Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 20 of 20
Full-Text Articles in Intellectual Property Law
Facebook, Twitter, And The Wild West Of Ip Enforcement On Social Media: Weighing The Merits Of A Uniform Dispute Resolution Policy, 49 J. Marshall L. Rev. 959 (2016), Daniel Doft
UIC Law Review
In Part I, this comment will discuss the different types of intellectual property issues that can arise on social media websites. Part II will then discuss the three actions currently available to an infringed owner attempting to protect its intellectual property rights. Part III will discuss the Uniform Domain Name Dispute Resolution Policy (UDRP), a successful mechanism for resolving domain name disputes online. Finally, Part IV will discuss the possible creation of a USRP, which will be modeled after the UDRP, in which a private third-party arbitrator would resolve intellectual property disputes in the social media arena. This section will …
Flo & Eddie, Inc. V. Sirius Xm Radio, Inc.: Will Terrestrial Radio And Pre-1972 Sound Recordings Remain “Happy Together”?, 50 J. Marshall L. Rev. 191 (2016), Kyle Prillaman
UIC Law Review
No abstract provided.
Professional Video Gaming: Piracy That Pays, 49 J. Marshall L. Rev. 217 (2015), Elizabeth Brusa
Professional Video Gaming: Piracy That Pays, 49 J. Marshall L. Rev. 217 (2015), Elizabeth Brusa
UIC Law Review
This Comment will focus on the legal implications of end user gamers who profit from the infringing use of copyrighted video gameplay content.
Putting A Price On Friendship: Examining The Ownership Battle Between A Business' Social Media Networks, And The Humans That Operate Them, 47 J. Marshall L. Rev. 745 (2013), Michael Furlong
UIC Law Review
No abstract provided.
The Communications Decency Act And New York Times V. Sullivan: Providing Public Figure Defamation A Home On The Internet, 43 J. Marshall L. Rev. 491 (2010), Chris Williams
UIC Law Review
No abstract provided.
All Rights Reserved: Does Google's "Image Search" Infringe Vested Exclusive Rights Granted Under The Copyright Law?, 41 J. Marshall L. Rev. 487 (2008), Eugene Goryunov
All Rights Reserved: Does Google's "Image Search" Infringe Vested Exclusive Rights Granted Under The Copyright Law?, 41 J. Marshall L. Rev. 487 (2008), Eugene Goryunov
UIC Law Review
No abstract provided.
"Don't Let The Sun Go Down On Me:" An In-Depth Look At Opportunistic Business Method Patent Licensing And A Proposed Solution To Allow Small-Defendant Business Method Users To Sing A Happier Tune, 37 J. Marshall L. Rev. 1359 (2004), Andrea Lynn Evensen
UIC Law Review
No abstract provided.
Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek
Balancing Individual Privacy Rights And The Rights Of Trademark Owners In Access To The Whois, 38 J. Marshall L. Rev. 357 (2004), Jeffrey Stephen Sobek
UIC Law Review
No abstract provided.
Free Speech In A Digital Economy: An Analysis Of How Intellectual Property Rights Have Been Elevated At The Expense Of Free Speech, 36 J. Marshall L. Rev. 109 (2002), Bernard E. Nodzon Jr.
Free Speech In A Digital Economy: An Analysis Of How Intellectual Property Rights Have Been Elevated At The Expense Of Free Speech, 36 J. Marshall L. Rev. 109 (2002), Bernard E. Nodzon Jr.
UIC Law Review
No abstract provided.
Prospecting Or Cybersquatting: Registering Your Name Before Someone Else Does, 35 J. Marshall L. Rev. 287 (2002), Benjamin B. Cotton
Prospecting Or Cybersquatting: Registering Your Name Before Someone Else Does, 35 J. Marshall L. Rev. 287 (2002), Benjamin B. Cotton
UIC Law Review
No abstract provided.
Icann't Use My Domain Name? The Real World Application Of Icann's Uniform Domain-Name Dispute Resolution Policy, 34 J. Marshall L. Rev. 1027 (2001), Karl Maersch
UIC Law Review
No abstract provided.
Computer-Aided Drug Design Using Patented Compounds: Infringement In Cyberspace?, 34 J. Marshall L. Rev. 1001 (2001), Ted L. Field
Computer-Aided Drug Design Using Patented Compounds: Infringement In Cyberspace?, 34 J. Marshall L. Rev. 1001 (2001), Ted L. Field
UIC Law Review
No abstract provided.
Authors Stripped Of Their Electronic Rights In Tasini V. New York Times Co, 32 J. Marshall L. Rev. 409 (1999), Michael Spink
Authors Stripped Of Their Electronic Rights In Tasini V. New York Times Co, 32 J. Marshall L. Rev. 409 (1999), Michael Spink
UIC Law Review
No abstract provided.
Legal Aspects - Software Reverse Engineering And Copyright: Past, Present And Future, 31 J. Marshall L. Rev. 1 (1997), Brian C. Behrens, Reuven R. Levary
Legal Aspects - Software Reverse Engineering And Copyright: Past, Present And Future, 31 J. Marshall L. Rev. 1 (1997), Brian C. Behrens, Reuven R. Levary
UIC Law Review
No abstract provided.
Computer Software Protection In 1996: A Practitioner's Nightmare, 29 J. Marshall L. Rev. 853 (1996), Jonathan E. Retsky
Computer Software Protection In 1996: A Practitioner's Nightmare, 29 J. Marshall L. Rev. 853 (1996), Jonathan E. Retsky
UIC Law Review
No abstract provided.
Cybermarks: A Proposed Hierarchical Modeling System Of Registration And Internet Architecture For Domain Names, 29 J. Marshall L. Rev. 623 (1996), G. Andrew Barger
Cybermarks: A Proposed Hierarchical Modeling System Of Registration And Internet Architecture For Domain Names, 29 J. Marshall L. Rev. 623 (1996), G. Andrew Barger
UIC Law Review
No abstract provided.
Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee
Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee
UIC Law Review
No abstract provided.
Legitimizing Decompilation Of Computer Software Under Copyright Law: A Square Peg In Search Of A Square Hole, 28 J. Marshall L. Rev. 105 (1994), Allan M. Soobert
Legitimizing Decompilation Of Computer Software Under Copyright Law: A Square Peg In Search Of A Square Hole, 28 J. Marshall L. Rev. 105 (1994), Allan M. Soobert
UIC Law Review
No abstract provided.
The Interdependent Nature Of Computer Software: Another Reason Why User-Interfaces Should Not Be Protected By Copyright Law, 25 J. Marshall L. Rev. 737 (1992), David B. Fonda
UIC Law Review
No abstract provided.
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
Information Law Overview, 18 J. Marshall L. Rev. 815 (1985), George B. Trubow
UIC Law Review
No abstract provided.