J. Computer & Info. L. 343 (2011), George S. Ford, Lawrence J. Spiwak

UIC John Marshall Journal of Information Technology & Privacy Law

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 75 (2011), Russell Bottom, Matthew T. Andris, Robin Ann Sowizrol

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 139 (2011), Elena Jacob, Steven Osit, Darya Zuravicky

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert Jan 2011

The Amended Eu Law On Eprivacy And Electronic Communications After Its 2011 Implentation; New Rules On Data Protection, Spam, Data Breaches And Protection Of Intellectual Property Rights, 29 J. Marshall J. Computer & Info. L. 29 (2011), Vagelis Papakonstantinou, Paul De Hert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid Jan 2011

The Thirtieth Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 103 (2011), Nate Lindsey, Chris Omlid

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Following You Here, There, And Everywhere; An Investigation Of Gps Technology, Privacy, And The Fourth Amendment, 45 J. Marshall L. Rev. 1 (2011), Stephanie G. Forbes Jan 2011

Following You Here, There, And Everywhere; An Investigation Of Gps Technology, Privacy, And The Fourth Amendment, 45 J. Marshall L. Rev. 1 (2011), Stephanie G. Forbes

UIC Law Review

No abstract provided.


Foreword, 10 J. Marshall Rev. Intell. Prop. L. 278 (2011), Meredith Martin Addy Jan 2011

Foreword, 10 J. Marshall Rev. Intell. Prop. L. 278 (2011), Meredith Martin Addy

UIC Review of Intellectual Property Law

No abstract provided.


Paul Michel: A Patriot And A Mentor, 10 J. Marshall Rev. Intell. Prop. L. 282 (2011), Matthew J. Dowd Jan 2011

Paul Michel: A Patriot And A Mentor, 10 J. Marshall Rev. Intell. Prop. L. 282 (2011), Matthew J. Dowd

UIC Review of Intellectual Property Law

No abstract provided.


The Paul Michel You Never Knew, 10 J. Marshall Rev. Intell. Prop. L. 286 (2011), Lindsay Androski Kelly Jan 2011

The Paul Michel You Never Knew, 10 J. Marshall Rev. Intell. Prop. L. 286 (2011), Lindsay Androski Kelly

UIC Review of Intellectual Property Law

No abstract provided.


Clarifying The Doctrine Of Inequitable Conduct, 10 J. Marshall Rev. Intell. Prop. L. 290 (2011), Elizabeth I. Winston Jan 2011

Clarifying The Doctrine Of Inequitable Conduct, 10 J. Marshall Rev. Intell. Prop. L. 290 (2011), Elizabeth I. Winston

UIC Review of Intellectual Property Law

No abstract provided.


In His Own Words: The Career Of Chief Judge Paul Michel, 10 J. Marshall Rev. Intell. Prop. L. 301 (2011), Gene Quinn Jan 2011

In His Own Words: The Career Of Chief Judge Paul Michel, 10 J. Marshall Rev. Intell. Prop. L. 301 (2011), Gene Quinn

UIC Review of Intellectual Property Law

No abstract provided.


Ip Legal Ethics In The Everyday Practice Of Law: An Empirical Perspective On Patent Litigators, 10 J. Marshall Rev. Intell. Prop. L. 309 (2011), William T. Gallagher Jan 2011

Ip Legal Ethics In The Everyday Practice Of Law: An Empirical Perspective On Patent Litigators, 10 J. Marshall Rev. Intell. Prop. L. 309 (2011), William T. Gallagher

UIC Review of Intellectual Property Law

This article presents preliminary findings from a qualitative empirical study of patent litigators. Part of a larger and ongoing project studying intellectual property lawyers in patent, trademark, and copyright enforcement and litigation actions, this article focuses on ethical decision-making by patent litigators in the pretrial discovery process. The article is based on data from in-depth, semi-structured interviews with fifty-five patent litigators and from a detailed case study of the infamous Qualcomm patent sanctions case. The article critically examines how patent litigators perceive of and respond to ethical issues that arise in the discovery process. It also analyzes the structural and …


Ethical Issues In U.S. Trademark Prosecution And Ttab Practice, 10 J. Marshall Rev. Intell. Prop. L. 365 (2011), Linda K. Mcleod, Stephanie H. Bald Jan 2011

Ethical Issues In U.S. Trademark Prosecution And Ttab Practice, 10 J. Marshall Rev. Intell. Prop. L. 365 (2011), Linda K. Mcleod, Stephanie H. Bald

UIC Review of Intellectual Property Law

The conduct of practitioners and agents before the U.S. Patent and Trademark Office (“USPTO” or “Office”) is subject to regulation by the Office under 35 U.S.C. § 2(b)(2)(D). This provision grants the Under Secretary of Commerce for Intellectual Property and the Director of the USPTO the authority to establish regulations to govern the conduct of agents, attorneys, or other representatives before the Office, including establishing disciplinary measures for non-compliance with those regulations. The USPTO regulations governing conduct include the Patent and Trademark Office Code of Professional Responsibility. This article summarizes the key canons and disciplinary rules applicable to trademark practitioners …


International Arbitration Of Patent Disputes, 10 J. Marshall Rev. Intell. Prop. L. 384 (2011), Wei-Hua Wu Jan 2011

International Arbitration Of Patent Disputes, 10 J. Marshall Rev. Intell. Prop. L. 384 (2011), Wei-Hua Wu

UIC Review of Intellectual Property Law

This paper discusses the concept of using international arbitration as a method of resolving patent disputes. First, this paper examines the arbitrability of patent validity disputes from a public policy viewpoint. The question is whether, or to what extent, the subject matter of patent validity disputes may be settled by international commercial arbitration. Second, this paper provides suggestions on strategies for organizational decision-makers to consider whether it is proper to choose arbitration as a more favorable tool when confronted with a patent dispute. Finally, this paper discusses how to choose the seat of arbitral institution and the applicable law.


Acceptable Fraud? How Falsities And Misstatements Can Escape The Scope Of The New Fraud Standard, 10 J. Marshall Rev. Intell. Prop. L. 410 (2011), Jacobi M. Fields Jan 2011

Acceptable Fraud? How Falsities And Misstatements Can Escape The Scope Of The New Fraud Standard, 10 J. Marshall Rev. Intell. Prop. L. 410 (2011), Jacobi M. Fields

UIC Review of Intellectual Property Law

Accuracy is crucial to the trademark registration process. Registrants are required to submit truthful applications to the United States Patent and Trademark Office (“PTO”) or face fraud liability. Pursuant to the Lanham Act, fraud liability is initiated by the submission of “false or fraudulent” statements in a trademark application. This language presents a critical problem for registrants because the terms false and fraudulent are not synonymous, and it is unclear what actually triggers fraud liability. As a result, the requirements for fraud liability and the corresponding standards for fraud have been in fluctuation over the past ten years. In 2009, …


Patent Office As Biosecurity Gatekeeper: Fostering Responsible Science And Building Public Trust In Diy Science, 10 J. Marshall Rev. Intell. Prop. L. 423 (2011), Brian J. Gorman Jan 2011

Patent Office As Biosecurity Gatekeeper: Fostering Responsible Science And Building Public Trust In Diy Science, 10 J. Marshall Rev. Intell. Prop. L. 423 (2011), Brian J. Gorman

UIC Review of Intellectual Property Law

When the fields of intellectual property law and biotechnology intersect, most analysis is driven byeconomic and ethical issues. This article examines these factors, but in relation to the emerging security threat posed by biohackers, or do-it-yourself (“DIY”) scientists, who operate free from oversight and industry norms at the fringes of the biotechnology community. Public health risks are poised to grow as these citizen-scientists race for lucrative discoveries in the new frontier of syntheticbiology. This article proposes that the existing paradigm adjust accordingly to leverage regulatory compliance from the most ambitious biohackers looking to benefit from patent protection. The U.S. government …


Do You Mind My Smoking? Plain Packaging Of Cigarettes Under The Trips Agreement, 10 J. Marshall Rev. Intell. Prop. L. 450 (2011), Alberto Alemanno, Enrico Bonadio Jan 2011

Do You Mind My Smoking? Plain Packaging Of Cigarettes Under The Trips Agreement, 10 J. Marshall Rev. Intell. Prop. L. 450 (2011), Alberto Alemanno, Enrico Bonadio

UIC Review of Intellectual Property Law

Plain packaging, a new tobacco control tool that a growing number of countries are considering, mandates the removal of all attractive and promotional aspects of tobacco product packages. As a result of plain packaging, the only authorized feature remaining on a tobacco package is the use of the brand name, displayed in a standard font, size, colour and location on the package. In opposing this new strategy, the tobacco industry is particularly keen on emphasizing the uselessness of plain packaging in reducing smoking rates and its incompatibility with trade mark provisions of international treaties. In particular, the tobacco industry and …


The Application Of Data Access Policies Designed For Genome-Wide Association Studies To Smaller Scale Databases, 10 J. Marshall Rev. Intell. Prop. L. 476 (2011), Donna M. Gitter Jan 2011

The Application Of Data Access Policies Designed For Genome-Wide Association Studies To Smaller Scale Databases, 10 J. Marshall Rev. Intell. Prop. L. 476 (2011), Donna M. Gitter

UIC Review of Intellectual Property Law

Scientific progress thrives with open discussion of new ideas and supporting data. To this end, researchers traditionally publish their results in scientific papers—papers that contain the new ideas and the underlying data supporting those ideas. With the advent of large-scale and high-throughput data analysis, however, the creation of scientific databases have replaced the traditional model. For such publically-funded, data-intensive projects, funding agencies typically require that all relevant data be made available on a publicly accessible website at the time of the paper’s publication. Against the backdrop of the public accessibility model used in the 1000 Genomes Project, the author recommends …