Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Toward A Patent Exhaustion Regime For Sustainable Development, 32 Berkeley J. Int'l Law. 330 (2014), Benjamin Liu Dec 2014

Toward A Patent Exhaustion Regime For Sustainable Development, 32 Berkeley J. Int'l Law. 330 (2014), Benjamin Liu

UIC Law Open Access Faculty Scholarship

This Article argues that the current exhaustion doctrine, when applied to the refurbishing industry, fails to balance its mandate of promoting technological progress with the broader program of sustainable development and is therefore unsuitable for countries on the modernization path. First, what constitutes an infringing “making” remains underdetermined. Second, the evidentiary hurdle for proving legal refurbishment is too onerous for the low margin and under-resourced refurbishing industry. Finally, the all-or-nothing approach to judging infringement fails to account for the nuanced cost-benefit nexus that exists between patentees, refurbishers, and society at large and discourages private ordering. To recalibrate the balance between …


Remade In China: What Does Recycling Tell Us About The Chinese Patent System?, 82 Umkc L. Rev. 887 (2014), Benjamin Liu Jan 2014

Remade In China: What Does Recycling Tell Us About The Chinese Patent System?, 82 Umkc L. Rev. 887 (2014), Benjamin Liu

UIC Law Open Access Faculty Scholarship

What can we expect of China's patent law during the tenure of President Xi Jinping? This article proffers a partial answer to this broad question through the close reading of patent allegations against Chinese refurbishers and recyclers. Although the doctrinal issues presented are specific, these disputes occupy a policy space where competing goals of development tear a slit in the glossy exterior of the “Chinese Dream” meme that comes to represent Xi's administration, a slit through which we may gain some insight into the direction of IP development in China.

In the process of domesticating a legal regime originated from …


3(D) View Of India’S Patent Law: Social Justice Aspiration Meets Property Rights In Novartis V. Union Of India & Others, 13 J. Marshall Rev. Intell. Prop. L. 719 (2014), Saby Ghoshray Jan 2014

3(D) View Of India’S Patent Law: Social Justice Aspiration Meets Property Rights In Novartis V. Union Of India & Others, 13 J. Marshall Rev. Intell. Prop. L. 719 (2014), Saby Ghoshray

UIC Review of Intellectual Property Law

Not many constitutional decisions from developing countries find themselves at the center of global debate like the Indian Supreme Court’s Novartis decision invalidating the Gleevec patent. The patent was invalidated under amended Section 3(d) of the Indian Patents Act, which was amended to address some of the concerns of imbalance between the maximalist and minimalist cultures in the pharmaceutical context. Section 3(d) of the Indian Patent Act introduced a new threshold of patent eligibility for pharmaceutical innovation that requires applicants to demonstrate enhanced efficacy of their products. The objective of this Article is to get beyond the reactionary reviews of …


Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale Jan 2014

Control Over Personal Data, Privacy And Administrative Discretion In Europe And The Usa: The Paradox Of Italian “Data Protection Authority”, 30 J. Marshall J. Info. Tech. & Privacy L. 721 (2014), Marco Quiroz Vitale

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller Jan 2014

The Policing Of Religious Marriage Prohibitions In Israel: Religion, State, And Information Technology, 31 J. Marshall J. Info. Tech. & Privacy L. 23 (2014), Akiva Miller

UIC John Marshall Journal of Information Technology & Privacy Law

The State of Israel applies religious law in all matters of marriage and divorce. For the Jewish population of Israel, the law of marriage includes religious prohibitions on certain kinds of marriages, most notably the prohibition against intermarriage and the prohibition against marrying a mamzer. Over the years, Israel‘s state-religious authorities have adopted a variety of methods and practices for policing these prohibitions. These include stringent procedures for premarital registration inquiries; use of databases for collecting information on prohibited persons; recording the possibility of mamzer status of newborn children; special Beit Din proceedings for handling cases of possible marriage prohibitions; …


Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato Jan 2014

Canada’S Anti-Spam Legislation: A Constitutional Analysis, 31 J. Marshall J. Info. Tech. & Privacy L. 1 (2014), Emir Crowne, Stephanie Provato

UIC John Marshall Journal of Information Technology & Privacy Law

On December 15th, 2010, the Government of Canada agreed to Bill C-28, the Fighting Internet and Wireless Spam Act, with the intent to “deter the most damaging and deceptive forms of spam… from occurring in Canada and to help to drive out spammers.” Canada‟s Anti- Spam Legislation (“CASL”) was born. Although CASL has only been in force since July 1st, 2014, we argue that the Act may not survive constitutional scrutiny as it unduly restricts freedom of speech.


The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton Jan 2014

The Right To Be Forgotten: Forced Amnesia In A Technological Age, 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2014), Robert Bolton

UIC John Marshall Journal of Information Technology & Privacy Law

In the modern era, the connection between technology and one’s personal life has increased the number of moments recorded for posterity. While in many circumstances this is an ideal opportunity for fond recollection, it has the downside of displaying for others our less flattering moments. Because the Internet has such a wide scope, once something has entered its domain, it is virtually impossible to permanently remove. With a public increasingly perceiving this winnowing of privacy as a negative tendency, legislators both at home and abroad have made proposals that attempt to place restrictions on what content social media is allowed …


Eyes On The Road Program In Taiwan―Information Privacy Issues Under The Taiwan Personal Data Protection Act, 31 J. Marshall J. Info. Tech. & Privacy L. 145 (2015), Chen-Hung Chang Jan 2014

Eyes On The Road Program In Taiwan―Information Privacy Issues Under The Taiwan Personal Data Protection Act, 31 J. Marshall J. Info. Tech. & Privacy L. 145 (2015), Chen-Hung Chang

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Beyond Privacy Rights: Crossborder Cyber-Espionage And International Law, 31 J. Marshall J. Info. Tech. & Privacy L. 369 (2014), Stefan Kirchner Jan 2014

Beyond Privacy Rights: Crossborder Cyber-Espionage And International Law, 31 J. Marshall J. Info. Tech. & Privacy L. 369 (2014), Stefan Kirchner

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas Jan 2014

Breach Notification Requirements Under The European Union Legal Framework: Convergence, Conflicts, And Complexity In Compliance, 31 J. Marshall J. Info. Tech. & Privacy L. 317 (2014), Samson Esayas

UIC John Marshall Journal of Information Technology & Privacy Law

The European Union (EU) legal landscape on data privacy and information security is undergoing significant changes. A prominent legislative development in recent years is the introduction of breach notification requirements within a number of regulatory instruments. In only the past two years, the Community legislator has adopted, and proposed, four different regulatory instruments containing breach notification requirements. There are also existing requirements for the telecom sector. This creates a complex mesh of regulatory frameworks for breach notification where different aspects of the same breach within the same company might have to be dealt with under different regulatory instruments, making compliance …


Protecting Traditional Knowledge In International Intellectual Property Law: Imperatives For Protection And Choice Of Modalities, 14 J. Marshall Rev. Intell. Prop. L. 25 (2014), Tesh Dagne Jan 2014

Protecting Traditional Knowledge In International Intellectual Property Law: Imperatives For Protection And Choice Of Modalities, 14 J. Marshall Rev. Intell. Prop. L. 25 (2014), Tesh Dagne

UIC Review of Intellectual Property Law

The need for protecting traditional knowledge (TK) has been acknowledged in discussion and negotiations under the umbrella of a number of inter-governmental organizations that deal with biodiversity, the environment, indigenous peoples’ rights, human rights, food and agriculture, among others. It has, however, proved difficult to arrive at a consensus on the proper modality that can serve the needs and desires of Indigenous and Local Communities (ILCs) in their economic and cultural participation. The article examines the imperatives for the protection of TK and explores the modalities of TK protection at the international level for regulating the control of, access to …