Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh Jan 2023

Ransomware Groups On Notice: U.S. Cyber Operation Against Revil Is Permissible Under International Law, Justin Singh

American University International Law Review

The continued increase in the use of ransomware by cyber criminals has had a costly impact on businesses and organizations around the world. Ransomware groups continue to initiate attacks on businesses and organizations, and states have become increasingly concerned over the potential impact it may have on their critical infrastructure and economies. The United States’ recent acknowledgement of cyber operations against ransomware groups highlights the seriousness of the issue and exposes areas of international law that are complicated when applied to cyber operations against these groups. This Comment explores the relevant international law as it applies to the United States …


Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong Jan 2018

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Faculty Articles and Other Publications

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive copyright protection …


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

All Faculty Scholarship

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …


Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati Apr 2014

Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati

Rodolfo C. Rivas

The authors provide a brief rundown of strategies to protect a wide range of IP rights in cyberspace. The strategies tackle practical advice and suggest a series of progressive actions in order to ensure maximum protection with an efficient use of resources.//////////////////////////////// Los autores proporcionan un breve resumen de las estrategias para proteger una amplia gama de derechos de propiedad intelectual en el ciberespacio. Las estrategias abordan consejos prácticos y sugieren una serie de acciones en orden progresivo con la finalidad de garantizar la máxima protección manteniendo un uso eficiente de los recursos.


Machine Learning And Law, Harry Surden Jan 2014

Machine Learning And Law, Harry Surden

Publications

This Article explores the application of machine learning techniques within the practice of law. Broadly speaking “machine learning” refers to computer algorithms that have the ability to “learn” or improve in performance over time on some task. In general, machine learning algorithms are designed to detect patterns in data and then apply these patterns going forward to new data in order to automate particular tasks. Outside of law, machine learning techniques have been successfully applied to automate tasks that were once thought to necessitate human intelligence — for example language translation, fraud-detection, driving automobiles, facial recognition, and data-mining. If performing …


The Darknet: A Digital Copyright Revolution, Jessica A. Wood Jan 2010

The Darknet: A Digital Copyright Revolution, Jessica A. Wood

Richmond Journal of Law & Technology

We are in the midst of a digital revolution. In this “Age of Peer Production,” armies of amateur participants demand the freedom to rip, remix, and share their own digital culture. Aided by the newest iteration of file sharing networks, digital media users now have the option to retreat underground, by using secure, private, and anonymous file sharing networks, to share freely and breathe new life into digital media. These underground networks, collectively termed “the Darknet[,] will grow in scope, resilience, and effectiveness in direct proportion to [increasing] digital restrictions the public finds untenable.” The Darknet has been called the …


Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann Jan 2006

Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann

Faculty Scholarship

For several years now, open source software products have been gaining prominence and market share. Yet the products themselves are not as provocative as the way in which they are developed and distributed. Two related features of the open source model are distinctive: the use of collaborative development structures that extend beyond the boundaries of a single firm, and the lack of reliance on intellectual property ("IP") rights as a means of appropriating the value of the underlying technologies. Firm-level control of intellectual property is replaced by a complex set of relations, both informal and sometimes contractual, among strategic partners …