Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Journal

Science and Technology Law

Institution
Keyword
Publication
File Type

Articles 91 - 120 of 148

Full-Text Articles in Law

The Public Good V. A Monetary Profit: The News Organizations’ Utilization Of The Fair Use Doctrine, 11 J. Marshall Rev. Intell. Prop. L. 841 (2012), Frank J. Lukes Jan 2012

The Public Good V. A Monetary Profit: The News Organizations’ Utilization Of The Fair Use Doctrine, 11 J. Marshall Rev. Intell. Prop. L. 841 (2012), Frank J. Lukes

UIC Review of Intellectual Property Law

The main purpose of copyright law is to promote the arts and sciences for the public good. The secondary purpose of copyright law is to ensure the copyright holder retains a benefit for their work. Additionally, the Fair Use Doctrine allows a defense to an individual who uses the copyrighted work without permission, so long as a four-factor test under the Doctrine is properly met. The four factors this test analyzes are the Purpose Factor, The Nature of the Work Factor, The Amount Used Factor, and The Effect on the Market Factor. When news organizations have sought protection under the …


For Sale. Patents. Never Used: Gaps In The Tax Code For Patent Sales, 11 J. Marshall Rev. Intell. Prop. L. 859 (2012), Khurram Naik Jan 2012

For Sale. Patents. Never Used: Gaps In The Tax Code For Patent Sales, 11 J. Marshall Rev. Intell. Prop. L. 859 (2012), Khurram Naik

UIC Review of Intellectual Property Law

Patent sales are an underappreciated means of monetizing patents. Recent blockbuster patent sales indicate heightened demand for patent acquisitions. There is evidence that such patent sales transfer patents to parties more skilled in patent enforcement, reducing litigation. Patent sales also move capital to innovators, which enhance incentives to innovate. But crucially, C corporations do not benefit from advantaged tax treatment. Efforts by other nations to encourage patent use and sales by providing “patent box” preferential tax regimes may provide some guidance for remedying this gap in the tax code.


Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham Jan 2012

Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis Jan 2012

"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher Jan 2012

World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin Jan 2012

The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur Jan 2012

Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Jan 2012

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia Jan 2012

Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe Jan 2012

Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jan 2012

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill Jan 2012

Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon Jan 2012

What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore Jan 2012

Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni Jan 2012

A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni

UIC John Marshall Journal of Information Technology & Privacy Law

In a large and complex society, anti-social behavior cannot be restrained by government intervention alone—without it becoming a police state. Informal social controls are necessary to keep deviance from societal norms and values at a socially acceptable level, and one of the levers of this social pressure is the observation of and reaction to the personal conduct of members of one’s community.

This article argues that in several areas of contemporary American life decreasing privacy by strengthening informal social controls will lessen the need for state surveillance and regulation, which tends to be act with a heavier hand and is …


Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr. Jan 2012

Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver Jan 2012

The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit Jan 2012

The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg Jan 2012

Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg

UIC John Marshall Journal of Information Technology & Privacy Law

Inspired by the famous Warren and Brandeis conceptualization of the “right to privacy,” this article tries to answer a modern, conceptual lacuna and presents the argument for the need to conceptualize and recognize a new, independent legal principle of a “right to information identity.” This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways …


The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada Jan 2012

The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin Jan 2012

The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund Jan 2012

The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund

IP Theory

No abstract provided.


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.


The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi Jan 2012

The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi

University of Michigan Journal of Law Reform Caveat

Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.


Signal Lost: Is A Gps Tracking System The Same As An Eyeball?, Eric Andrew Felleman Jan 2012

Signal Lost: Is A Gps Tracking System The Same As An Eyeball?, Eric Andrew Felleman

University of Michigan Journal of Law Reform Caveat

On November 8th, the Supreme Court will hear arguments in United States v. Jones. One of the primary issues in the case is whether law enforcement personnel violated Mr. Jones' Fourth Amendment right to freedom from unreasonable searches and seizures by using a GPS tracking device to monitor the location of his car without a warrant. The 7th Circuit and the 9th Circuit have both recently held that use of GPS tracking is not a search under the Fourth Amendment.


United States V. Jones: Reviving The Property Foundation Of The Fourth Amendment, Herbert W. Titus, William J. Olson Jan 2012

United States V. Jones: Reviving The Property Foundation Of The Fourth Amendment, Herbert W. Titus, William J. Olson

Journal of Law, Technology, & the Internet

No abstract provided.


"Hostile Learning Environment:" Developing Student Speech Regulation By Applying The Hostile Work Environment Analysis To Cyberbullying, Carla Diblasio Jan 2012

"Hostile Learning Environment:" Developing Student Speech Regulation By Applying The Hostile Work Environment Analysis To Cyberbullying, Carla Diblasio

Journal of Law, Technology, & the Internet

No abstract provided.


Antitrust And Patent License Agreements: A New Look At The Grantback Clause In High Technology Markets, John M. Murray Jan 2012

Antitrust And Patent License Agreements: A New Look At The Grantback Clause In High Technology Markets, John M. Murray

Journal of Law, Technology, & the Internet

No abstract provided.


Is Wikileaks A Hit Man Handbook: Why Wikileaks Cannot Claim First Amendment Immunity If The Afghan And Iraq War Logs Cause Physical Harm, Rachel Wolbers Jan 2012

Is Wikileaks A Hit Man Handbook: Why Wikileaks Cannot Claim First Amendment Immunity If The Afghan And Iraq War Logs Cause Physical Harm, Rachel Wolbers

Journal of Law, Technology, & the Internet

No abstract provided.


More Money, More Problems: The Bitcoin Virtual Currency And The Legal Problems That Face It, Daniel Smith Jan 2012

More Money, More Problems: The Bitcoin Virtual Currency And The Legal Problems That Face It, Daniel Smith

Journal of Law, Technology, & the Internet

No abstract provided.