Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (46)
- Pepperdine University (19)
- University of Michigan Law School (18)
- Case Western Reserve University School of Law (14)
- Schulich School of Law, Dalhousie University (11)
-
- UC Law SF (10)
- Maurer School of Law: Indiana University (6)
- Santa Clara Law (6)
- Duke Law (3)
- Southern Methodist University (3)
- Vanderbilt University Law School (3)
- University of Maryland Francis King Carey School of Law (2)
- Chicago-Kent College of Law (1)
- Fordham Law School (1)
- Pace University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Missouri-Kansas City School of Law (1)
- University of San Diego (1)
- Keyword
-
- Technology (10)
- Internet (5)
- Law reform (5)
- Patent law (5)
- Police (5)
-
- Information (4)
- Privacy (4)
- Searches (4)
- Genetics (3)
- Intellectual property (3)
- Law (3)
- Legal (3)
- Medicine (3)
- Patent (3)
- Patents (3)
- Patents & Technology (3)
- Regulation (3)
- Science (3)
- Surveillance (3)
- United States Supreme Court (3)
- Biotechnology (2)
- Book reviews (2)
- Children (2)
- Cloning (2)
- Copyright (2)
- DNA (2)
- Discrimination (2)
- Disease (2)
- Employers (2)
- Evidence (2)
- Publication
-
- UIC Review of Intellectual Property Law (24)
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Journal of Law, Technology, & the Internet (14)
- Canadian Journal of Law and Technology (11)
- Pepperdine Law Review (11)
-
- UC Law Science and Technology Journal (10)
- Santa Clara High Technology Law Journal (6)
- The Journal of Business, Entrepreneurship & the Law (6)
- University of Michigan Journal of Law Reform Caveat (6)
- IP Theory (5)
- Michigan Telecommunications & Technology Law Review (4)
- Duke Law & Technology Review (3)
- Michigan Law Review (3)
- SMU Science and Technology Law Review (3)
- UIC Law Review (3)
- Journal of Health Care Law and Policy (2)
- Michigan Journal of Environmental & Administrative Law (2)
- Pepperdine Dispute Resolution Law Journal (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Chicago-Kent Law Review (1)
- Fordham Urban Law Journal (1)
- Indiana Journal of Global Legal Studies (1)
- Michigan Business & Entrepreneurial Law Review (1)
- Michigan Journal of Gender & Law (1)
- Pace Law Review (1)
- San Diego International Law Journal (1)
- Touro Law Review (1)
- UMKC Law Review (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Michigan Journal of Law Reform (1)
Articles 91 - 120 of 148
Full-Text Articles in Law
The Public Good V. A Monetary Profit: The News Organizations’ Utilization Of The Fair Use Doctrine, 11 J. Marshall Rev. Intell. Prop. L. 841 (2012), Frank J. Lukes
UIC Review of Intellectual Property Law
The main purpose of copyright law is to promote the arts and sciences for the public good. The secondary purpose of copyright law is to ensure the copyright holder retains a benefit for their work. Additionally, the Fair Use Doctrine allows a defense to an individual who uses the copyrighted work without permission, so long as a four-factor test under the Doctrine is properly met. The four factors this test analyzes are the Purpose Factor, The Nature of the Work Factor, The Amount Used Factor, and The Effect on the Market Factor. When news organizations have sought protection under the …
For Sale. Patents. Never Used: Gaps In The Tax Code For Patent Sales, 11 J. Marshall Rev. Intell. Prop. L. 859 (2012), Khurram Naik
For Sale. Patents. Never Used: Gaps In The Tax Code For Patent Sales, 11 J. Marshall Rev. Intell. Prop. L. 859 (2012), Khurram Naik
UIC Review of Intellectual Property Law
Patent sales are an underappreciated means of monetizing patents. Recent blockbuster patent sales indicate heightened demand for patent acquisitions. There is evidence that such patent sales transfer patents to parties more skilled in patent enforcement, reducing litigation. Patent sales also move capital to innovators, which enhance incentives to innovate. But crucially, C corporations do not benefit from advantaged tax treatment. Efforts by other nations to encourage patent use and sales by providing “patent box” preferential tax regimes may provide some guidance for remedying this gap in the tax code.
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
Back To The Future: Revisiting Zippo In Light Of "Modern Concerns", 29 J. Marshall J. Computer & Info. L. 231 (2012), David Swetnam-Burland, Stacy O. Stitham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
"Tinkering" With The First Amendment's Protection Of Student Speech On The Internet, 29 J. Marshall J. Computer & Info. L. 167 (2012), Steven M. Puiszis
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
World Wide Web Of Love, Lies, And Legislation: Why Online Dating Websites Should Screen Members, 29 J. Marshall J. Computer & Info. L. 251 (2012), Maureen Horcher
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
Session I: The Legacy Of Justice Arthur Goldberg, 29 J. Marshall J. Computer & Info. L. 285 (2012), Samuel R. Olken, Gerald Berendt, Gilbert A. Cornfield, Gilbert Feldman, David Stebenne, Milton I. Shadur
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
Dedication Of The Arthur J. Goldberg Memorial Courtroom, 29 J. Marshall J. Computer & Info. L. 405 (2012), Hon. Antonin Scalia
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Giving Credit Where Credit Is Due: A Comment On The Theoretical Foundation And Historical Origin Of The Tort Remedy For Invasion Of Privacy, 29 J. Marshall J. Computer & Info. L. 493 (2012), Alberto Bernabe
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill
Session Iii: Privacy Regulation And Policy Perspectives, 29 J. Marshall J. Computer & Info. L. 343 (2012), Leslie Ann Reis, Mary Ellen Callahan, Renard Francois, Peter P. Swire, C. William O'Neill
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon
What's Mine Is Yours: Targeting Privacy Issues And Determining The Best Solutions For Behavioral Advertising, 29 J. Marshall J. Computer & Info. L. 637 (2012), Sarah Cathryn Brandon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore
Drug Testing And Privacy In The Workplace, 29 J. Marshall J. Computer & Info. L. 463 (2012), Adam D. Moore
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni
A Liberal Communitarian Conception Of Privacy, 29 J. Marshall J. Computer & Info. L. 419 (2012), Amitai Etzioni
UIC John Marshall Journal of Information Technology & Privacy Law
In a large and complex society, anti-social behavior cannot be restrained by government intervention alone—without it becoming a police state. Informal social controls are necessary to keep deviance from societal norms and values at a socially acceptable level, and one of the levers of this social pressure is the observation of and reaction to the personal conduct of members of one’s community.
This article argues that in several areas of contemporary American life decreasing privacy by strengthening informal social controls will lessen the need for state surveillance and regulation, which tends to be act with a heavier hand and is …
Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.
Turning Points In Telecommunications History, 29 J. Marshall J. Computer & Info. L. 513 (2012), Paul J. Larkin, Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Curious Case Of Convenience Casinos: How Internet Sweepstakes Cafes Survive In A Gray Area Between Unlawful Gambling And Legitimate Business Promotions, 29 J. Marshall J. Computer & Info. L. 594 (2012), Steve Silver
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 29 J. Marshall J. Computer & Info. L. 701 (2012), Kyle Fonville, Grace Hwang, Nivesh Oudit
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg
Right To Information Identity, 29 J. Marshall J. Computer & Info. L. 539 (2012), Elad Oreg
UIC John Marshall Journal of Information Technology & Privacy Law
Inspired by the famous Warren and Brandeis conceptualization of the “right to privacy,” this article tries to answer a modern, conceptual lacuna and presents the argument for the need to conceptualize and recognize a new, independent legal principle of a “right to information identity.” This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways …
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 29 J. Marshall J. Computer & Info. L. 673 (2012), Russell Bottom, Greer Herman, Catherine Nance, Robin Ann Sowizrol, Gina Spada
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin
The Thirty-First Annual John Marshall Law School International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 29 J. Marshall J. Computer & Info. L. 733 (2012), Christopher Dabney, Kara Franklin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund
The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund
IP Theory
No abstract provided.
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair
IP Theory
No abstract provided.
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
The Latest 4th Amendment Privacy Conundrum: "Stingrays", Max Bulinksi
University of Michigan Journal of Law Reform Caveat
Wired is reporting renewed hubbub regarding statutory and Fourth Amendment protections of individuals’ privacy in the digital age. This time, it comes in the form of federal officers using a fake cellphone tower (called a “stingray”) to locate their suspect, Mr. Rigmaiden, by tracking the location of his cellphone. According to an affidavit submitted to the court, the stingray only captures the equivalent of header information – such as the phone or account number assigned to the aircard as well as dialing, routing and address information involved in the communication.
Signal Lost: Is A Gps Tracking System The Same As An Eyeball?, Eric Andrew Felleman
Signal Lost: Is A Gps Tracking System The Same As An Eyeball?, Eric Andrew Felleman
University of Michigan Journal of Law Reform Caveat
On November 8th, the Supreme Court will hear arguments in United States v. Jones. One of the primary issues in the case is whether law enforcement personnel violated Mr. Jones' Fourth Amendment right to freedom from unreasonable searches and seizures by using a GPS tracking device to monitor the location of his car without a warrant. The 7th Circuit and the 9th Circuit have both recently held that use of GPS tracking is not a search under the Fourth Amendment.
United States V. Jones: Reviving The Property Foundation Of The Fourth Amendment, Herbert W. Titus, William J. Olson
United States V. Jones: Reviving The Property Foundation Of The Fourth Amendment, Herbert W. Titus, William J. Olson
Journal of Law, Technology, & the Internet
No abstract provided.
"Hostile Learning Environment:" Developing Student Speech Regulation By Applying The Hostile Work Environment Analysis To Cyberbullying, Carla Diblasio
"Hostile Learning Environment:" Developing Student Speech Regulation By Applying The Hostile Work Environment Analysis To Cyberbullying, Carla Diblasio
Journal of Law, Technology, & the Internet
No abstract provided.
Antitrust And Patent License Agreements: A New Look At The Grantback Clause In High Technology Markets, John M. Murray
Antitrust And Patent License Agreements: A New Look At The Grantback Clause In High Technology Markets, John M. Murray
Journal of Law, Technology, & the Internet
No abstract provided.
Is Wikileaks A Hit Man Handbook: Why Wikileaks Cannot Claim First Amendment Immunity If The Afghan And Iraq War Logs Cause Physical Harm, Rachel Wolbers
Is Wikileaks A Hit Man Handbook: Why Wikileaks Cannot Claim First Amendment Immunity If The Afghan And Iraq War Logs Cause Physical Harm, Rachel Wolbers
Journal of Law, Technology, & the Internet
No abstract provided.
More Money, More Problems: The Bitcoin Virtual Currency And The Legal Problems That Face It, Daniel Smith
More Money, More Problems: The Bitcoin Virtual Currency And The Legal Problems That Face It, Daniel Smith
Journal of Law, Technology, & the Internet
No abstract provided.