by Deirdre K. Mulligan and Jack Lerner
In the wake of the California energy crisis of 2000-2001, the California Energy Commission (CEC) and California Public Utilities Commission (CPUC) are aggressively pursuing “demand response” (DR) energy programs aimed at reducing peak energy demand. Demand response systems convey information about market conditions through pricing or reliability signals to customers, who in turn, hopefully, alter their electricity consumption choices. In particular DR programs are aimed at shifting the time at which customers use energy through the implementation of time-varying tariffs. Armed with information about the time-varying cost of electricity residential and commercial customers are expected to reduce energy usage and/or shift their usage to non-peak, less costly, hours. Such shifts, even absent reductions in overall consumption, will reduce the likelihood of energy brown and black outs and provide direct savings to consumers. Technologies to enable the demand response system, including advanced metering research and development [OpenAMI] and sensor and control technologies development [DRETD], are under development. These technologies will be coupled with a communication and network infrastructure that supports the multicast of real-time pricing information, and the aggregation of energy usage and billing information.
Continue reading "Taking the "Long View" on the Fourth Amendment: Stored Records and the Sanctity of the Home" »
by Center for Democracy and Technology
One year ago, on June 27, 2005, the Supreme Court released its much-anticipated ruling in Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd . The unanimous decision held that Grokster and StreamCast, the distributors of popular peer-to-peer "file sharing" software, could be held secondarily liable for copyright infringement committed by their users if Grokster and StreamCast took active steps to induce infringement. This document outlines the limits on the scope of secondary copyright liability that follow from a close reading of the Grokster decision together with the landmark decision in Sony Corporation of America v. Universal City Studios, Inc. (1984), and patent law precedents relating to inducement liability. The Center for Democracy and Technology believes the legal principles set forth in this article represent the best reading of current law in the wake of Grokster and that careful observance of these principles by lower courts would serve the Grokster Court's goal of ensuring that secondary liability for copyright infringement "does nothing to compromise legitimate commerce or discourage innovation having lawful promise."
STLR is proud to present: Interpreting Grokster: Limits on the Scope of Secondary Liability for Copyright Infringement, a perspective by the Center for Democracy and Technology (CDT).
by Jonathan Kerry-Tyerman
This paper begins with an overview of Amazon's prior experiments with e-books, the way in which the Search Inside the Book database is created, and how that database manifests itself to the Amazon user. Part II analyzes the Search Inside the Book program under current copyright law and concludes that the program does infringe copyrights in the indexed works. Part III argues that programs like Search Inside the Book, though infringing, actually serve the purposes of copyright law, and should not create liability for the providers of such programs. Finally, part IV applies the fair use doctrine to Search Inside the Book, assuming that the existing copy-protection measures are improved as indicated and ultimately finding this unconventional program protected as fair use.
STLR is proud to present: No Analog Analogue: Searchable Digital Archives and Amazon's Unprecedented Search Inside the Book Program as Fair Use by Jonathan Kerry-Tyerman.
by T. Colpan and L.R. Skibell
This article argues that corporate law firms do not appreciate the changing world of legal recruiting. The rise of information technology means that law students function as sophisticated consumers of information on law firm life. Given that monetary compensation at major corporate firms is almost identical, students' perception of lifestyle can have a major influence on their valuation of firms. Consequently, firms need to adapt by more carefully managing the type of information that might be accessible to students, and their general reputation within the student community.
Continue reading "Managing Risk to Reputation: The Challenge of the Internet for Legal Recruiting" »
by Gail Lasprogata, Nancy J. King, and Sukanya Pillay
This article compares the regulation of electronic employee monitoring in the European Union, the United States and Canada in an attempt to reconcile conflicting legal standards regarding workplace privacy as they are evolving simultaneously with technological advances. Included is an extensive discussion of the European Union's widely influential privacy directive and its application in the context of electronic employee monitoring, relevant U.S. legislation such as the Electronic Communications Privacy Act (ECPA), HIPAA and the ADA, and Canada's newly enacted Personal Information Protection and Electronic Documents Act (PIPEDA). Also included is a detailed comparative analysis of the regulatory approaches to employee privacy taken in these jurisdictions. Drawn from this analysis are fundamental privacy principles which inform employers of the parameters of employee privacy protection where electronic monitoring is a desired management practice. The authors argue that these principles create an equitable paradigm that rightfully protects employee dignity while recognizing legitimate management needs.
Continue reading "Regulation of Electronic Employee Monitoring" »
by Thomas W. Hazlett & George Bittlingmayer
A policy of "open access" is advanced to counter the market power of cable television systems in video and broadband. While substantial market power exists, economic theory demonstrates that cable operators generally do not have incentives to discriminate against independent providers of Internet access or content, and market data suggest that vertical integration (foreclosing "open access") is efficient. Moreover, historical experience shows that regulation of cable systems, including retail rate controls, leased access, and video dialtone, has proven anti-consumer. "Open access" is similarly likely to suppress, rather than expand, technology deployment, as seen in the lagging competitiveness of the "open" broadband platform (digital subscriber lines) offered by telephone companies. Indeed, common carrier regulation is shown to be a disincentive to investment in advanced telecommunications by observation of cable operator behavior. Cable systems under-allocate spectrum for high-speed network services, a practice that strategically counters the threat of regulatory appropriation implicit in "open access."
by Edward R. Ergenzinger Jr. & W. Murray Spruill
The Supreme Court's decision in Festo removes some of the rigidity of the Federal Circuit's "complete bar" approach to the doctrine of equivalents, but difficulties remain for biotechnology patent holders. The Court explicitly allows for the application of prosecution history estoppel to claims amended in response to enablement rejections and not just those amended to avoid prior art. Due to the uncertainty regarding enablement for nucleotide and amino acid sequences, applications in the field of biotechnology are virtually guaranteed to be amended during prosecution. Consequently, the Festo decision places an undue burden on applicants in the field of biotechnology: to specifically claim every possible variant of a nucleotide or amino acid sequence or risk finding out in court that minor non-functional substitutions in the claimed sequence were foreseeable, and therefore not covered by the doctrine of equivalents.
by Kevin P.B. Johnson & Barak D. Jolish
Although the Supreme Court rejected the Federal Circuit’s “absolute bar” to the doctrine of equivalents, the new presumption of prosecution history estoppel, after Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co., Ltd., sets the standard nearly as high. Indeed, a patentee may rebut this presumption only through evidence that (a) the equivalent was unforeseeable; (b) the rationale underlying the amendment bears only a tangential relation to the equivalent; or (c) there was some other reason why the patentee could not reasonably be expected to have described the equivalent. This article examines questions regarding the application of these rebuttable presumption factors, including those concerning the relative weight of each factor, the time at which amendments must be foreseeable, and the counterintuitive incentive that the foreseeability factor appears to create. Finally, this article presents strategies for avoiding the Festo dilemma altogether.
by Robert D. Fram, Margaret Jane Radin & Thomas P. Brown
As information technology plays a larger role in the everyday business of value exchange, the question of ownership of that technology, through the traditional legal means of patent rights, will likely come to the fore in banking and related industries. At the same time, the increasing importance of contracting for information and the role of technology in the contracting mechanisms themselves are giving rise to a new regulatory environment for these industries. Legal advisors to banks and other financial institutions will need to understand how property rights in technology will impact their clients. They must also keep pace with a different and changing contractual and regulatory environment and learn to deal with contracts that are entered into by machines and signatures consisting of bits.
Continue reading "Altered States: Electronic Commerce and Owning the Means of Value Exchange" »
by Eric J. Sinrod & Barak D. Jolish
The explosion of Internet usage has provided users with avenues to make purchases, invest, and explore issues as deeply personal as sexuality, politics and cultural beliefs. This explosion has been accompanied by concerns over user privacy and access to objectionable content. The concerns over privacy relate to the collection of personal information from users, often through surreptitious technological means, and the risk of eventual dissemination of this information to businesses, governmental authorities, and even those with criminal, fraudulent intent. Those concerned about easy access to objectionable content wish to protect children from exposure to pornography and violence.
Attempts to address these privacy and decency concerns through regulation are met with arguments from those who would urge more freedom from the Internet; many argue that freedom is an essential element of the usefulness and relevance of the medium. Particularly, attempts to regulate forms of expression on the Internet have been challenged on the grounds of censorship and free speech.
Continue reading "Controlling Chaos: The Emerging Law of Privacy and Speech in Cyberspace" »
by Gary Edmond & David Mercer
The concept of "junk science" is widely believed to account for a myriad of problems with interactions between law and science. It is regularly blamed for precipitating an ongoing legal "crisis" resulting in longer trials, more expensive litigation, and inconsistent, irrational judgments. The alleged prevalence of junk science is used as evidence for the failure of the judiciary and the public to comprehend science.
Continue reading "Trashing "Junk Science"" »
by Thomas F. O'Neil III, Kevin P. Gallagher, & Jonathon L. Nevett
In this paper, the Authors describe how the technological advancements in telecommunications over the last century have eroded many protections of attorney communication afforded by various common law evidentiary privileges. They note that although federal law now makes the unauthorized interception of any oral, wire, or electronic communication a criminal offense, most courts and state ethics rules fail to protect the privileged nature of attorney communication when attorneys use new forms of communications technology such as cellular telephones or e-mail.
Continue reading "Detours on the Information Superhighway: The Erosion of Evidentiary Privileges in Cyberspace and Beyond" »