Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Intellectual Property (2)
- Software (2)
- Commodification (1)
- Copyright Law (1)
- Copyright law (1)
-
- Copyrights (1)
- Cybersecurity (1)
- DMCA (1)
- DMCA anti-circumvention rules (1)
- Digital Millennium Copyright Act (1)
- Feist (1)
- First Possession (1)
- Hate speech (1)
- Nichols v. Universal Pictures Corporation (1)
- Objectification (1)
- Patents (1)
- Pierson v. Post (1)
- Reification (1)
- Section 230 (1)
- Software Security (1)
- Software piracy (1)
- Trade secrets (1)
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Intellectual Property Law
The Hydraulics Of Intermediary Liability Regulation, Ben Horton
The Hydraulics Of Intermediary Liability Regulation, Ben Horton
Cleveland State Law Review
The intermediary immunity created by Section 230 probably protects claims based on the non-legal harms of hate speech and misinformation as well as a European-style proportionality system of content moderation better than a more “legalized” intermediary liability regime would. Contrasting the existing non-copyright content moderation systems with empirical research on the effects of the Digital Millennium Copyright Act (DMCA) shows that a comprehensive regulation of content moderation would incentivize the moderation of defamation and negligence claims at the expense of these important non-legal claims and incentivize a homogenous, categorical approach to content moderation. Furthermore, empirical research on the effects of …
Comment With The Copyright Office Regarding A Proposed Exemption Under 17 U.S.C. Section 1201 For Software Security Research (Class 25), Candice Hoke
Law Faculty Reports and Comments
Professor Candice Hoke, Cleveland State University, and others (Douglas W. Jones, University of Iowa; Professor Deirdre Mulligan, University of California, Berkeley; Professor Vern Paxson, University of California, Berkeley;Professor Pamela Samuelson, University of California, Berkeley; Bruce Schneier Erik Stallman, Center for Democracy & Technology (CDT); comment addressing Proposed Class 25: Software Security Research and an exemption for software security research in order to promote the active research and testing efforts necessary to keep pace with evolving cybersecurity risks. Software and related access controls are increasingly embedded in a wide range of systems, from consumer goods to medical devices to infrastructure to …
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Cleveland State Law Review
As its two main Parts will evidence, this Comment remains the product of two distinct if overlapping voices. Part II returns to the conceptual origins of Radin's theory in her general critique of objectification and commodification. It asks whether a more positive concept of objectification can be recovered that is distinguishable from reification, the latter seeming to be the more appropriate locus of Radin's criticism. Part III's response to Radin is similar, but it tries to exemplify both our appreciation of and our differences from her work through more detailed analysis of intellectual property law and theory.
Capturing Ideas: Copyright And The Law Of First Possession, Abraham Drassinower
Capturing Ideas: Copyright And The Law Of First Possession, Abraham Drassinower
Cleveland State Law Review
Part II of this paper, entitled “Wish and Deed,” sets forth an account of the law of first possession through an analysis of the classic case of Pierson v. Post. Part III, entitled “Idea and Expression,” briefly sets forth an account of the idea/expression dichotomy in copyright law through discussion of the classic case of Nichols v. Universal Pictures Corporation. On that basis, Part III unfolds a correspondence between animus and factum in property law and idea and expression in copyright law. Part IV, entitled “Things and Speech,” suggests through discussion of the classic case of Feist that central doctrines …
Exporting Dmca Lockouts, Anupam Chander
Exporting Dmca Lockouts, Anupam Chander
Cleveland State Law Review
My goal here is limited. I do not attack the anti-circumvention provisions of the DMCA as wholly misguided; the desire to prevent widespread piracy of copyrighted works is understandable. At the same time, I do not mean to suggest that the critique I offer here is the sum of the adverse consequences of that statute, including for speech and education. My argument is limited to the threat posed by the export of the DMCA anti-circumvention rules, which do not explicitly guard against the anti-competitive use of those rules.Part I briefly sketches the difficulties created domestically by a DMCA inattentive to …
The Lack Of Protection Afforded Software Under The Current Intellectual Property Laws, Himanshu S. Amin
The Lack Of Protection Afforded Software Under The Current Intellectual Property Laws, Himanshu S. Amin
Cleveland State Law Review
Many abstract advances in computer technology remain unprotected since the current intellectual property system has been shaped through a focus on tangible, physical inventions. The software industry in the United States "accounts for domestic revenues of over fifty billion dollars each year in worldwide sales and services." Accordingly, it is imperative that United States software developers be provided adequate intellectual property coverage in order to protect existing technology and encourage further innovation in the field. The present lack of adequate protection has handicapped American developers unnecessarily in the global software market.