| |
| |
| |
An Overview of the Technology Policy Environment in the United States | |
| |
| |
Introduction | |
| |
| |
The Intellectual Property System | |
| |
| |
Patents | |
| |
| |
Copyrights | |
| |
| |
Trade Secrets | |
| |
| |
Trademarks | |
| |
| |
The Public Policy Process in the United States | |
| |
| |
The Power Struggle: Federal versus State | |
| |
| |
How Intellectual Property Policies Are Made in the United States | |
| |
| |
The Expanding Scope of Intellectual Property Protection | |
| |
| |
The Rising Importance of the First Amendment in Technology Policy Disputes | |
| |
| |
Two Running Examples | |
| |
| |
The Self-Adjusting Stair Climber | |
| |
| |
DeCSS | |
| |
| |
Conclusion | |
| |
| |
| |
The International Technology Policy Environment | |
| |
| |
Introduction | |
| |
| |
Unilateral Measures: Actions Against Imports into the United States | |
| |
| |
Private Actions for Unauthorized Imports into the United States | |
| |
| |
Enforcement through Administrative Action | |
| |
| |
Bilateral Arrangements and the Importance of Trade Sanctions | |
| |
| |
Section 301 and Trade Sanctions | |
| |
| |
Special 301 and Intellectual Property Protection | |
| |
| |
Multilateral Approaches | |
| |
| |
Global Intellectual Property Agreements | |
| |
| |
World Trade Organization | |
| |
| |
Regional Trade Pacts | |
| |
| |
International Law and the Internet | |
| |
| |
Personal Jurisdiction: Where Can the Lawsuit Be Brought? | |
| |
| |
What Law Applies? | |
| |
| |
Can a Judgment Be Enforced? | |
| |
| |
| |
The Yahoo! Litigation | |
| |
| |
| |
The ElcomSoft Controversy | |
| |
| |
Conclusion | |
| |
| |
| |
Fundamental Requirements for Patent Protection in the United States | |
| |
| |
Introduction | |
| |
| |
Overview of Patent Policies and Processes | |
| |
| |
Basic Requirements | |
| |
| |
Patent Duration | |
| |
| |
Enforcement Issues | |
| |
| |
Novelty | |
| |
| |
Was the Patent Application Filed in Time? | |
| |
| |
Who Gets the Patent When There Are Multiple Inventors? | |
| |
| |
Nonobviousness | |
| |
| |
Patentable Subject Matter and Utility | |
| |
| |
Patentable Subject Matter | |
| |
| |
Utility | |
| |
| |
Design Patents | |
| |
| |
International Protection of Industrial Designs | |
| |
| |
Conclusion | |
| |
| |
| |
Obtaining and Defending Patent Rights in the United States and Globally | |
| |
| |
Introduction | |
| |
| |
The Patent Application Process: A Brief Overview | |
| |
| |
Who May File the Patent Application? | |
| |
| |
Invention Assignment Agreements | |
| |
| |
When to Apply | |
| |
| |
Dealing with the PTO | |
| |
| |
Loss of Patent Rights | |
| |
| |
Disclosure: Enablement and Best Mode | |
| |
| |
Enablement | |
| |
| |
Infringement and Remedies | |
| |
| |
Literal Infringement | |
| |
| |
Doctrine of Equivalents | |
| |
| |
Prosecution History Estoppel | |
| |
| |
Infringement of Process Patents | |
| |
| |
International Patent Protection Issues | |
| |
| |
Substantive Patent Policy Issues | |
| |
| |
Procedural Patent Policy Issues | |
| |
| |
Conclusion | |
| |
| |
| |
Patent Protection for Computer Programs and Internet Business Methods | |
| |
| |
Introduction | |
| |
| |
Patent Protection for Computer Programs: The Long and Winding Road | |
| |
| |
Computer Processes Are Patentable Subject Matter | |
| |
| |
Old Standards and the Importance of Physical Transformations | |
| |
| |
The Modern Trend | |
| |
| |
1996 PTO Examination Guidelines for Computer-Related Inventions | |
| |
| |
The Dual Impact of the Federal Circuit's State Street Decision | |
| |
| |
Revised PTO Examination Guidelines for Computer-Related Inventions | |
| |
| |
Recent Events Involving Computer Program Patents | |
| |
| |
Other Issues Regarding Patents for Computer Programs | |
| |
| |
Receiving a Patent from the PTO | |
| |
| |
Disclosure | |
| |
| |
The Possibility of Copyright Protection | |
| |
| |
International Patent Protection of Computer Programs | |
| |
| |
The Controversy Continues: Should Patent Protection Be Extended to Computer Programs? | |
| |
| |
Patent Protection for Internet Business Methods | |
| |
| |
The Controversy over Amazon's One-Click Business Method Patent | |
| |
| |
The PTO's Business Method Patent Initiative | |
| |
| |
Legislative Measures and New Proposals | |
| |
| |
Conclusion | |
| |
| |
| |
Protection of Secret Information | |
| |
| |
Introduction | |
| |
| |
Rationales for Trade Secret Laws | |
| |
| |
Important Aspects of Trade Secret Laws | |
| |
| |
Definition of Trade Secret | |
| |
| |
Misappropriation | |
| |
| |
Proving Misappropriation | |
| |
| |
Remedies for Trade Secret Misappropriation | |
| |
| |
Trade Secret Protection Measures | |
| |
| |
Federal Economic Espionage Act | |
| |
| |
International Trade Secret Protection | |
| |
| |
Concluding Remarks about Trade Secret Protection | |
| |
| |
Presenting Unsolicited Ideas to Third Parties | |
| |
| |
How Companies Handle Unsolicited Ideas | |
| |
| |
Advice for Offering Unsolicited Ideas | |
| |
| |
Conclusion | |
| |
| |
| |
Fundamental Aspects of Copyright Protection | |
| |
| |
Introduction | |
| |
| |
What May Be Protected by Copyright | |
| |
| |
Protection of Original Expressions | |
| |
| |
Protection of Databases | |
| |
| |
Copyright Protection of Product Designs | |
| |
| |
Rights Provided by Copyright | |
| |
| |
The Basic Exclusive Rights | |
| |
| |
The Digital Transmission Right for Sound Recordings | |
| |
| |
Fair Use and Other Exceptions to Copyright Protection | |
| |
| |
Copyright Ownership | |
| |
| |
Works Made for Hire | |
| |
| |
Joint Works | |
| |
| |
Moral Rights | |
| |
| |
How to Obtain Copyright Protection | |
| |
| |
Registration and Deposit | |
| |
| |
Copyright Notice | |
| |
| |
Duration of Copyright Protection | |
| |
| |
Infringement and Remedies | |
| |
| |
The Substantial Similarity Standard | |
| |
| |
Remedies | |
| |
| |
Conclusion | |
| |
| |
| |
Copyright Protection for Computer Programs and Digital Media | |
| |
| |
Introduction | |
| |
| |
The Importance of Distinguishing Ideas from Expressions in Computer Programs | |
| |
| |
Levels of Abstractions in Copyrighted Works | |
| |
| |
The Availability of Alternative Expressions | |
| |
| |
Levels of Abstraction for Computer Programs | |
| |
| |
The Original Approach in Computer Copyright Cases | |
| |
| |
Protection for Computer Programs | |
| |
| |
Protection for User Interfaces | |
| |
| |
The Modern Approach in Computer Copyright Cases | |
| |
| |
Protection for Computer Programs | |
| |
| |
Protection for User Interfaces | |
| |
| |
International Copyright Protection of Computer Programs | |
| |
| |
Reverse Engineering of Computer Programs and Clean-Room Techniques | |
| |
| |
Digital Audio Sampling and Digital Imaging | |
| |
| |
Digital Audio Sampling and Remixing | |
| |
| |
The Application of Fair Use to Sampling and Remixing | |
| |
| |
Digital Imaging | |
| |
| |
Conclusion | |
| |
| |
| |
Copyright and the Internet | |
| |
| |
Introduction | |
| |
| |
Legal Responsibility for the Wrongful Conduct of Others | |
| |
| |
A Framework for Analyzing Legal Responsibility | |
| |
| |
The Controversies over Video Recording Devices | |
| |
| |
Application of Sony's Principles to Digital Video Recorders | |
| |
| |
The Controversies over Audio Recording Devices | |
| |
| |
The Audio Home Recording Act | |
| |
| |
The Controversy over MP3 and Portable Digital Music Players | |
| |
| |
Online Service Provider Liability | |
| |
| |
Contributory and Vicarious Liability | |
| |
| |
DMCA Protects OSPs from Copyright Infringement | |
| |
| |
Responsibility for Copyright Infringements on Peer-to-Peer File-Sharing Networks | |
| |
| |
The Napster Dispute | |
| |
| |
The Recording and Motion Picture Industries Contend with Post-Napster Services in the Courts | |
| |
| |
The Entertainment Industries Adopt Other Strategies to Combat File Sharing | |
| |
| |
The Supreme Court Addresses the Legality of P2P Services | |
| |
| |
The DMCA and Copyright Protection Technologies | |
| |
| |
DMCA's Anti-Circumvention and Anti-trafficking Provisions | |
| |
| |
Other Recent DMCA Controversies | |
| |
| |
Proposed Statutory Amendments to the DMCA | |
| |
| |
Linking, Framing, and Other Internet Copyright Issues | |
| |
| |
Linking | |
| |
| |
Deep-Linking | |
| |
| |
Inline Imaging and Framing | |
| |
| |
Application to CoolEdge | |
| |
| |
Other Internet Issues | |
| |
| |
Conclusion | |
| |
| |
| |
Protecting Trademarks and Product Designs in International Markets | |
| |
| |
Introduction | |
| |
| |
Fundamental Principles of Trademark Protection | |
| |
| |
Trademarks and Competitive Ethics | |
| |
| |
Trademarks and Market Efficiency | |
| |
| |
Generic Marks | |
| |
| |
Descriptive Marks | |
| |
| |
The Spectrum of Trademark Protection | |
| |
| |
Trademark Protection of Product Characteristics | |
| |
| |
Distinctiveness of Product Characteristics | |
| |
| |
Functionality | |
| |
| |
Trademark Protection and Computers | |
| |
| |
Federal Registration: Standards and Procedures | |
| |
| |
Likelihood of Confusion | |
| |
| |
Use Requirements | |
| |
| |
Reasons to Conduct a Trademark Search | |
| |
| |
Basic Registration Procedures | |
| |
| |
Intent-to-Use Applications | |
| |
| |
Loss of Registration Rights | |
| |
| |
Trademark Infringement and Remedies | |
| |
| |
Likelihood of Confusion | |
| |
| |
Dilution | |
| |
| |
Remedies for Infringement | |
| |
| |
International Aspects of Trademark Protection | |
| |
| |
International Trademark Registration | |
| |
| |
The Gray Market | |
| |
| |
Conclusion | |
| |
| |
| |
Domain Names and Other Trademark Issues on the Internet | |
| |
| |
Introduction | |
| |
| |
The Initial Problems with the Internet Domain Name System | |
| |
| |
NSI's Revised Domain Name Registration Policy | |
| |
| |
International Domain Name Complexities | |
| |
| |
Policy Responses to Domain Name Problems | |
| |
| |
Anticybersquatting Consumer Protection Act | |
| |
| |
Preliminary Suggestions for Improvements to the Domain Name Registration Process | |
| |
| |
The Creation of ICANN | |
| |
| |
New Generic Top-Level Domain Names | |
| |
| |
The Uniform Dispute Resolution Policy | |
| |
| |
Other Internet-Related Trademark Issues | |
| |
| |
"Suck" Sites and Critical Commentary | |
| |
| |
Metatags | |
| |
| |
Linking and Framing | |
| |
| |
Keying and Sponsored Advertising | |
| |
| |
Conclusion | |
| |
| |
| |
Tort Liability for Physical and Economic Harms | |
| |
| |
Introduction | |
| |
| |
Negligence | |
| |
| |
Negligence and the Restatement of Torts | |
| |
| |
Causation Issues in Negligence | |
| |
| |
Proximate Cause: Responsibility for Negligence | |
| |
| |
Defenses to Liability for Negligence | |
| |
| |
What Is Negligent Conduct? | |
| |
| |
Negligence and Computer Programmers | |
| |
| |
Strict Products Liability | |
| |
| |
Policy Reasons for Strict Products Liability | |
| |
| |
Forms of Product Defects | |
| |
| |
The New Restatement of Torts on Products Liability | |
| |
| |
Consumer Product Safety Commission Regulations | |
| |
| |
Tort Reform Measures | |
| |
| |
Examples of Strict Liability Policies in Other Countries | |
| |
| |
Strict Products Liability and the Computer Industry | |
| |
| |
Intentional Torts Involving Computer Systems | |
| |
| |
Trespass by Electronic Robots | |
| |
| |
Spam | |
| |
| |
Computer Viruses, Trojan Horses, and Worms | |
| |
| |
Electronic Coercion and Self-Help | |
| |
| |
Conclusion | |
| |
| |
| |
Intrusions on Privacy and Other Personal Rights | |
| |
| |
Introduction | |
| |
| |
A Preliminary Look at Privacy | |
| |
| |
Sources of Laws Regulating Privacy | |
| |
| |
The Privacy Balance | |
| |
| |
Monitoring Communications and Personal Activities in the Workplace | |
| |
| |
Monitoring for Efficiency | |
| |
| |
Monitoring Internet Activity | |
| |
| |
Monitoring E-Mail Communications | |
| |
| |
Recommendations Regarding Electronic Monitoring Activities | |
| |
| |
Collection of Personally Identifiable Information | |
| |
| |
Data Collection on the Internet | |
| |
| |
Content Control and the Regulation of Indecent Speech | |
| |
| |
The Communications Decency Act of 1996 | |
| |
| |
Private Control through Labels and Software Filters | |
| |
| |
Child Online Protection Act of 1998 | |
| |
| |
Public Libraries and Filtering Software | |
| |
| |
Defamation | |
| |
| |
Intrusions on Publicity Rights | |
| |
| |
Conclusion | |
| |
| |
| |
Important Contract Issues for Technology Companies | |
| |
| |
Introduction | |
| |
| |
Warranties, Limitations, and Remedies | |
| |
| |
Express Warranties | |
| |
| |
Implied Warranties | |
| |
| |
Remedies for Breach of Warranties and Limitations of Remedies | |
| |
| |
Shrink-Wrap and Click-Wrap Licenses | |
| |
| |
General Principles Regarding Standardized Forms | |
| |
| |
Standardized Forms in the Consumer Context | |
| |
| |
The Trend in the Courts | |
| |
| |
Click-Wrap Licenses | |
| |
| |
The Uniform Computer Information Transactions Act | |
| |
| |
Electronic Commerce Issues | |
| |
| |
Electronic | |
| |
| |
Agents | |
| |
| |
Mass-Market Licenses | |
| |
| |
Warranties | |
| |
| |
Other Issues | |
| |
| |
Strategic Alliances and the Importance of Alternate Dispute Resolution | |
| |
| |
Strategic Alliances | |
| |
| |
Alternative Dispute Resolution | |
| |
| |
Conclusion | |
| |
| |
Antitrust and Anticompetitive Conduct | |
| |
| |
Biotechnology: Patent Issues and Other Policy Matters | |
| |
| |
Table of Cases | |
| |
| |
Index | |