Keyword-Linked Advertising, Trademark Infringement, and Google’s Contributory Liability

By: Benjamin Aitken A number of trademark holders have recently challenged the policies of Google and other Internet search engines that allow the trademark owner’s competitors to purchase advertising space linked specifically to the owner’s trademarks when entered as search terms. This iBrief examines the application of trademark law to this practice and concludes that Google would be contributorially liable for trademark infringement only when the advertising links lead to consumer confusion about the identity of the advertiser. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0021

When Big Brother Privatizes: Commercial Surveillance, the Privacy Act of 1974, and the Future of RFID

By: John M. Eden RFID is a powerful new technology that has the potential to allow commercial retailers to undermine individual control over private information. Despite the potential of RFID to undermine personal control over such information, the federal government has not enacted a set of practicable standards to ensure that personal data does not become widely misused by commercial entities. Although some potential privacy abuses could be addressed by modifying RFID technology, this iBrief argues that it would be wise to amend the Privacy Act of 1974 so that corporations would have a statutory obligation to preserve individual anonymity and respect the privacy preferences of consumers. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0020

Better to Give Than to Receive: Evaluating Recent IP Donation Tax Policy Changes

By: Don Macbean Over the past decade, charitable contributions of intellectual property have grown rapidly. This growth has coincided with tremendous abuse as firms have sought inflated valuations of donated intellectual property in order to claim larger tax deductions. In 2004, Congress responded by passing section 882 of the American Jobs Creation Act, which drastically changed the rules governing donations of intellectual property. This iBrief argues that Congress, in addressing overvalued intellectual property donations, went too far in its efforts by failing to fully consider the importance of positive donor incentives. After discussing other proposed policies, this iBrief suggests a hybrid policy that combines strong donor incentives with protective measures against overvaluation. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0019

China’s WAPI Policy: Security Measure or Trade Protectionism?

By: Zia K. Cromer In December of 2003, the Chinese government announced that all WLAN equipment sold in China must conform to a propriety standard called WAPI, rather than the internationally accepted Wi-Fi standard. Moreover, for foreign firms to gain access to WAPI technology, they would need to partner with one of two-dozen Chinese firms designated by the Chinese government. The policy ostensibly grew out of security concerns regarding Wi-Fi, although it is unclear whether WAPI is more secure. Beijing has now indefinitely postponed the implementation of this policy, but WAPI is still relevant. This iBrief argues that WAPI is illustrative of many Chinese technical barriers to trade in the high-tech sector, and evaluates this policy’s consistency with China’s WTO obligations. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0018

From Deepsouth to the Great White North: The Extraterritorial Reach of United States Patent Law After Research in Motion

By: Daniel P. Homiller In the Internet age, complex telecommunications systems are often deployed with little regard for international borders. In NTP, Inc. v. Research in Motion, Ltd., the Federal Circuit determined that one such system infringed several U.S. patents, despite the fact that an essential element of the system was located outside the territorial United States. This iBrief argues that the Federal Circuit erred in invoking the “control and beneficial use” test, which it culled from the very few prior cases addressing extraterritorial application of U.S. patent law. In doing so, the court disregarded the Supreme Court’s direction in Deepsouth Packing Co. v. Laitram Corp. that the United States’ patent laws make no claim to extraterritorial effect. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0017

New Jersey’s Adult Internet Luring Statute: An Appropriate Next Step?

By: John W. Lomas Jr. New Jersey recently enacted legislation prohibiting the use of the Internet to lure or entice someone to a location with the purpose of committing a crime with or against that person or some other person. Most states have similar laws pertaining to pedophiles, but this is the first adult Internet luring statute. State measures to regulate the Internet, even in the context of criminal justice, will likely face constitutional challenge since the Internet has become such a critical vehicle for both protected speech and interstate commerce. Furthermore, while the use of the Internet in the commission of crimes against other persons is a new phenomenon, it is unclear whether new laws are the best solution, or whether other responses such as equipping police and investigators with more resources and training to properly enforce existing law would be more effective. This iBrief analyzes the issues New Jersey will face with its statute and the issues other states should be aware of when considering similar legislation. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0016

Stop the Abuse of Gmail!

By: Grant Yang Gmail, a highly anticipated webmail application made by Google, has been criticized by privacy advocates for breaching wiretapping laws, even before its release from beta testing. Gmail’s large storage space and automated processes developed to scan the content of incoming messages and create advertisements based on the scanned terms have enraged privacy groups on an international level. This iBrief will compare Gmail’s practices with its peers and conclude that its practices and procedures are consistent with the standards of the webmail industry. The iBrief will then propose additional measures Gmail could institute to further protect webmail users’ and alleviate the concerns of privacy advocates. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0014

The SPS Agreement: Can It Regulate Trade in Nanotechnology?

By: James D. Thayer Recent studies have shown that nanoparticles, which are approximately 1 to 100 billionths of a meter in size, present unique health and environmental risks. Nevertheless, products enhanced by nanoparticles, such as sunscreen, golf balls, and hard drives, are shipped daily in international trade. With these unique risks in mind, would measures regulating the trade in nanotechnology be subject to the WTO Agreement on Sanitary and Phytosanitary Measures? If they were, would the Agreement objectively balance the unique risks and benefits of trading in nanotechnology? Whether measures regulating the trade in nanotechnology are subject to the SPS Agreement depends on the purpose of such measures. This iBrief argues that because of recent scientific evidence, many such measures are likely to be subject to the SPS Agreement. In addition, since sanitary and phytosanitary measures must be based on scientific evidence, if Members apply the Agreement appropriately, the Agreement would objectively balance the benefits and risks of trading in nanotechnology. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0015

Regulating Indecency: The Federal Communication Commission’s Threat to the First Amendment

By: Reed Hundt This paper is adapted from a talk given by the author at Duke University School of Law on April 6, 2005. The author argues that the Federal Communication Commission’s recent crackdown on television indecency poses a significant threat to First Amendment protections by (1) limiting television viewers’ freedom of choice and (2) implying the possibility of punishment for failure to cooperate with the political objectives of the governing party. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0013

A New Paradigm for Intellectual Property Rights in Software

By: Mark H. Webbink A Winter 2004 article by Bradford L. Smith and Susan O. Mann of Microsoft published in The University of Chicago Law Review suggests that the development and growth of the software industry in the U.S. is a direct outgrowth of the implementation of intellectual property regimes, specifically copyright and patent, with respect to software in the late 1970s and early 1980s. This paper suggests that such patents were neither the sole nor the principal factor for the development of the software industry, that concerns about patents manifested prior to or soon after their application to software have proven true, and that patents are, in fact, not serving the interests of either the U.S. software industry or the consuming public. To that end, this paper advances recommendations for reforming the U.S. patent system as well as consideration of a new schema for protecting software. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0012