A New Paradigm for Intellectual Property Rights in Software

By: Mark H. Webbink A Winter 2004 article by Bradford L. Smith and Susan O. Mann of Microsoft published in The University of Chicago Law Review suggests that the development and growth of the software industry in the U.S. is a direct outgrowth of the implementation of intellectual property regimes, specifically copyright and patent, with respect to software in the late 1970s and early 1980s. This paper suggests that such patents were neither the sole nor the principal factor for the development of the software industry, that concerns about patents manifested prior to or soon after their application to software have proven true, and that patents are, in fact, not serving the interests of either the U.S. software industry or the consuming public. To that end, this paper advances recommendations for reforming the U.S. patent system as well as consideration of a new schema for protecting software. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0012

Troll or No Troll? Policing Patent Usage With an Open Post-Grant Review

By: David G. Barker In December 2004, a mystery business, JGR Acquisitions Inc., purchased the patent portfolio of bankrupt Commerce One at auction. Commerce One had not previously enforced the acquired patents and many companies were using the patented technologies at the time of the auction. Patent watchdog groups argued that JGR–a potential patent troll formed solely to purchase Commerce One’s patents–should not be able to use the patents as a vehicle to extract licensing fees and that the patents should lapse into the public domain. Under current law, however, there is no provision for patents to be invalidated merely because they are used in a manner that discourages innovation. This iBrief argues that in order to keep patent trolls from stifling innovation and to protect legitimate patent holders, the Patent and Trademark Office should require an open post-grant review whenever patents are renewed or sold. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0009

Google Library: Beyond Fair Use?

By: Elisabeth Hanratty Last December Google announced the formation of partnerships with select major libraries to begin digitizing and storing the libraries’ collections online. Google aims to provide individuals with the ability to search the full text of these books from anywhere using the Google search engine. This project will greatly increase access to those works in the public domain, but what about the books still under copyright protection? This iBrief examines the copyright implications of this ambitious project and concludes that the project, as described, does infringe the rights of copyright holders. It further concludes that while such infringement is unlikely to be found to be a fair use, it may ultimately be in the copyright holders’ best interests to acquiesce to Google’s infringement. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0010

The Dormant Commerce Clause and State Regulation of the Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?

By: Chin Pann Several states have enacted statutes to protect minors from harmful or obscene materials disseminated over the Internet, as well as from pedophiles seeking to use the Internet to lure them into sexual conduct. State and federal courts have diverged in their analysis of the Dormant Commerce Clause’s impact on state regulation in these areas. While state courts have held that the Dormant Commerce Clause does not invalidate state luring statutes, federal courts have been consistent in finding state dissemination statutes unconstitutional. This iBrief summarizes recent state and federal jurisprudence in this area and concludes that state courts have not been successful in distinguishing state luring statutes from federal case law on state dissemination statutes. Therefore, state courts have prematurely aborted the Dormant Commerce Clause examination. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0008

Television: Peer-To-Peer’s Next Challenger

By: D. Branch Furtado The entertainment industry has obsessed over the threat of peer-to-peer file sharing since the introduction of Napster in 1999. The sharing of television content may present a compelling case for fair use under the long-standing “Betamax” decision. Some argue that television sharing is fundamentally different than the distribution of music or movies since television is often distributed for free over public airwaves. However, a determination of fair use is unlikely because of the fundamental differences between recording a program and downloading it, recent regulation to suppress unauthorized content distribution and shifts in the television market brought on by new technology. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0007

Plugging the “Phishing” Hole: Legislation Versus Technology

By: Robert Louis B. Stevenson This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of “phishing.” Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging personal information such as credit card numbers. While this legislation may provide some assistance in the fight against phishing, it is limited by the global nature of the Internet and the ease with which phishers can hide and avoid judgments. This iBrief therefore concludes that although the Anti-Phishing Act can play a supporting role in the battle, technological solutions are the most effective means of reducing or eliminating phishing attacks. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0006

Willful Infringement and the Evidentiary Value of Opinion Letters After Knorr–Bremse v. Dana

By: Joshua Stowell Recently, the Federal Circuit in Knorr-Bremse v. Dana overruled almost twenty years of precedent by striking down the adverse inference doctrine, which had created a negative presumption against any alleged patent infringer for failing to obtain and disclose a patent opinion letter at trial. The decision, while strongly supported by numerous intellectual property and business associations, has created uncertainty for patent attorneys regarding the use of opinion letters in litigation and the acceptable methods for proving willful infringement. This iBrief addresses two specific questions left unanswered by the decision. It concludes that (1) Federal Circuit precedent strongly suggests that the plaintiff may inform the fact-finder that the alleged infringer failed to consult legal counsel, and (2) willful infringement findings can probably be avoided even absent an opinion from counsel, as long as the alleged infringer makes a showing of good faith intent to avoid infringement. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0005

Taking Biologics for Granted? Takings, Trade Secrets, and Off-Patent Biological Products

By: Andrew Wasson Biologics are complex medicines which are often genetically engineered, and which are sure to play an important role in curing some of humankind’s worst diseases. Not surprisingly, generic companies want a part of the biologic market. The FDA believes that it has the authority to approve off-patent versions of biologics that were originally regulated under the Food, Drug & Cosmetic Act, but in order to effectively do so the FDA would have to rely on findings based on data produced by the brand name companies. This iBrief examines whether the FDA’s reliance on previous findings would give rise to a valid claim under the Takings Clause of the U.S. Constitution. In the end, it concludes that the FDA’s proposed action likely would not constitute a taking. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0004

Disclosure of Clinical Trial Data: Why Exemption 4 of the Freedom of Information Act Should Be Restored

By: Janene Boyce Clinical trial data generated during the FDA drug approval process can be very valuable. While patients and doctors desperately need this information to make informed choices about medical treatment, drug sponsors strive to keep this resource secret to ensure their ability to profit from their own research. In the wake of the controversy over antidepressant use in children, both the public and Congress have called for the disclosure of all clinical trial data. However, rather than taking an all-or-nothing approach that could harm the development of new drugs, this iBrief argues that Congress should address the issue of trial data disclosure by restoring the proper balance to Exemption 4 of the Freedom of Information Act. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0003

Patent Damage Strategies and the Enterprise License: Constructive Notice, Actual Notice, No Notice

By: James W. Soong For the patent owner, early provision of patent notice can help maximize recoverable infringement damages during subsequent litigation. This iBrief recognizes a growing trend of infringement suits predicated on patented enterprise software technology, and analyzes application of patent notice principles against industry convention. This iBrief examines the licensing paradigm of enterprise software and questions whether mechanical compliance with the marking statute should qualify as constructive notice. Borrowing from analogous Federal Circuit principles, this iBrief concludes by proposing alternate notice theories that would empower patentees to seek increased remedies consistent with industry reality, case law, and fundamental statutory purpose. Download Full Article (PDF) Cite: 2005 Duke L. & Tech. Rev. 0002