Will Sony’s Fourth Playstation Lead to a Second Sony v. Universal?

By: Seth Ascher

Sony has included a “share” button on the next version of their popular PlayStation video game system. This feature is meant to allow players to record and share videos of their gameplay. This service shares similarities with the controversial “record” button that Sony included with its Betamax players over thirty years ago. The Betamax player was the subject of the landmark case Sony v. Universal, a foundational case for the modern application of copyright law to new technology. This Issue Brief examines how this “share” feature would fare under the framework laid out by Sony v. Universal and other evolutions in copyright law.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 231

Posted in Copyrights & Trademarks

Born This Way: How Neuroimaging Will Impact Jury Deliberations

By: Tanneika Minott

Advancements in technology have now made it possible for scientists to provide assessments of an individual’s mental state. Through neuroimaging, scientists can create visual images of the brain that depict whether an individual has a mental disorder or other brain defect. The importance of these advancements is particularly evident in the context of criminal law, where defendants are able to dispute their culpability for crimes committed where they lack the capacity to form criminal intent. Thus, in theory, a neuroimage depicting defective brain functioning could demonstrate a defendant’s inability to form the requisite criminal intent. Due to early successes in high-profile cases where advanced neuroimaging was used in this way, many researchers believe that the use of neuroimages to substantiate claims of diminished capacity and insanity is a viable option for criminal defendants. This Issue Brief argues, however, that though the use of neuroimages may have a positive effect on outcomes in theory, in actuality, the use of neuroimages will only have a negligible impact on sentencing outcomes.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 219

Posted in Health & Biotechnology

Stopping Police in Their Tracks: Protecting Cellular Location Information Privacy in the Twenty-First Century

By: Stephen Wagner

Only a small fraction of law enforcement agencies in the United States obtain a warrant before tracking the cell phones of suspects and persons of interest. This is due, in part, to the fact that courts have struggled to keep pace with a changing technological landscape. Indeed, courts around the country have issued a disparate array of holdings on the issue of warrantless cell phone tracking. This lack of judicial uniformity has led to confusion for both law enforcement agencies and the public alike. In order to protect reasonable expectations of privacy in the twenty-first century, Congress should pass legislation requiring law-enforcement agencies to obtain a warrant based upon probable cause before they can track a cell phone except in a limited set of time-sensitive situations and emergencies.

This Issue Brief describes the technology police use to track cell phones, discusses the need for federal legislation, concludes that current Fourth Amendment jurisprudence is inadequate to address cell phone tracking, analyzes two bills dealing with “geolocation information” privacy that legislators have introduced in Congress, and ultimately concludes that one of those bills is superior to the other.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 200

Posted in eDiscovery

Sharing is Airing: Employee Concerted Activity on Social Media After Hispanics United

By: Ryan Kennedy

Section 7 of the United States’ National Labor Relations Act allows groups of American workers to engage in concerted activity for the purposes of collective bargaining or for “other mutual aid or protection.” This latter protection has been extended in cases such as Lafayette Park Hotel to workers outside the union context. Starting in 2005, the National Labor Relations Board increasingly signaled to employers that concerted activity may take place on social media such as Facebook. However, the Board proper delivered its first written opinion articulating these rules in the 2012 case of Hispanics United of Buffalo, Inc. There, the Board found the employer in question to have committed multiple unfair labor practices when it fired five employees over a series of Facebook posts due to violating the employer’s zero-tolerance no bullying policy.

This article argues that the majority opinion of the Board misapplied Lafayette Park Hotel’s test for whether employer conduct “would reasonably tend to chill employees” from legitimate, protected uses of their §7 rights. This article explains the two largest errors in the Board’s decision: (1) a failure to identify a missing, important element for concerted activity protection under §7, the nexus between employee discussion and contemplated group action, and (2) asserting an “inferred group intent” existed that was “implicitly manifest” which linked the employees’ Facebook posts to contemplated group action protected under §7.

Members of the entire Board, as well as other legal scholars writing on this topic, have been guilty at different times of simplifying social media to being like a “virtual water cooler” for the 21st century. The facts in Hispanics United show why this analogy does not work: rather than a short face-to-face conversation with a finite, known audience in the space of minutes, it was a series of written messages plopped down in sequential order throughout an entire day, written for an audience of unknown size and make-up that may not even include the co-workers it ostensibly addressed. As Hispanics United helps illustrate, the proper handling of employer retaliation on social media remains the sensible application of the established nexus requirement for finding concerted activity.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 182

Posted in Media & Communications

DMCA Safe Harbors for Virtual Private Server Providers Hosting BitTorrent Clients

By: Stephen J. Wang

By the time the U.S. Supreme Court decided Metro-Goldwyn-Mayer Studios Inc. v. Grokster Ltd. in 2005, Internet users around the globe who engaged in copyright infringement had already turned to newer, alternative forms of peer-to-peer filesharing. One recent development is the “seedbox,” a virtual private server rentable for use to download and upload (“seed”) files through the BitTorrent protocol. Because BitTorrent is widely used for both non-infringing and infringing purposes, the operators of seedboxes and other rentable BitTorrent-capable virtual private servers face the possibility of direct and secondary liability as did the defendants in Grokster and more recent cases like UMG Recordings, Inc. v. Shelter Capital Partners LLC and Viacom Intern., Inc. v. YouTube, Inc. This Issue Brief examines whether the “safe harbor” provisions of the Digital Millennium Copyright Act (DMCA) may shield virtual private server providers with customers running BitTorrent clients from potential liability for copyright infringement. It argues that general virtual private server providers are likely to find refuge in the safe harbor provisions as long as they conscientiously comply with the DMCA. In contrast, virtual private server providers specifically targeting BitTorrent users (“seedbox providers”) are much less likely to receive DMCA safe harbor protection.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 163

Posted in Copyrights & Trademarks

Mega, Digital Storage Lockers, and the DMCA: Will Innovation Be Stifled by Fears of Piracy?

By: Ali V. Mirsaidi

Kim Dotcom, founder of Megaupload Limited, has been in many news headlines over the past year. Megaupload—one of Dotcom’s many peer-to-peer sharing sites—was the center of controversy, as it allowed users to upload and share all sorts of files, including copyrighted material. After an organized effort by the Department of Justice and several foreign governments, Dotcom was arrested for (secondary) copyright infringement and his site was ultimately shut down.

Dotcom has recently launched a new service, MEGA, which he claims will evade copyright laws entirely. Like other well-known cloud-sharing services such as Dropbox and Google Drive, MEGA allows users to upload files and to share them with select users. In an attempt to avoid liability, MEGA locally encrypts all files on the user’s computer before they are uploaded to the site. The private key and public key used to encrypt and decrypt the file are retained solely by the user; MEGA gets no part of that information. This, Dotcom argues, will shift the entirety of the copyright onus to the user.

This Issue Brief analyzes the protections afforded cyberlocker services like MEGA by the DMCA, including tensions raised in actual litigation. This Issue Brief argues that, while an ex ante secondary-liability analysis is difficult due to its contextual nature, MEGA’s use of user-controlled encryption (UCE), deduplication, and distributed host servers may lend to an affirmative finding of liability.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 151

Posted in Copyrights & Trademarks

The Apple E-Book Agreement and Ruinous Competition: Are E-Goods Different for Antitrust Purposes?

By: Michael Wolfe

Publishers have spent the last decade and a half struggling against falling prices for digital goods. The recent antitrust case against Apple and the major publishers highlights collusive price fixing as a potential method for resisting depreciation.

This Article examines the myriad ways in which digital distribution puts downward pressure on prices, and seeks to determine whether or not collusive price fixing would serve as an appropriate response to such pressure given the goals of the copyright grant. Considering retailer bargaining power, increased access to substitutes, the loss of traditional price discrimination methods, the effects of vertical integration in digital publishing, and the increasing competitiveness of the public domain, I conclude that the resultant downward price pressure might in fact significantly hamper the commodity distribution of digital goods.

I remain unconvinced, however, that price fixing is an appropriate solution. The copyright grant affords rights holders commercial opportunities beyond simple commodity distribution. These other methods for commercializing e-goods suggest to me that current pricing trends are not indicative of market failure, but rather of a changing marketplace.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 129

Posted in Copyrights & Trademarks

The Jurisprudence of Transformation: Intellectual Incoherence and Doctrinal Murkiness Twenty Years After Campbell v. Acuff-Rose Music

By: Matthew D. Bunker and Clay Calvert

Examining recent judicial opinions, this Article analyzes and critiques the transformative-use doctrine two decades after the U.S. Supreme Court introduced it into copyright law in Campbell v. Acuff-Rose Music. When the Court established the transformative-use concept, which plays a critical role in fair-use determinations today, its contours were relatively undefined. Drawing on an influential law-review article, the Court described a transformative use as one that adds “new expression, meaning or message.” Unfortunately, the doctrine and its application are increasingly ambiguous, with lower courts developing competing conceptions of transformation. This doctrinal murkiness is particularly disturbing because fair use is a key proxy for First Amendment interests in copyright law. This Article traces the evolution of transformative use, analyzes three key paradigms of transformative use that have gained prominence in the post-Campbell environment, and offers suggestions for a jurisprudence in which transformative use is a less significant component of the fair-use analysis.

Download Full Article (PDF)

Cite: 12 Duke L. & Tech. Rev. 92

Posted in Copyrights & Trademarks

More from the #Jury Box: The Latest on Juries and Social Media

By: Hon. Amy J. St. Eve,  Hon. Charles P. Burns, & Michael A. Zuckerman

This Article presents the results of a survey of jurors in federal and state court on their use of social media during their jury service. We began surveying federal jurors in 2011 and reported preliminary results in 2012; since then, we have surveyed several hundred more jurors, including state jurors, for a more complete picture of juror attitudes toward social media. Our results support the growing consensus that jury instructions are the most effective tool to mitigate the risk of juror misconduct through social media. We conclude with a set of recommended best practices for using a social-media instruction.

Cite: 12 Duke L. & Tech. Rev. 64

Posted in Media & Communications

The Resurrection of the Duty to Inquire After Therasense, Inc. v. Becton, Dickinson & Co.

By: Brandee N. Woolard

Balancing a duty to a tribunal and a duty to a client can paralyze a lawyer. The task raises difficult questions about how to reconcile competing obligations as an advocate and as an officer of the court. Individuals licensed to prosecute patent applications must decide how to honor both their obligations to the Patent and Trademark Office (PTO) and their obligation to successfully prosecute patent applications. This burden can result in willful blindness, where the patent attorney or patent agent (“patent practitioner”) limits inquiry into information that may bar a patent application. The recent Federal Circuit opinion in Therasense may have eliminated the judicial “duty to inquire” doctrine that kept these obligations in balance. This Issue Brief argues that there is a need to protect against willful blindness and proposes a resurrection of the eliminated doctrines.

Cite: 12 Duke L. & Tech. Rev. 41

Posted in Patents & Technology

Carbons Into Bytes: Patented Chemical Compound Protection in the Virtual World

By: B. Thomas Watson

“Virtual” molecular compounds, created in molecular modeling software, are increasingly useful in the process of rational drug design. When a physical compound is patented, however, virtual use of the compound allows researchers to circumvent the protection granted to the patentee. To acquire protection from unauthorized use of compounds in their virtual form, patentees must directly claim the virtual compound. But Supreme Court decisions such as Bilski v. Kappos and Mayo Collaborative Services v. Prometheus Laboratories, Inc. call into question whether virtual compound claims are patentable subject matter under § 101. Using the guidance offered by the Supreme Court and Federal Circuit, this Issue Brief argues that virtual compound claims are not abstract ideas and therefore, consistent with patent policy, qualify as patentable subject matter.

Cite: 12 Duke L. & Tech. Rev. 25

Posted in Health & Biotechnology, Patents & Technology

In Ambiguous Battle: The Promise (And Pathos) of Public Domain Day, 2014

By: Jennifer Jenkins

On the first day of each year, Public Domain Day celebrates the moment when copyrights expire, and books, films, songs, and other creative works enter the public domain, where they become, in Justice Brandeis’s words, “free as the air to common use.” Educators, students, artists, and fans can use them with neither permission nor payment. Online archives can digitize and make them fully available without the threat of lawsuits or licensing demands. Sadly, in the United States, as a result of copyright term extensions, not a single published work will enter the public domain in 2014. In fact, almost no works created during most readers’ lifetimes will become completely free for them to redistribute and reuse, unless the rights holders affirmatively decide otherwise.

In this Article, I will briefly trace the history and consequences of this legally imposed impoverishment of the public domain. But, I argue, this is only part of the story. Increasingly, private initiatives are trying to build zones of legal freedom that simulate some attributes of the public domain. At the same time, there are global copyright reform efforts to limit the negative effects of term extension, at least with regard to “orphan works”—those that have no identifiable or locatable copyright holder. Although these efforts are no substitute for a more complete reform of copyright, collectively, they do transform the legal situation substantially. Thus, while Public Domain Day in the United States may seem like an empty celebration, it is also a reminder of this newfound complexity in our copyright landscape.

Cite: 12 Duke L. & Tech. Rev. 1

Posted in Copyrights & Trademarks, Patents & Technology

After Prometheus, Are Human Genes Patentable Subject Matter?

By: Douglas L. Rogers

On April 15, 2013, the U.S. Supreme Court heard oral arguments in Association for Molecular Pathology v. Myriad Genetics, Inc. on the question, “Are human genes patentable?” This article argues that human genes are not patentable and that isolating a gene from its surroundings in a human body—or creating synthetically what exists in nature as DNA—does not cause the DNA to become patentable subject matter. The isolated DNA segments of claim 1 have the identical nucleotide sequence and the same function as native DNA, and the isolated DNA of claim 1 do not reflect the marked changes required under Chakrabarty, or the inventive step required under Prometheus, to change an unpatentable product of nature into patentable subject matter. Claim 2 describes those nucleotides in the DNA sequence that code for the polypeptide identified in the Myriad Genetics patent specification and simply reflects the genetic code, an unpatentable law of nature. Since no inventive step has been added to the law of nature, claim 2 constitutes unpatentable subject matter under Prometheus. The Federal Circuit’s contrary decision in Myriad Genetics disregards 150 years of Supreme Court cases that physical phenomena found in nature and laws of nature are not patentable subject matter and threatens to enclose building blocks of nature under federal patent law. The Supreme Court should reverse the Federal Circuit’s decision in Myriad Genetics on claims 1 and 2.

Cite: 11 Duke L. & Tech. Rev. 434

Posted in Health & Biotechnology, Patents & Technology

Lack of Transparency in the Premarket Approval Process for Aquadvantage Salmon

By: Michael P. McEvilly

After a lengthy premarket approval process, the Food and Drug Administration (FDA) is soon likely to deem AquAdvantage Salmon, a fast-growing, genetically engineered salmon, safe for human consumption. If approved, AquAdvantage Salmon will be the first genetically engineered animal designed for human consumption to go to market in the United States. Because there have been no significant changes to the statutory or regulatory framework governing agricultural biotechnology since it was established in the 1980s, the FDA reviews applications of genetically engineered animals under the New Animal Drug Application (NADA) provisions of the Federal Food, Drug, and Cosmetic Act (FDCA). The FDA’s treatment of genetically engineered food as a new animal drug has been criticized due to potential environmental and human health risks, and because of a lack of transparency throughout the regulatory process. After providing an overview of the premarket approval process, this Issue Brief argues that even under the NADA provisions, the FDA’s premarket approval risk assessment should be more transparent. In particular, the justification for trade secret status of relevant biotechnology is undermined, if not extinguished, by the need for public consideration of the biotechnology’s safety and effectiveness after a certain time in the approval process. Furthermore, the comment period prior to advisory committee meetings should be lengthened to allow for greater scientific input on safety and effectiveness, and an independent body should be created to communicate with the public about food safety.

Cite: 11 Duke L. & Tech. Rev. 413

Posted in Health & Biotechnology

The Promise of Priority Review Vouchers as a Legislative Tool to Encourage Drugs for Neglected Diseases

By: Lesley Hamming

Despite the intellectual property system’s success in promoting the economic well-being of the United States, this system has not achieved all socially valuable ends. Insufficient treatments are applied both to diseases endemic in developing countries, such as malaria, and rare diseases, such as rare childhood cancers. This Issue Brief reviews the existing legislative tools for promoting socially valuable drugs and biologics through market incentives. The priority review voucher (PRV) program is the latest and most unique of these legislative tools aimed at encouraging the development of drugs for neglected diseases without burdening taxpayers. The Creating Hope Act—recently signed into law as part of the Food & Drug Administration Safety & Innovation Act—extends the PRV program to rare pediatric diseases. This Issue Brief argues that some provisions in this new legislation may result in undesirable collateral effects that could prevent the legislation from fulfilling its objective of encouraging investment in treatments for rare pediatric diseases.

Cite: 11 Duke L. & Tech. Rev. 390

Posted in Health & Biotechnology

The America Invents Act 500: Effects of Patent Monetization Entities on US Litigation

By: Sara Jeruss, Robin Feldman, & Joshua Walker

Any discussion of flaws in the United States patent system inevitably turns to the system’s modern villain: non-practicing entities, known more colorfully as patent trolls. For many years, however, discussions about non-practicing entities have been long on speculation and short on data.

In 2011 Congress directed the nonpartisan Government Accountability Office to study the effects of non-practicing entities on patent litigation. At the request of the GAO, we collected and coded a set of patent lawsuits filed over the past five years. This article presents our analysis of the data and its implications.

The data confirm in a dramatic fashion what many scholars and commentators have suspected: patent monetization entities play a role in a substantial portion of the lawsuits filed today. Based on our sample, lawsuits filed by patent monetizers have increased from 22% of the cases filed five years ago to almost 40% of the cases filed in the most recent year. In addition, of the five parties in the sample who filed the greatest number of lawsuits during the period studied, four were monetizers and only one was an operating company.

Cite: 11 Duke L. & Tech. Rev. 357

Posted in Patents & Technology

Cooking Protestors Alive: The Excessive-Force Implications of the Active Denial System

By: Brad Turner

The Active Denial System (ADS) is unlike any other nonviolent weapon: instead of incapacitating its targets, it forces them to flee, and it does so without being seen or heard. Though it is a promising new crowd-control tool for law-enforcement, excessive-force claims involving the ADS will create a Fourth Amendment jurisprudential paradox. Moreover, the resolution of that paradox could undermine other constitutional principles—like equality, fairness, and free speech. Ultimately, the ADS serves as a warning that without legislation, American jurisprudence may not be ready for the next generation of law-enforcement technology and the novel excessive-force claims sure to follow.

Cite: 11 Duke L. & Tech. Rev. 332

Posted in Patents & Technology | 2 Comments

A Comparative Critique to U.S. Courts’ Approach to E-Discovery in Foreign Trials

By: Lauren Ann Ross

This Issue Brief explores an oft-neglected irony in international e-discovery: the rationales used by courts to compel discovery against foreign parties embroiled in litigation in U.S. courts may contradict courts’ reasoning when compelling discovery against U.S. parties engaged in litigation overseas. U.S. courts often grant petitions for discovery, increasingly electronic in form, both against a foreign party in the U.S. and against a domestic party abroad. Although allowing discovery in both scenarios appears consistent, it actually ignores important counterconsiderations like fairness and reciprocity in different legal systems. Because the rise of technology has exacerbated the existing problem, making discovery more expensive and time-consuming, this Brief proposes that, when examining 28 U.S.C. § 1782 claims, courts adopt a more conservative approach to foreign-discoverability and a comparative approach to the balancing test set forth in Intel Corp. v. Advanced Micro Devices, Inc.

Cite: 11 Duke L. & Tech. Rev. 313

Posted in eDiscovery

The Myth and Reality of Dilution

By: Sandra L. Rierson

Statutory dilution claims are traditionally justified on the theory that even non-confusing uses of a famous trademark (or similar mark) can nonetheless minutely dilute the source-identifying capacity of the targeted trademark. This Article challenges that theory. The evidence that this phenomenon occurs is weak and has been subject to substantial empirical challenge. The true foundation for dilution claims lies not in alleged economic harms, but rather the misplaced fiction of corporate personality. We do not require trademark holders to prove actual economic injury in the context of a dilution claim because, at least in the vast majority of cases, there is none. Instead, we have granted the holders of famous trademarks the equivalent of a “moral” right to these marks, analogous to the rights granted to a creator of an expressive work in the copyright context. The parameters of that right have recently expanded in numerous ways that have increasingly burdened both competition and free speech. Recasting dilution law in a moral rights framework allows us to more accurately assess its costs and benefits, with normative implications for its continued existence and scope. In particular, the federal dilution statute should be repealed, amended, or, at the very least, narrowly construed.

Cite: 11 Duke L. & Tech. Rev. 212

Posted in Copyrights & Trademarks

The Greatest Book You Will Never Read: Public Access Rights and the Orphan Works Dilemma

By: Libby Greismann

Copyright law aims to promote the dual goals of incentivizing production of literary and artistic works, and promoting public access and free speech. To achieve these goals, Congress has implemented a policy that acknowledges the rights of both the copyright holder and the public, which vest with the fixation of the work. However, as Congressional action has strengthened copyright protection, the rights of the public have been narrowed. Orphan works – works to which the copyright owner cannot be located or identified – present a unique problem, in that achieving free access and use of the works is often impossible. This note argues that the public has a recognizable right in both gaining access to and using orphan works – a right which emanates from, but is tangential to, the First Amendment right to free speech.

Cite: 11 Duke L. & Tech. Rev. 193

Posted in Copyrights & Trademarks

Beta-Testing the “Particular Machine”: The Machine-or-Transformation Test in Peril and Its Impact on Cloud Computing

By: Richard M. Lee

This Issue Brief examines recent cases addressing the patent eligibility of computer-implemented method claims and their implications for the development of cloud computing technologies. Despite the Supreme Court’s refusal to endorse the machine-or-transformation test as the exclusive patent eligibility inquiry, lower courts have continued to invalidate method claims using a stringent “particular machine” requirement alongside the requisite abstract ideas analysis. This Issue Brief argues that 1) post-Bilski v. Kappos cases have failed to elucidate what constitutes a particular machine for computer-implemented methods; 2) in light of substantial variance among Federal Circuit judges’ Section 101 jurisprudence, the application of the particular machine requirement has become subject to a high degree of panel-dependency, such that its relevance for analyzing software method claims has come under question; 3) notwithstanding the unease expressed by practitioners and scholars for the future of cloud computing patents, the courts’ hardening stance toward computer-implemented method claims will do little to deter patenting in the cloud computing context. Instead, clouds delivering platform and software services will remain capable of satisfying the particular machine requirement and supporting patent eligibility, especially given the possible dilution of the particular machine requirement itself.

Cite: 11 Duke L. & Tech. Rev. 175

Posted in Patents & Technology

Cloud Computing, Clickwrap Agreements, and Limitation on Liability Clauses: A Perfect Storm?

By: Timothy J. Calloway

“To the cloud!” trumpets a commercial by Microsoft, whose aim is to herd customers, and their checkbooks, into the cloud computing fold. But Microsoft, and other cloud providers like Amazon and Google, might inadvertently be doing just the opposite. It is not for lack of security or even early adopter apprehension that potential customers might turn away. Nor is it a lack of fantastic, cost-saving applications of cloud technology.

Rather, the problem is buried deep within these tech giants’ clickwrap agreements—the ones that customers rarely read and to which they invariably click “I Agree.” Hidden in these agreements are limitation on liability clauses, veritable safe harbors for cloud providers and submerged icebergs for the unwary cloud customer. Often, these clauses wholly abrogate a customer’s right to recover damages for his provider’s wrongful acts. In other words, a provider could purposefully delete its customers’ data or shut down its users’ websites, leaving the aggrieved customers with no cause of action and no right to recover.

While limitation on liability clauses are not new to the contract law vernacular, their inclusion in cloud computing agreements is particularly troublesome. The amount of potential liability that customers may waive through a half-cocked click is as enormous as it is troubling. While courts have recently held that these clauses are enforceable in other Internet-related areas, courts should be wary of blindly applying precedent and enforcing these clauses in the cloud computing context.

Cite: 11 Duke L. & Tech. Rev. 163

Posted in eCommerce

DMCA Safe Harbors and the Future of New Digital Music Sharing Platforms

By: Jing Xu

SoundCloud is an online service provider that allows users to upload, share, and download music that they have created. It is an innovative platform for both amateur and established producers and disc jockeys (DJs) to showcase their original tracks and remixes. Unfortunately, it is also a platform that lends itself to widespread copyright infringement. Looking toward potential litigation, several factors ought to be considered by SoundCloud and other similar providers. The Viacom v. YouTube case, decided in the Southern District of New York and now currently on appeal in the Second Circuit, sheds light on the potential liability service providers like SoundCloud face. It draws out the Digital Millennium Copyright Act’s (DMCA) safe harbor provisions under which SoundCloud could potentially find protection. However, SoundCloud is unique among similar service providers because it provides users with a variety of viewing, sharing and downloading options that are built into the platform. These options could lead to infringement that would not fall under a DMCA safe harbor. This Issue Brief will discuss the various arguments to be made for and against SoundCloud’s liability, and examine whether the unique utility provided by the service to users could be sustained in the face of potential litigation. Ultimately, the safeguards used by SoundCloud to filter blatant infringement, combined with the DMCA § 512(c) safe harbor, should allow this innovative platform to maintain its current model without neutering its core functionality.

Cite: 11 Duke L. & Tech. Rev. 145

Posted in Copyrights & Trademarks

“Less Is More”: New Property Paradigm in the Information Age?

By: Aarthi S. Anand

Before striking down laws increasing copyright’s domain, judges and legislators are asking for evidence that information products will be created even if copyright protection is not provided. The future of Internet technology depends on locating this evidence in time to limit expansive copyright. United States law, however, already protects information products under copyright. Hence, this counterfactual evidence that judges request cannot be generated in the United States. In response to the demand for data, American legal scholars have attempted to mine evidence from open software and other non-commercial endeavors on the Internet. However, these endeavors have been dismissed as exceptions or “cults,” unrelated to mainstream industry needs. This Article, for the first time, provides evidence of growth in the commercial software industry without intellectual property protection. Between 1993 and 2010, the software industry in India emerged as the fastest growing in the world, accounting for $76 billion in revenues by 2010. In the same time period, the software industry in India remained unaffected by changes in intellectual property protection for software. By demonstrating industry growth without strong intellectual property protections, the Indian data fills the critical gap in American literature.

Moreover, the comparative data from India enables scholars to separate causality from outcomes in specific empirical and analytical studies emerging out of the United States. In the case study of California’s Silicon Valley, for instance, there is a risk that causality may be extrapolated to alternative California statutes, giving rise to errors of second order. The comparative analysis checks this potential inaccuracy. The industry in India also provides illuminating data from contracting practices—decisive evidence of the legal infrastructure firms need and will create by contract, if not found in a priori law. This study equips policy-makers to go beyond the “historic accident” explanation to understand why the software industry flourishes where it does.

Cite: 11 Duke L. & Tech. Rev. 65

Posted in Patents & Technology

Open Source Innovation, Patent Injunctions, and the Public Interest

By: James Boyle

This Article explores the difficulties that high technology markets pose for patent law and, in particular, for patent injunctions. It then outlines the ways in which “open source innovation” is unusually vulnerable to patent injunctions. It argues that courts can recognize this vulnerability, and respond to the particular competitive and innovative benefits of open source innovation, by flexibly applying the Supreme Court’s ruling in eBay v. MercExchange. Having dealt with the lamentable failure of the International Trade Commission to exercise a similar flexibility in its own patent jurisprudence, despite statutory and constitutional provisions that counsel otherwise, the Article concludes with some recommendations for reform.

Cite: 11 Duke L. & Tech. Rev. 30

Posted in Patents & Technology