Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

PDF

2016

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 40

Full-Text Articles in Computer Law

Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll Nov 2016

Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll

Michael W. Carroll

In eBay v. MercExchange, the Supreme Court correctly rejected a one-size-fits-all approach to patent injunctions. However, the Court's opinion does not fully recognize that the problem of uniformity in patent law is more general and that this problem cannot be solved through case-by-case analysis. This Essay provides a field guide for implementing eBay using functional analysis and insights from a uniformity-cost framework developed more fully in prior work. While there can be no general rule governing equitable relief in patent cases, the traditional four factor analysis for injunctive relief should lead the cases to cluster around certain patterns that often …


Creative Commons And The New Intermediaries, Michael W. Carroll Nov 2016

Creative Commons And The New Intermediaries, Michael W. Carroll

Michael W. Carroll

This symposium contribution examines the disintermediating and reintermediating roles played by Creative Commons licenses on the Internet. Creative Commons licenses act as a disintermediating force because they enable end-to-end transactions in copyrighted works. The licenses have reintermediating force by enabling new services and new online communities to form around content licensed under a Creative Commons license. Intermediaries focused on the copyright dimension have begun to appear online as search engines, archives, libraries, publishers, community organizers, and educators. Moreover, the growth of machine-readable copyright licenses and the new intermediaries that they enable is part of a larger movement toward a Semantic …


Chapter Three: Intellectual Property, Tracy Mitrano Oct 2016

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Circumvention Of Geoblocking, Marketa Trimble Oct 2016

Circumvention Of Geoblocking, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble gave her presentation Circumvention of Geoblocking at the "Law, Borders, and Speech" conference, held at Stanford Law School on Oct. 24, 2016.


Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder Sep 2016

Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder

The University of Cincinnati Intellectual Property and Computer Law Journal

Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy Jun 2016

Strategies For Protecting Privacy In Open Data And Proactive Disclosure, Teresa Scassa, Amy Conroy

Canadian Journal of Law and Technology

In this paper, the authors explore strategies for balancing privacy with transparency in the release of government data and information as part of the growing global open government movement. The issue is important because government data or information may take many forms, may contain many different types of personal information, and may be released in a range of contexts. The legal framework is complex: personal information is typically not released as open data or under access to information regimes; nevertheless, in some cases transparency requirements take precedence over the protection of personal information. The open courts principle, for example, places …


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie Jun 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert J. Currie

Canadian Journal of Law and Technology

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry.

Using a pending border case …


Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma Jun 2016

Aereo Dynamics: "User Rights" And The Future Of Internet Retransmission In Canada, Pradeepan K. Sarma

Canadian Journal of Law and Technology

2014’s U.S. Supreme Court decision Aereo made waves in the entertainment and technology industry when it ruled in favour of a coterie of cable companies against an upstart start-up, Aereo Inc., retransmitting broadcast television over the internet. Little attention, however, has been paid to its ramifications to the Canadian broadcasting regime, with its vastly different regulatory scheme and an underlying objective to promote the dissemination of Canadian content. Complicating matters further is the 2012 Canadian Supreme Court decision Cogeco, where the retransmission of broadcast signals had been re-articulated as a ’user right’. This paper uses the Aereo decision as a …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


The Right To Repair Doctrine And The Use Of 3d Printing Technology In Canadian Patent Law, Tesh W. Dagne, Gosia Piasecka Jun 2016

The Right To Repair Doctrine And The Use Of 3d Printing Technology In Canadian Patent Law, Tesh W. Dagne, Gosia Piasecka

Canadian Journal of Law and Technology

3D printing technology is part of a new economic movement, termed the sharing economy, where consumers rely less on large corporations for supplying them with products. The technology allows consumers to bypass the traditional manufacturing process. Instead, consumers increasingly share and sell products to each other on online sharing platforms. Consumers can download digital copies of products and print them in the convenience of their homes. In addition, they can repair and modify these products to suit their needs. Canadian patent law permits the repair of a patent-protected item but prohibits its reconstruction. However, the line between repair and reconstruction …


3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel Jun 2016

3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel

Minnesota Journal of Law, Science & Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal May 2016

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton May 2016

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe May 2016

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores …


How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon Apr 2016

How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon

Faculty Scholarship

In Oracle v. Google (2015), the Federal Circuit addressed whether the " method header " components of a dominant computer program were uncopyrightable as " merging " with the headers' ideas or function. Google had copied the headers to ease the ability of third-party programmers to interact with Google's Android platform. The court rebuffed the copyrightability challenge; it reasoned that because the plaintiff's expression might have been written in alternative forms, there was no " merger " of idea and expression. But the Oracle court may have been asking the wrong question. In Lotus v. Borland (1995), the owner of …


Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus Mar 2016

Passing The Virtual Buck: How The Ninth Circuit Used Contributory Trademark Law To Expand Liability For Web Hosts, Alessandra Backus

Journal of Intellectual Property Law

No abstract provided.


Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies Feb 2016

Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies

Journal of Intellectual Property Law

No abstract provided.


I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph Feb 2016

I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph

Journal of Intellectual Property Law

No abstract provided.


Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow Feb 2016

Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow

Journal of Intellectual Property Law

No abstract provided.


Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli Jan 2016

Fashion Forward: The Need For A Proactive Approach To The Counterfeit Epidemic, Casey Tripoli

Brooklyn Journal of International Law

In the last two decades, the overall activity of the counterfeit market has expanded and risen 10,000 percent. This dramatic shift corresponds to growth of the Internet, which has unified the fascination of obtaining cheap, illegitimate goods with the efficiency of a mouse click. With the expected continued inflation of the counterfeit market comes a host of new concerns, namely, how to determine who is responsible for the distribution of these knockoffs, and who should be ordained to limit them in the marketplace. In both the United States and the European Union, however, outdated laws produce a mélange of inadequate …


Apis And Copyright Protection: The Potential Impact On Software Compatibility In The Programming Industry, 16 J. Marshall Rev. Intell. Prop. L. 153 (2016), Daria Vasilescu-Palermo Jan 2016

Apis And Copyright Protection: The Potential Impact On Software Compatibility In The Programming Industry, 16 J. Marshall Rev. Intell. Prop. L. 153 (2016), Daria Vasilescu-Palermo

UIC Review of Intellectual Property Law

In Oracle v. Google, the Federal Circuit set precedent when it decided to grant copyright protection to APIs. This comment examines the potential impact the computer programming industry will face now that APIs are deemed copyrightable. This comment also discusses Google s success in using fair use as an affirmative defense in order to use copyrightable APIs and what that means for the rest of the computer programming industry. Due to the fast-paced and ever-changing world of technology, this comment also proposes that the abstract-filtration-comparison test is the appropriate test to be used in determining API copyrightability if the issue …


The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren Jan 2016

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren

UIC John Marshall Journal of Information Technology & Privacy Law

In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and …


The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li Jan 2016

The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li

Journal of Law and Policy

Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …


Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein Jan 2016

Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein

Journal of Law and Policy

Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …


Facebook, Twitter, And The Wild West Of Ip Enforcement On Social Media: Weighing The Merits Of A Uniform Dispute Resolution Policy, 49 J. Marshall L. Rev. 959 (2016), Daniel Doft Jan 2016

Facebook, Twitter, And The Wild West Of Ip Enforcement On Social Media: Weighing The Merits Of A Uniform Dispute Resolution Policy, 49 J. Marshall L. Rev. 959 (2016), Daniel Doft

UIC Law Review

In Part I, this comment will discuss the different types of intellectual property issues that can arise on social media websites. Part II will then discuss the three actions currently available to an infringed owner attempting to protect its intellectual property rights. Part III will discuss the Uniform Domain Name Dispute Resolution Policy (UDRP), a successful mechanism for resolving domain name disputes online. Finally, Part IV will discuss the possible creation of a USRP, which will be modeled after the UDRP, in which a private third-party arbitrator would resolve intellectual property disputes in the social media arena. This section will …


Flo & Eddie, Inc. V. Sirius Xm Radio, Inc.: Will Terrestrial Radio And Pre-1972 Sound Recordings Remain “Happy Together”?, 50 J. Marshall L. Rev. 191 (2016), Kyle Prillaman Jan 2016

Flo & Eddie, Inc. V. Sirius Xm Radio, Inc.: Will Terrestrial Radio And Pre-1972 Sound Recordings Remain “Happy Together”?, 50 J. Marshall L. Rev. 191 (2016), Kyle Prillaman

UIC Law Review

No abstract provided.


Foreword: The Food Law Era, Nathan Cortez Jan 2016

Foreword: The Food Law Era, Nathan Cortez

SMU Science and Technology Law Review

No abstract provided.


If It’S Broke, Fix It: Fixing Fixation, Megan M. Carpenter Jan 2016

If It’S Broke, Fix It: Fixing Fixation, Megan M. Carpenter

Law Faculty Scholarship

The fixation requirement, once an intended instrument for added flexibility in copyrightability, has become an unworkable standard under modern copyright law. The last twenty-five years have witnessed a dramatic expansion in creative media. Developments in both digital media and contemporary art have challenged what it means to be fixed, and cases dealing with these works reveal how inapposite current interpretations of fixation are for these forms of expression. Yet, getting fixation “right” is important, for it is often the juridical threshold over which idea becomes expression. Thus, we must enable fixation to help define the parameters of creative expression while …


The Road To Artificial Super-Intelligence: Has International Law A Role To Play?, J.-G. Castel, Matthew E. Castel Jan 2016

The Road To Artificial Super-Intelligence: Has International Law A Role To Play?, J.-G. Castel, Matthew E. Castel

Canadian Journal of Law and Technology

Part I of this article deals with the road to artificial general super-intelligence.

Part II addresses the controls, if any, that should be exercised over the production and use of partially or fully autonomous machines of artificial intelligence before and after they become super-intelligent. More particularly, should there be legal and ethical limits to their use and to what extent should international law play a role in this connection?