Unfinished Business: Are Today’s P2P Networks Liable for Copyright Infringement?

By: Christine Pope

In June 2005, the U.S. Supreme Court issued the decision in Metro-Goldwyn-Mayer Studios v. Grokster Ltd., a case that asked whether peer-to-peer networks may be held liable for facilitating the illegal distribution of music over the internet. The music industry petitioned the Supreme Court to settle the disagreement between the circuit courts over the standard of liability for aiding in copyright infringement. The case was based on a clash between the protection of technological innovation and the protection of artistic works. This iBrief examines the circuit split and the Grokster opinion and discusses the questions of liability left unresolved by the Supreme Court. It argues that further clarification of the Sony rule is still needed in order to encourage the proliferation of legitimate peer-to-peer networks by protecting their services while discouraging illegitimate file-sharing activities.

Cite: 2005 Duke L. & Tech. Rev. 0022

Posted in Copyrights & Trademarks

Keyword-Linked Advertising, Trademark Infringement, and Google’s Contributory Liability

By: Benjamin Aitken

A number of trademark holders have recently challenged the policies of Google and other Internet search engines that allow the trademark owner’s competitors to purchase advertising space linked specifically to the owner’s trademarks when entered as search terms. This iBrief examines the application of trademark law to this practice and concludes that Google would be contributorially liable for trademark infringement only when the advertising links lead to consumer confusion about the identity of the advertiser.

Cite: 2005 Duke L. & Tech. Rev. 0021

Posted in Copyrights & Trademarks

When Big Brother Privatizes: Commercial Surveillance, the Privacy Act of 1974, and the Future of RFID

By: John M. Eden

RFID is a powerful new technology that has the potential to allow commercial retailers to undermine individual control over private information. Despite the potential of RFID to undermine personal control over such information, the federal government has not enacted a set of practicable standards to ensure that personal data does not become widely misused by commercial entities. Although some potential privacy abuses could be addressed by modifying RFID technology, this iBrief argues that it would be wise to amend the Privacy Act of 1974 so that corporations would have a statutory obligation to preserve individual anonymity and respect the privacy preferences of consumers.

Cite: 2005 Duke L. & Tech. Rev. 0020

Posted in eCommerce

Better to Give Than to Receive: Evaluating Recent IP Donation Tax Policy Changes

By: Don Macbean

Over the past decade, charitable contributions of intellectual property have grown rapidly. This growth has coincided with tremendous abuse as firms have sought inflated valuations of donated intellectual property in order to claim larger tax deductions. In 2004, Congress responded by passing section 882 of the American Jobs Creation Act, which drastically changed the rules governing donations of intellectual property. This iBrief argues that Congress, in addressing overvalued intellectual property donations, went too far in its efforts by failing to fully consider the importance of positive donor incentives. After discussing other proposed policies, this iBrief suggests a hybrid policy that combines strong donor incentives with protective measures against overvaluation.

Cite: 2005 Duke L. & Tech. Rev. 0019

Posted in Patents & Technology

China’s WAPI Policy: Security Measure or Trade Protectionism?

By: Zia K. Cromer

In December of 2003, the Chinese government announced that all WLAN equipment sold in China must conform to a propriety standard called WAPI, rather than the internationally accepted Wi-Fi standard. Moreover, for foreign firms to gain access to WAPI technology, they would need to partner with one of two-dozen Chinese firms designated by the Chinese government. The policy ostensibly grew out of security concerns regarding Wi-Fi, although it is unclear whether WAPI is more secure. Beijing has now indefinitely postponed the implementation of this policy, but WAPI is still relevant. This iBrief argues that WAPI is illustrative of many Chinese technical barriers to trade in the high-tech sector, and evaluates this policy’s consistency with China’s WTO obligations.

Cite: 2005 Duke L. & Tech. Rev. 0018

Posted in International

From Deepsouth to the Great White North: The Extraterritorial Reach of United States Patent Law After Research in Motion

By: Daniel P. Homiller

In the Internet age, complex telecommunications systems are often deployed with little regard for international borders. In NTP, Inc. v. Research in Motion, Ltd., the Federal Circuit determined that one such system infringed several U.S. patents, despite the fact that an essential element of the system was located outside the territorial United States. This iBrief argues that the Federal Circuit erred in invoking the “control and beneficial use” test, which it culled from the very few prior cases addressing extraterritorial application of U.S. patent law. In doing so, the court disregarded the Supreme Court’s direction in Deepsouth Packing Co. v. Laitram Corp. that the United States’ patent laws make no claim to extraterritorial effect.

Cite: 2005 Duke L. & Tech. Rev. 0017

Posted in Patents & Technology

New Jersey’s Adult Internet Luring Statute: An Appropriate Next Step?

By: John W. Lomas Jr.

New Jersey recently enacted legislation prohibiting the use of the Internet to lure or entice someone to a location with the purpose of committing a crime with or against that person or some other person. Most states have similar laws pertaining to pedophiles, but this is the first adult Internet luring statute. State measures to regulate the Internet, even in the context of criminal justice, will likely face constitutional challenge since the Internet has become such a critical vehicle for both protected speech and interstate commerce. Furthermore, while the use of the Internet in the commission of crimes against other persons is a new phenomenon, it is unclear whether new laws are the best solution, or whether other responses such as equipping police and investigators with more resources and training to properly enforce existing law would be more effective. This iBrief analyzes the issues New Jersey will face with its statute and the issues other states should be aware of when considering similar legislation.

Cite: 2005 Duke L. & Tech. Rev. 0016

Posted in CyberCrime

The SPS Agreement: Can It Regulate Trade in Nanotechnology?

By: James D. Thayer

Recent studies have shown that nanoparticles, which are approximately 1 to 100 billionths of a meter in size, present unique health and environmental risks. Nevertheless, products enhanced by nanoparticles, such as sunscreen, golf balls, and hard drives, are shipped daily in international trade. With these unique risks in mind, would measures regulating the trade in nanotechnology be subject to the WTO Agreement on Sanitary and Phytosanitary Measures? If they were, would the Agreement objectively balance the unique risks and benefits of trading in nanotechnology? Whether measures regulating the trade in nanotechnology are subject to the SPS Agreement depends on the purpose of such measures. This iBrief argues that because of recent scientific evidence, many such measures are likely to be subject to the SPS Agreement. In addition, since sanitary and phytosanitary measures must be based on scientific evidence, if Members apply the Agreement appropriately, the Agreement would objectively balance the benefits and risks of trading in nanotechnology.

Cite: 2005 Duke L. & Tech. Rev. 0015

Posted in International

Stop the Abuse of Gmail!

By: Grant Yang

Gmail, a highly anticipated webmail application made by Google, has been criticized by privacy advocates for breaching wiretapping laws, even before its release from beta testing. Gmail’s large storage space and automated processes developed to scan the content of incoming messages and create advertisements based on the scanned terms have enraged privacy groups on an international level. This iBrief will compare Gmail’s practices with its peers and conclude that its practices and procedures are consistent with the standards of the webmail industry. The iBrief will then propose additional measures Gmail could institute to further protect webmail users’ and alleviate the concerns of privacy advocates.

Cite: 2005 Duke L. & Tech. Rev. 0014

Posted in eCommerce

Regulating Indecency: The Federal Communication Commission’s Threat to the First Amendment

By: Reed Hundt

This paper is adapted from a talk given by the author at Duke University School of Law on April 6, 2005. The author argues that the Federal Communication Commission’s recent crackdown on television indecency poses a significant threat to First Amendment protections by (1) limiting television viewers’ freedom of choice and (2) implying the possibility of punishment for failure to cooperate with the political objectives of the governing party.

Cite: 2005 Duke L. & Tech. Rev. 0013

Posted in Media & Communications

A New Paradigm for Intellectual Property Rights in Software

By: Mark H. Webbink

A Winter 2004 article by Bradford L. Smith and Susan O. Mann of Microsoft published in The University of Chicago Law Review suggests that the development and growth of the software industry in the U.S. is a direct outgrowth of the implementation of intellectual property regimes, specifically copyright and patent, with respect to software in the late 1970s and early 1980s. This paper suggests that such patents were neither the sole nor the principal factor for the development of the software industry, that concerns about patents manifested prior to or soon after their application to software have proven true, and that patents are, in fact, not serving the interests of either the U.S. software industry or the consuming public. To that end, this paper advances recommendations for reforming the U.S. patent system as well as consideration of a new schema for protecting software.

Cite: 2005 Duke L. & Tech. Rev. 0012

Posted in Patents & Technology

The European Union “Software Patents” Directive: What Is It? Why Is It? Where Are We Now?

By: Robert Bray

This paper has been adapted from a presentation given by the author at Duke University School of Law’s “Hot Topics in Intellectual Property Law Symposium” on April 1, 2005. It first presents an overview of the EU “Software Patents” Directive and many of the amendments that have been proposed and adopted. It then suggests a number of ways in which Europe can lead the world in developing a system that balances the interests of patent protection and open-source software.

Cite: 2005 Duke L. & Tech. Rev. 0011

Posted in International

Google Library: Beyond Fair Use?

By: Elisabeth Hanratty

Last December Google announced the formation of partnerships with select major libraries to begin digitizing and storing the libraries’ collections online. Google aims to provide individuals with the ability to search the full text of these books from anywhere using the Google search engine. This project will greatly increase access to those works in the public domain, but what about the books still under copyright protection? This iBrief examines the copyright implications of this ambitious project and concludes that the project, as described, does infringe the rights of copyright holders. It further concludes that while such infringement is unlikely to be found to be a fair use, it may ultimately be in the copyright holders’ best interests to acquiesce to Google’s infringement.

Cite: 2005 Duke L. & Tech. Rev. 0010

Posted in Copyrights & Trademarks

Troll or No Troll? Policing Patent Usage With an Open Post-Grant Review

By: David G. Barker

In December 2004, a mystery business, JGR Acquisitions Inc., purchased the patent portfolio of bankrupt Commerce One at auction. Commerce One had not previously enforced the acquired patents and many companies were using the patented technologies at the time of the auction. Patent watchdog groups argued that JGR–a potential patent troll formed solely to purchase Commerce One’s patents–should not be able to use the patents as a vehicle to extract licensing fees and that the patents should lapse into the public domain. Under current law, however, there is no provision for patents to be invalidated merely because they are used in a manner that discourages innovation. This iBrief argues that in order to keep patent trolls from stifling innovation and to protect legitimate patent holders, the Patent and Trademark Office should require an open post-grant review whenever patents are renewed or sold.

Cite: 2005 Duke L. & Tech. Rev. 0009

Posted in Patents & Technology

The Dormant Commerce Clause and State Regulation of the Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?

By: Chin Pann

Several states have enacted statutes to protect minors from harmful or obscene materials disseminated over the Internet, as well as from pedophiles seeking to use the Internet to lure them into sexual conduct. State and federal courts have diverged in their analysis of the Dormant Commerce Clause’s impact on state regulation in these areas. While state courts have held that the Dormant Commerce Clause does not invalidate state luring statutes, federal courts have been consistent in finding state dissemination statutes unconstitutional. This iBrief summarizes recent state and federal jurisprudence in this area and concludes that state courts have not been successful in distinguishing state luring statutes from federal case law on state dissemination statutes. Therefore, state courts have prematurely aborted the Dormant Commerce Clause examination.

Cite: 2005 Duke L. & Tech. Rev. 0008

Posted in CyberCrime

Television: Peer-To-Peer’s Next Challenger

By: D. Branch Furtado

The entertainment industry has obsessed over the threat of peer-to-peer file sharing since the introduction of Napster in 1999. The sharing of television content may present a compelling case for fair use under the long-standing “Betamax” decision. Some argue that television sharing is fundamentally different than the distribution of music or movies since television is often distributed for free over public airwaves. However, a determination of fair use is unlikely because of the fundamental differences between recording a program and downloading it, recent regulation to suppress unauthorized content distribution and shifts in the television market brought on by new technology.

Cite: 2005 Duke L. & Tech. Rev. 0007

Posted in Copyrights & Trademarks

Plugging the “Phishing” Hole: Legislation Versus Technology

By: Robert Louis B. Stevenson

This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of “phishing.” Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging personal information such as credit card numbers. While this legislation may provide some assistance in the fight against phishing, it is limited by the global nature of the Internet and the ease with which phishers can hide and avoid judgments. This iBrief therefore concludes that although the Anti-Phishing Act can play a supporting role in the battle, technological solutions are the most effective means of reducing or eliminating phishing attacks.

Cite: 2005 Duke L. & Tech. Rev. 0006

Posted in CyberCrime

Willful Infringement and the Evidentiary Value of Opinion Letters After Knorr–Bremse v. Dana

By: Joshua Stowell

Recently, the Federal Circuit in Knorr-Bremse v. Dana overruled almost twenty years of precedent by striking down the adverse inference doctrine, which had created a negative presumption against any alleged patent infringer for failing to obtain and disclose a patent opinion letter at trial. The decision, while strongly supported by numerous intellectual property and business associations, has created uncertainty for patent attorneys regarding the use of opinion letters in litigation and the acceptable methods for proving willful infringement. This iBrief addresses two specific questions left unanswered by the decision. It concludes that (1) Federal Circuit precedent strongly suggests that the plaintiff may inform the fact-finder that the alleged infringer failed to consult legal counsel, and (2) willful infringement findings can probably be avoided even absent an opinion from counsel, as long as the alleged infringer makes a showing of good faith intent to avoid infringement.

Cite: 2005 Duke L. & Tech. Rev. 0005

Posted in Patents & Technology

Taking Biologics for Granted? Takings, Trade Secrets, and Off-Patent Biological Products

By: Andrew Wasson

Biologics are complex medicines which are often genetically engineered, and which are sure to play an important role in curing some of humankind’s worst diseases. Not surprisingly, generic companies want a part of the biologic market. The FDA believes that it has the authority to approve off-patent versions of biologics that were originally regulated under the Food, Drug & Cosmetic Act, but in order to effectively do so the FDA would have to rely on findings based on data produced by the brand name companies. This iBrief examines whether the FDA’s reliance on previous findings would give rise to a valid claim under the Takings Clause of the U.S. Constitution. In the end, it concludes that the FDA’s proposed action likely would not constitute a taking.

Cite: 2005 Duke L. & Tech. Rev. 0004

Posted in Health & Biotechnology

Disclosure of Clinical Trial Data: Why Exemption 4 of the Freedom of Information Act Should Be Restored

By: Janene Boyce

Clinical trial data generated during the FDA drug approval process can be very valuable. While patients and doctors desperately need this information to make informed choices about medical treatment, drug sponsors strive to keep this resource secret to ensure their ability to profit from their own research. In the wake of the controversy over antidepressant use in children, both the public and Congress have called for the disclosure of all clinical trial data. However, rather than taking an all-or-nothing approach that could harm the development of new drugs, this iBrief argues that Congress should address the issue of trial data disclosure by restoring the proper balance to Exemption 4 of the Freedom of Information Act.

Cite: 2005 Duke L. & Tech. Rev. 0003

Posted in Health & Biotechnology

Patent Damage Strategies and the Enterprise License: Constructive Notice, Actual Notice, No Notice

By: James W. Soong

For the patent owner, early provision of patent notice can help maximize recoverable infringement damages during subsequent litigation. This iBrief recognizes a growing trend of infringement suits predicated on patented enterprise software technology, and analyzes application of patent notice principles against industry convention. This iBrief examines the licensing paradigm of enterprise software and questions whether mechanical compliance with the marking statute should qualify as constructive notice. Borrowing from analogous Federal Circuit principles, this iBrief concludes by proposing alternate notice theories that would empower patentees to seek increased remedies consistent with industry reality, case law, and fundamental statutory purpose.

Cite: 2005 Duke L. & Tech. Rev. 0002

Posted in Patents & Technology

Regulating Innovative Medicine: Fitting Square Pegs in Round Holes

By: Mark Lavender

Increasingly, innovative medical products are creating a quandary for the Food and Drug Administration (“FDA”) because they often transcend the FDA’s traditional categorical approach to regulating medical products. In a recent attempt to simplify this process, the FDA has proposed a new rule for regulating “combination products.” This iBrief discusses the FDA’s current approach and analyzes the possible affects of the proposed regulation. Because of the many shortcomings of both systems, this iBrief concludes that the FDA should instead stop assigning center jurisdiction based on a product’s “primary mode of action,” and give the Office of Combination Products internal agency jurisdiction over combination products. This alternative approach would increase consistency and efficiency while maintaining the FDA’s high standards for medical product safety and efficacy.

Cite: 2005 Duke L. & Tech. Rev. 0001

Posted in Health & Biotechnology

Canning Spam: Consumer Protection or a Lid on Free Speech?

By: Grant C. Yang

The United States Congress recently passed the first federal legislation to curb the influx of spam. However, the Controlling the Assault of Non-Solicited Pornography and Marketing Act (“CAN-SPAM Act”) left some measures to be enacted by the Federal Trade Commission (“FTC”), and some consumers are calling for the Act to have a broader reach and for the creation of a Do-Not-E-Mail registry. Conversely, the FTC decided to delay the creation of a registry and opted to assist in the development of a new technological authentication system. This iBrief looks at the current state of spam and explains that it is too early to tell whether the effects of the CAN-SPAM Act warrant new anti-spam measures. In addition, it points out that it is questionable whether the FTC’s current authentication approach will be effective, and, thus, considers the possible First Amendment challenges to a Do-Not-Call registry as well as other possible anti-spam solutions. In the end, this iBrief postulates that the most effective option might be for the FTC to implement both a Do-Not-Email registry and an authentication system.

Cite: 2004 Duke L. & Tech. Rev. 0016

Posted in eCommerce

1984 Is Still Fiction: Electronic Monitoring in the Workplace and U.S. Privacy Law

By: Christopher Pearson Fazekas

Electronic monitoring in the workplace has been the subject of relentless public criticism. Privacy advocates argue that technological advancements have given overbearing employers powerful tools to abuse employee dignity in the name of productivity and that new legislation should bolster workplace privacy rights. This iBrief contends that current U.S. legal doctrine governing electronic monitoring in the workplace is fair given the nature and purpose of the workplace, and potential employer liability for employee misconduct.

Cite: 2004 Duke L. & Tech. Rev. 0015

Posted in eCommerce

Crossed Signals in a Wireless World: The Seventh Circuit’s Misapplication of the Complete Preemption Doctrine

By: Matthew J. Kleiman

As the number of wireless telephone users continues to proliferate, so does the number of lawsuits against wireless service providers. While consumers seek to utilize various consumer-friendly state law causes of action, the wireless industry continues to push for a uniform federal regulatory regime. Ambiguous language in the Federal Communications Act of 1934 (“FCA”) and disagreement among the federal circuits has led to much confusion over whether state law claims affecting wireless rates and market entry are removable to federal court by way of “complete preemption.” This iBrief argues that FCA’s preemption power is limited by its savings clause, failure to establish a comprehensive regulatory scheme, and provision of a significant role for state regulation. Accordingly, the Seventh Circuit erred in Bastien v. AT&T Wireless Services, Inc. when it concluded that the FCA completely preempts certain state law claims against wireless service providers and thereby requires their removal to federal court.

Cite: 2004 Duke L. & Tech. Rev. 0014

Posted in Media & Communications