<$BlogRSDUrl$>

10 May 2004

We're moving . . .  

posted by Rob @ 8:09:00 pm Perm Link
We're moving

Or, more accurately, we've moved . . .

The Law School convinced the University to give us some space on their new server . . .

So here's where we are, and where we plan to stay (housewarming gifts are welcome).

http://lawblog.uea.ac.uk/

We have copied the content from here to there, but there were a few "bugs" in the move (and it'll stay here, for what it's worth).

Please update bookmarks and feeds (now running RSS 1.0, RSS 2.0, and Atom ...)

23 April 2004

An Academic Aside 

posted by Rob @ 10:26:00 pm Perm Link
An Academic Aside
One of my favorite people to read is Lawrence Solum. He is not only quite creative when it comes to thinking and writing, with lots of original things to say, but he shows depth in his blog posts beyond many others (myself included). If you want an introduction to legal theory, read Lawrence's Legal Theory Lexicon--I had my "Law and the Information Society" students read some of it this term); if you want to learn who is joining the academy in the U.S., read Lawrence; if you want to learn (and think) about copynorms, read Lawrence.

Well, in the midst of all this (he teaches, too, by the way), Lawrence has decided to include all of us in his newest research project, which is just getting off the ground. In a series of posts that will appear irregularly, organized in the "Legal Scholar's Journal," he'll let us in on his process from the ground floor up. Here's just part of what he has to say in his first Journal entry:

"The journal will follow my progress as I take an article from a blank page (or "screen") today through the early drafts of summer to the submission of the final draft to law reviews in February of 2005. Some of the early posts will discuss the origins of the project. I'll say something about the parts of the article writing process that are rarely discussed in public—the pragmatic reasons for picking one project over another--about gaming the law reviews and taking into account the opinion leaders in the legal academy. But my next article is really being written to satisfy must one person--me. And I will also have a good deal to say about why I feel passionate about the project that I am starting today."
As a new (potential?) scholar myself, I can't wait. I'll be reading, hoping that my own projects, in various states of disarray, can benefit as much from Lawrence's sharing of his experience as it has from Eugene Volokh's "Legal Academic Writing."

I can't wait . . .

18 April 2004

The Amplification Effect 

posted by Rob @ 12:42:00 pm Perm Link
The Amplification Effect
In reading my E-mail this morning, it seemed to me that the struggle against viruses -- specifically E-mail viruses -- provides us with a concrete example of the "Trusted Technology Fallacy" (about which I've written here before) and shows us how this fallacy not only affects our thinking about technology, but also has real effects on us.

Here's the situation: in responding the onslaught of E-mail viruses, both individual E-mail systems and virus prevention manufacturers have implemented automatic stop and respond systems that react to messages with certain types of (or in specific cases certain named) attachments. Once implemented (turned on), these systems are largely automated. They stop the messages, and they send a message to the alleged sender notifying that person that their message has not been delivered. This seems reasonable. If the message was wrongly stopped -- if the stop was a "false positive" for virus detection -- the sender likely thinks it has been delivered. If it was a real virus, then the sender should be alerted that his or her system has been compromised.

The problem comes when new types of E-mail viruses change their behavior, as has happened with the klez virus, and with others such as "MyDoom." The virus infects a system, but instead of sending messages that clearly come from the infected machine, it sends messages with the "from" field filled in from another address found on the system (more info on E-mail spoofing here). That means if someone who has ever sent or received an E-mail message from me is infected, I might either receive an infected file from them but "from" another E-mail address, or someone else might receive an infected file that seems as though it was sent by me. In the latter case, the automated system kicks in, and sends me a message that my message was stopped from reaching its destination.

Why does this make a difference? Well, let's formalize it. The equation looks like this:

"Standard" E-mail Virus
Infects a system and sends n infected messages from that system. Each message is either accepted and leads to another infected machine, or is deleted without further effect. We can thus assume that the infection will multiply by the number of infected machines m:

   n x m = t1

where t1 is the total number of messages caused by the virus (though n here is variable depending on elements of the infected machine, including time connected to the Internet, type of connection, number of E-mail addresses in the address book, etc.). In any event, t1 is directly related to the number of infected systems.

"From field" spoofing virus
Infects a system and sends infected messages to found addresses; each message is accepted and leads to another infected machine, as above, or is handled in one of two ways: deleted either automatically or manually by the user, or, is deleted and a response sent to the spoofed E-mail address. Thus messages are sent by:
   1) infected machines m
   and
   2) non-infected machines that will never become infected r
Let's add the non-infected by responding machines r to the equation:

n x m x r = t2

In any situation in which r > 1, it follows that t2 > t1.

This is the amplification effect. Virus writers have learned how to use automated responses to amplify the effects of their infiltrations into compromised systems, sometimes to the extent that the corollary effects added by amplification are greater than the effects of the virus itself. Without ever having been infected, having taken all the appropriate steps and avoided the possible mis-steps, I now receive more messages telling me that a message that I never sent has not been received by a person to whom I didn't send it than I do actual virus messages. In all cases, the message is useless to me, but it amplifies the effect of the virus by utilizing systems designed to combat the virus to actually spread its effects further. This is the nature of the "new" viruses.

And so long as there are technological systems, my guess is that the amplification effect will be in play. And the possible response, the idea that static or even flexible system automated systems can somehow cope with this, that we can trust them to actually handle this kind of human ingenuity, is at the core of the trusted technology fallacy. Turnkey computer security? I don't think so . . .

16 March 2004

New Edition of the IJCLP Published 

posted by Rob @ 9:58:00 pm Perm Link
New Issue of the IJCLP Published

The new Issue 8 of the International Journal of Communications Law and Policy is online, and there's some really, really solid scholarship in it, including pieces on the Internet in China, EU regulation of software and expression, the German approach to illegal Internet content, institutional structures in communications regulation, information convergence, and liberalization of telecom services in the WTO framework. Papers and reports from the European eGovernment Conference for 2003 make up a special eGovernment section of this Issue. There is also a conference review of WRC-03, and a book review of Manuel Catells's The Internet Galaxy.

The Journal main page is here, the current edition here.

Go. Read.

11 March 2004

posted by oskeladden @ 12:01:00 pm Perm Link
The slippery slope to perdition

Making the US Congress look like a nice, left-leaning, consumer friendly body takes some doing, but that's precisely what the European Parliament has done with its vote on the piracy directive (the relevant portion begins at page 203 of the PDF). This has received a lot of coverage, but to my mind most of the discussion misses the point by totally underestimating what's going on. Four of the directive's provisions, when seen together with other recent developments, mark a shift in the law so profound that it has no parallel in recent times. Here's why.

First, the non-exclusion of consumers. The original draft specified in Article 2 that the Directive only applied to commercial piracy. By the time it was passed, this provision had been removed, and replaced with a recital which said that the Directive would not ordinarily have to be enforced against consumers acting in good faith. Yeah, right. As the drafters knew very well, in English law and most other legal systems a person who reasonably ought to have known that the material was copyrighted will never be acting in good faith in downloading the material without authorisation, even for personal use. This is so glaringly obvious that I wonder why they even went through the charade of making an exception.

Secondly, the remedies. Confiscation and destruction of any equipment used for infringement. Mareva injunctions and Anton Pillar orders for the asking against commercial infringers. A mandatory disclosure of all personal information known to anyone who's asked for it in the case of commercial infringers.

Thirdly, the position of intermediaries. Full interim relief available against any intermediary. No defences are stated to be allowed. Not even good faith. Non-compliance may be met with confiscation of equipment as above.

Fourthly, the role of third parties. Relief may be sought by professional bodies dedicated to the enforcement of third party rights, if they are generally recognised as such.

Now let's recontextualise this. Let's say that the European Parliament passed a law not about intellectual property piracy, but about thieves. People who're actually stealing tangible stuff, not just violating rights over intangible stuff. Should be less controversial, right? Except that if this directive were transposed directly to that realm, what we'd have would be something like this:

If a thief steals, his car can be confiscated and destroyed, because he drove to the scene of the crime in it. We can hire people who know how to do these things. We can freeze all his cash if he's been stealing a lot, and go into his house and grab all his property as security. We can even get the court to issue an order to all gas stations preventing them from selling him petrol. And all this is in additon to rights under criminal law.

How likely is it that such a law would be tolerated? Yet measures of protection that would be rejected out of hand for tangible property are being granted for intangible property. And it's this underlying attitude that's deeply troubling. Over and over again, the need for deterence is being emphasised. We're being told that the correct way for civil law to achieve its ends is through draconian punishment. But this is precisely the position our western legal systems have been moving away from for the past four centuries. Fundamentally, the idea is that civil law's goals are compensation and restitution, and the deterence of behaviour deemed undesirable by depriving the misfeasor of the benefits of such self-serving behaviour. Civil law should not resort to deterrance through punishment not aimed at compensation, nor will it condone vengence. With this directive, We've effectively thrown all this away, and gone back to a system that I can most charitably describe as mediaeval, and less charitably as something unprintable.

But this isn't the worst of it. As I said above, this directive marks a complete redefinition of how far the law can go to protect property holders, and how much property holders can do to those who infringe their rights. And it's not the only move in relation to bolstering the position of property holders. With the ever-continuing expansion of what is patentable, the unending extension of copyright duration, and the constant challenges to the idea of fair use, we're seeing an attempt to appropriate things that could never have been property in earlier times. The real problem isn't that we're not being given enough rights in relation to the new media. It's that our laws are taking away what few rights we've always had.

Dave Bolier drew some interesting parallels a few months ago in his excellent book "The Silent Theft", but the problem's much deeper than that. I don't see myself as being radical - I'm a commercial lawyer who became interested in the technology-related issues because of their importance to commercial law. But I'm still going to come right out and say it. I think that we're seeing the most drastic attempt to redefine property relations in society since the enclosure laws, and the most coordinated attempt to prevent challenges to existing producers since the corn laws. As then, basic notions of what measures the law is justified in taking are being redefined, and redefined in a manner that challenges fundamental principles of our legal system. In that society, immoveable property and agriculture were the focus. In the information society, intellectual property and multimedia are the focus. And I think the existing producers are winning for now, and will continue to win unless we take the kid gloves off and organise ourselves into a real, co-ordinated opposition.

21 February 2004

Presentation VII 

posted by Rob @ 9:06:00 pm Perm Link
Presentation VII

Prof. Alexandra George, Queen Mary Intellectual Property Research Institute, University of London

“Intellectual ‘Property’?”

Intellectual Property
  • Is it property?
  • Does it matter if it's property?
  • What does it mean to the rhetorical area in which we're operating?

    Emperor's New Clothes Analogy Applied to Intellectual Property
  • IP is the Emporer's New Clothes
  • Everyone is talking about something that doesn't exist, and everyone is afraid to say so
  • Though it may be socially constructed, it does have an effect
  • But the social construction has converted itself into law
  • It is a construct of society, and it is an important one
  • But if this really is imaginary, it is hard to get consensus

    Where does this lack of consensus show itself?
  • Ask PhDs in IP, "what is IP?" They do not have a clear answer
  • You can list what IP is in categories, but that doesn't tell you what it is
  • Allusion to property, and so it is merely intellectual property: not satisfying because it does not tell us anything
  • It is whatever the law calls it, but this does not give it substance
  • Function: can only see what it is by looking at how it operates (HLA Hart)

    The varied and unsatisfying way of seeing this shows how unclear it is
  • It is a rhetorical device used by those seeking to achieve certain ends

    IP is not property, it is regulatory
  • to see it this way, we need to look at its substance, not form
  • Session V 

    posted by Rob @ 8:25:00 pm Perm Link
    Session V

    Note: Technological problems prevented me from blogging this panel; I will seek copies of presentations from the below and post them as soon as I can.

    Prof. Christopher A. Cotropia, Tulane Law School

    “Claim Interpretation and the Patent Disclosure”

    Prof. Richard Gruner, Whittier Law School
    “Corporate Patents: Optimizing Organizational Responses to Innovation Opportunities and Invention Discoveries”

    Prof. Katherine J. Strandburg, DePaul University College of Law

    “Mining the Patent Database”

    Presentation VI 

    posted by Rob @ 7:14:00 pm Perm Link
    Presentation VI

    Prof. Shubha Ghosh, University at Buffalo Law School, SUNY

    “A Social Insurance Perspective on Privacy and Security”

    How do you talk about information privacy?
  • Information security breach (virus, worm, contaminates it, invasion or lack of failsafe that causes information to be taken by another)
  • Contract approach is a typical way to think about this
  • Property approach is another way to look at this
  • idea here is to look at trust and creation of institutions

    Example
  • Suit against Microsoft for creating system that is susceptible to information security breaches
  • consumer rights claims raised here, among others
  • we've usually thought about information privacy as about the nuggets of information privacy, but this is about the structure is also important

    Approach
    • Explain social insurance perspective
    • example of products liability approach-thought experiment
    • felshing out implications for legal reform


    Social Insurance Perspective
    • Defining Social Insurance Perspective
    • systematic versus individual costs
    • creation of trusted institution


  • elements
    • risk and uncertainty
    • liability and social cost
    • accountability


    Products Liability Approach

  • Product versus service distinction
    • Services are not standardized
    • service providers and insurance
    • service providers and professional regulation
    • information security as product not service
      • standardization exists in software
      • deep pockets not a bar
      • industry standard
      • analogue to products at turn of the century
      • restatement third: sufficiently analogous to distribution of tangible personal property


  • Who would be liable?
    • Traditional categories of manufacturer, retailer and distributor
    • software in a box
    • dowload software as manufacturer
    • ISPs
    • Programmers: apply traditional respondeat superior principles
    • Open source software


  • What is a defect?
    • traditional products liability doctrine: defining consumer expectations
    • manufacturing defects
    • desing defects
    • warnings


  • Other issues
    • consumer misuse and alteration
    • remedies for economic loss: other property


    Lessons from the thought experiment
  • Open source versus proprietary software
  • Hamilton complaint (from above)

  • Session IV 

    posted by Rob @ 5:30:00 pm Perm Link
    Prof. Lyrissa Lidsky, University of Florida Levin College of Law

    "By Any Other Name: Identity, Anonymity, and the First Amendment"


    New Title: "For What IT's Worth: A First Amendment Guide to Interpreting - and Sometimes Protecting - Anonymous Speech"

    Supreme Court protection for anonymous speech
    • being tested on the Internet for "john doe" speech
    • referred to as CyberSlaps: attempt to punish by uncovering identity
    • Past article, Silencing John Doe: must interpret internet speech must be read in context, including opinion doctrine

    What does identity contribute to a statement?
  • Why do we care who the real Shakespeare was?
  • It might change our understanding of the plays
  • it contributes authority to statements

    Thesis: We can sort good anonymity (supports free expression) from bad anonymity (fraud, others) by looking at the context of the speech
  • context can substitute for the identity fo the speaker (full communicative impact without identity); this probably won't work: it ignores motive of the speaker
  • If identity is such a strong componant, why would we protect it? MacIntyre v. Ohio does not give guidance or contribute very much to our understanding of anonymity on the 'Net
    • MacIntyre was fighting school board and printed out flyers
    • MacIntyre was in the "core" speech area, not false/misleading, and aimed at a particular audience informed on heated political issue
    • MacIntyre was handing them out
    • Got in trouble for violating Ohio election law (invalidated because of speech)
    • Did not need her identity to evaluate her speech


    Anonymity in Cyberspace:
  • It has a disinihibiting effect on speakers, but it applies to computer-mediated communication even if identified
  • This can lead to more bad speech, but may also be unnecessary (if incentive to be disinhibited is already met)
  • MacIntyre doesn't work here
    • must have an educated critical audience
    • Must have an audience that understands the norms of the communication


    Flaws in MacIntyre theory
  • What if "injured" person is not part of that audience, or context changes
  • Purpose of defamation law (for example) is to bring civility into speech, but Internet speech may lead to chaos because you cannot easily evaluate it
  • Danger of bleedover from Internet discourse into physical world discourse


    Prof. Laura A. Heymann, The George Washington University Law School

    "The Birth of the Authornym: Authorship, Pseudonymity, and Trademark"


    MacIntyre
  • Right was anchored in something that was almost literary in its analysis
  • Was not really anonymous, but had a statement of authorship, created for identification
  • Court was basically giving her a constitutionally protected choice between identities
  • State could not force her to make a true statement, and could not forbid the false statement

    How is this a literary analysis
  • Court could not treat the two choices of identities as equivalents unless they conclude that the statement of authorship doesn't tell us anything (or that it shouldn't)
  • We're talking about the right of pseudonyms, not anonymous
  • Statements of authorship may be used to avoid implications of authorship
  • Desire of authors to keep identities separate

    What does this mean?
  • We separate out our identities; it is a choice of the author, and we see them as different even if the names are the same (Shakespeare as author and Shakespeare as person)
  • So this is a branding choice, even if the brand that is selected is the author's name
  • It is an organizing mechanism
  • Trademark is also an organizing mechanism

    Dastar
  • When we run into authorship, we may have a copyright issue
  • Court went off track when it viewed the harm as author-centered copyright harm
  • It should have been viewing it from a consumer centered concept: a copyright concept

    Authornym
  • we have a number of works where the true creator is not given credit
  • As consumers of cultural commodities, we are used to this
  • Court in MacIntyre took the literary route through looking at the author statement as part of the content of the speech
  • But the reader is the filter of meaning in "reading"
  • In trademark, we don't look to what company wanted as to mark, but how consumers see it
  • Focault takes this tact in "What is an Author?" and argues it is that it serves to identify

    Law has not caught up with the literary theory
  • Authornyms seem to operate in the same way as trademarks
  • If they do, we probably want to serve the same goals (avoid confusion)
  • Reverse passing off claims have been applied to misattribution claims

    Dastar
  • Court got it wrong because it was thinking about the case from an author centered point of view
  • Did Dastar confuse the public by including a particular statement of authorship

    Concerns
  • How much do we want to import this authornym as trademark concern? We're already there.
  • Is this importing moral rights? It does not need to be seen this way . . .
  • Even in a trademark scenario, is the concern raised by the court (how do we ever stop in searching for the origin of a work) valid? Not really; trademark doesn't worry itself with this; it is about maintaining the integrity of the system of attempting to avoid confusion; keep the "statement of authorship" separate from the "



    Prof. Mark McKenna, St. Louis University School of Law

    “Identity and Autonomy: Towards A Rational Theory of Identity Protection”

    Identity appropriation: right of publicity seen as part of the right to privacy, based on Brandeis, and rights to control exposure
  • if you are trying to let private people to be private, it doesn't apply to public people
  • then based on Lockean notion of building reputation
  • value of identity is not by the celebrity, but by the response
  • You have interest in creating image, but value is in response

    But law doesn't follow this theory
  • Everyone gets right of publicity
  • Person suddenly appearing in Viagra advertisement: what would the objection be?
    • Right of privacy violation seems inadequate
    • Perhaps it's the association with a product
    • It's a question of control over associations
    • conclusions are made about what products/things you associate yourself with
    • this is the same for famous and non-famous
    • we should protect this aspect of autonomy, even if scope of protection may vary


    Claim should be when your image is used so as to make it look as though you endorsed the product

    Comments: questions
  • Do you want to focus on US audience or larger audience, especially as to focus on right to receive information

  • authornym relates to moral rights, there are interesting points there

  • Some cases may revolve around the "palming off" question
  • but it may be those cases involve people who cannot claim to have created the value

  • We can introduce Habermas here; it is about the circulation of texts, not the author; there is something to this here
  • This makes it different, not attributing any sense of meaning in and of itself, but it almost helps the effort in recognizing the shift

  • lines between identity, authorship, and names: people construct alternative identities online

  • Distinction between name and identity is important

  • More unreported comments . . .
  • Presentation VI 

    posted by Rob @ 3:54:00 pm Perm Link
    Presentation VI

    Prof. Adam Candeub, Michigan State University-DCL College of Law (beginning Fall 2004)

    “Trinko, Antitrust, and Network Interconnection”

    All comments are the presenter's; errors are the reporter's

    Trinko

    Basic holding: essential facilities and refusal to deal cannot be used against telcos, etc. where refusing interconnection for purposes of antitrust

    Scalia's opinion must be read narrowly
  • Court engaged in a very formalistic analysis; never asked important economic question of whether refusal to interconnect could be part of antitrust
  • Prudential concerns are misplaced

    Background
  • history of telecom developments
  • AT&T breakup, baby bells, telecom act of 1996
  • Since 1996, biggest problem has been interconnection

    Trinko
  • Trinko alleged that Verizon had an intention to block interconnection
  • Trinko alleged antitrust violation under refusal to deal and essential facilities
  • refusal to deal: monopolist cannot refuse to deal where dealing would enhance consumer welfare and enhancement is known to the monopolist
  • essential facility:where a monopolist has an essential facility

    Court
  • refusal to deal does not apply if you are not dealing with retail rates (these were cost rates) and to goods that were marketed
  • essential facilities doctrine is not applicable where there is a regulatory doctrine
  • biggest concern was pragmatic: this is not the role of the courts; too complex

    Analysis
  • Never examined underlying economics of refusal to deal
    • What anti-competitive strategy could a monopolist be engaged in when refusing to deal?
      • raising rivals' costs
      • vertical integration in response to bargaining constraints

    • Prudential concerns are overstated
      • regulatory agencies are not always best at this
      • agencies are subject to political capture
      • judges have less time to consider issues, more isolated, less information at times, but are more independent

    • Paper argues that we should not look to which institution is better situated to regulate this issue
      • Basic insight of Coase in "Firms" is to set out that size of firms and transactions, where we look at transactions that are information intensive, these are best done within a firm; simple transactions are better done between firms

    • What does that tell us here? Are courts or agencies better?
      • Look at the relevant transactions . . .
      • Interconnection at the long distance level was fairly straight forward, and was done by a judge
      • local interconnection is more complicated, and the transactions supporting them are complex, and is done by a regulatory agency


    Conclusion
  • Trinko must be read narrowly
  • Notion that courts cannot do the stuff is erroneous

    Comments

  • Perhaps Scalia ignored the literature, but for a reason; it may be difficult for courts to determine whether it is anticompetitive if we are looking at firm behaviour; and a court is trying to figure it out (with administrative costs including false positives); how does a court do this? Is there a way to do it? If the focus is on raising rivals' costs, the effect is on rivals, not on consumers
  • You wouldn't find too many economists who would believe that super-competitive rates are being charged; you would probably only have extreme cases; true, you must show effect on consumers; but, there is a dynamic efficiency argument, and you would not have to go so far

  • From Canadian perspective, there might be implications for patent, but not for Canada, as the patent/antitrust schemes are exclusive, but it could have ISP implications
  • definite implications here, as well

  • What about the Kodak case, and the "no previous course of dealing" issue (stopping an existing relationship)
  • Yes, but Scalia was concerned with refusal to deal in antitrust with some other motivation that is allowed

  • What's happening is shifting of the underlying baseline is, and we don't know who decides that issue; what is the underlying entitlement, and court is defering to Congress
  • Interesting as court often refuses to defer to congress in other circumstances; and if you're looking at property rights, courts are much better at doing it than agencies, but it's hard to fit all the pieces together

  • What about IM interconnection, does it fit in here somewhere?
  • It is possible, and it's part of the question; especially given that it

  • The complexity in local connection is actually a result of the 1996 Act, and so do we really want the de facto answer to be the courts are going to regulate (and set up) the telecommunications system; Chevron: courts should not get into regulation where the statutory setup is a mess; deference to agency decision-making on complex issues
  • It's not that, if it was just about the specific statutes or regulations and getting clarification or updates, it would be one thing; but the language of the court goes way beyond this; courts should at least do the antitrust analysis properly
  • Presentation V 

    posted by Rob @ 2:58:00 pm Perm Link
    Prof. Peter K. Yu, Michigan State University-DCL College of Law

    “Intellectual Property and the Sixth Estate”

    Fourth Estate is the newspaper estate, fifth estate is broadcasting. The sixth estate is Web media and Web logs.

    Internet was designed initially as another mass media medium. It has characteristics that make it useful: cheap, far ranging audience, interactivity. Advantages include potential democractic functions, as well as journalism. By allowing people to interact, they become more involved. A final advantage of the Internet is a new means of news media.

    The problem is the enclosure movement. Highlights of IP and Internet news interaction:
  • DMCA
    • Used in ways not intended
    • Has been used to infringe speech (take down provisions)
    • Locking up public domain data and preventing fair use

    Extension of the Copyright Act
  • extended to life of author + 70
  • limits choice
    Database Protection
  • sui generis protection
  • Have previously decided not to do it
    • under Feist
    • Not political

    Solutions:
  • Expand fair use exception
    • Under DMCA, ask for fair circumvention for news reporting
    • For term, ask for greater fair use in the extended period
    • Database exception: ask for news reporting/journalist exception
    • Copyright system can be a hydrolic system, and can be adjusted in both directions. You can always have offsets within the Intellectual Property system.

  • Reform the copyright system
    • Don't give rights if they are not necessary
    • Copyright should always be a limited monopoly
    • Practitioners don't see it this way: they see it as needing to draft patents properly to keep property from going into or being "donated" into the public domain


  • Work with journalists
    • We need to educate both journalists and other people
    • Many myths exist and journalists sometimes share them or spread them

    Future challenges
  • Deep linking is a challenge to Internet news
  • Annotation:
  • Customization
  • Concentration of the media
  • Digital divide

    Three Crazy Ideas about what is going on here (between recording industry and consumers)
  • Battle between humans and machines
    • recording industry trying to protect human jobs, machines are taking human jobs away by destroying intermediaries
    • But we lose jobs all the time: what we have today is very different from how things looked before
    • creative destruction allows for replacement and not just destruction

  • Preview of WWIII
    • Internet was created during the cold war to decentralize communications
    • If companies want to win the Internet war, they need to develop new strategies that may destroy portions of the network

  • Conquest of the Lost Generation
    • People will not understand what is going on until they get jobs
    • Worse, most elementary/high school teachers are teaching students to violate copyright (using Napster, for example)
    • If those who are educating don't understand, how can they educate properly?
    • Parents also don't understand

    One word to describe what's going on: Nostalgia
  • Everyone thinks about the good old days; hackers; copyright holders; both have to look forward and think about what they should do. And part of what they should address is the sixth estate.

    Comments
  • Ellickson's Shasta County article, and the idea of shared norms; here, everyone has different norms; some support legal system norms, some don't, but the fixes suggested work on the legal margins, and that will not change the norms
  • What is suggested is a short-term response, but we will also develop the long-term response like education regarding copynorms

  • But how does that relate to norms and law; doesn't law influence norms?
  • Yes, but not always directly, and not always in the ways anticipated: law cannot force norms

  • Databases and DMCA are not so
  • For small journalists, where information can be locked up, it could have a chilling effect, but we're not sure it is having that happen now

  • In terms of dynamic changes through technology, does it lead to an overall benefit or to a social cost; disco led to the end of local live regular musicians; voice mail led to lost jobs of secretaries; then you get to the point of asking whether people will be displaced by distance learning; clearly it (the Internet) is cost saving, but is the gradual move to technology is bad in eliminating craftsmanship

  • heard a shift in perspective half-way through; in terms of education and young people; have seen the other way of education (digital pledge not to violate copyright on the Internet); can the journalistic issue cut both ways? Can journalists use the claims of being journalists to go the other way?

  • From a Washington perspective, the strained political economy of the whole debate is interesting to watch

  • Publisher's guidlines in the 1970s: thought they were dead, but maybe they're useful

  • Databases are not static, person who has control of the database and exercises that control

  • Social norms can change when law changes the expectations, such as when law propertizes information ownership

  • Watch the one-sided view regarding how things can be exercised

  • Norms are under pressure: cheating has increased; and as dishonestly becomes more prevalent as a norm, doesn't that bleed over into copynorms?

  • A lot of really good literature on norms (Paul Graves), and the creation, evolution and destruction of norms, and especially consensus as a prerequisite to norms; Richard McAdams and Posner; very rich area

    Four responses
  • Trying to get beyond just copyright to IP and communications law
  • Focusing on interaction between norm and law, but we can throw in the technology (cut and paste, lying on the 'net)
  • Education is also important, and it can be wrong; the question is who will fund it and what they will say
  • Strange political economy: discrepancy in power comes from nature of computer industry
  • Presentation IV 

    posted by Rob @ 12:05:00 am Perm Link
    Presentation IV

    Prof. Jay P. Kesan, University of Illinois College of Law

    “Why Bad Patents Survive in the Market and How Should We Change?—The Private and Social Costs of Patents”

    Criticisms of PTO performance
  • Patent office doesn't know what it's doing
  • granting patently invalid patents
  • different claims within the same patent, some valid, some invalid
  • PTO does not have good idea of prior art, and don't spend much time searching for prior art (especially outside patent system)

    What is the patent system bargain: two stages
  • patent prosecution ($10,000-50,000)
  • examined, but not thoroughly
  • but then can later be taken away

    Quality of Issued Patents actually matters
  • legal system defers to examination process
  • social costs
    • supra-competitive pricing
    • Legal costs
    • Others


    Want people to get involved; two choices: at examination or re-examination

    Effects of patents on markets (economics)
  • Assume institutions are working properly
  • but they are not: iron triangle problem and fees for patent applications, no fines for wrongful issuance

    Focus of the piece
  • Understand institutions as a whole
  • Why do bad patents survive
  • how can it improve?
  • case study of dual system in Japan
  • focused on creating incentives in other work

    Why Bad Patents Survive

    Introduction of Patent Oppositions
  • Must make it cheaper to challenge in terms of the profit margin involved
  • Must be a low cost process to increase the universe of challenged patents
  • need to design the processes to reduce cognitive dissonance at the PTO (independent reviewer of decisions)
  • Limited estoppel effect to disincentivize delay and harassment through repeat filings

    Japan Approached it the Other Way
  • Since April 2000 there is a dual invalidation system (because of court ruling)

    Summary
  • There is a serious possibility of designing a system that incentivizes challenges
  • creating options and incentives for third parties to provide information
  • can create disincentives if patentee who loses patent after issuance has to pay costs

    Comments
  • What are society's costs? Rational ignorance problem . . .
  • Response on SSRN is "optimal ignorance"

  • Idea that patentee might get additional advantage from being in the business
  • this is true . . .

  • what does it mean for the District Court to invalidate the patent


  • What are the sources of invalidation? Is it an invalid description requirement


  • creating incentives for people to seek to invalidate patents, and makes it easier
  • the system is not perfect, and may lead to payments instead of opposition proceedings; we're talking about making marginal improvements

  • What are the statistics for ones that only went through JPO?

  • 20 February 2004

    Presentation III 

    posted by Rob @ 11:14:00 pm Perm Link
    Presentation III

    Prof. Adam Mossoff, Michigan State University-DCL College of Law

    “Spam—Oy, It’s Such a Nuisance!”

    Spam has been increasing rapidly. Individual spammers can send 250,000,000 spam messages per day. Injury includes not only direct damages, but education for users, customer service, and other indirectly related costs.

    Responses:

  • technological: spam filters have led to technological arms race, which increases costs to ISPs and users

  • Legislation: major lobbying effort led to CAN-SPAM Act
    • Essentially empty
    • Essentially a fraud measure
    • Provisions were eviscerated because of need to be able to use E-mail legitimately
  • Litigation: Intel case
    • ISPs are inviting people to use E-mail
    • Is not about exclusivity, and no real dispossession of the "chattel"


    Proposed solution
    Nuisance doctrine
  • What is it?
    Use and enjoyment of land: includes commercial use of land being infringed

    No need to engage in a legal fiction of dispossession of chattel

    Primary benefit
  • helps us identify the proper property entitlement at issue
  • fits better than trespass: we don't use trespass for snail mail mailings of catelogues, we use nuisance
  • it's a mis-use of right to be somewhere

    Comments
  • You are not inviting someone to spam you, but are inviting them to do what you've allowed them to do; Also, it is one legal fiction to another: what does infringement on right to enjoyment
  • Modern nuisance between nuisance and trespass; nuisance was a non-physical trespass . . . and the effects are substantial (servers, costs to combat, loss of chattels that would have been used toward revenue increasing activities)

  • Why not add a tiny cost to E-mail? For normal use, no real notice of cost, but for spammers might be enough to deter
  • ISP market is too competitive to be able to pass any of these costs, and unless all did it, it would not work

  • Nuisance law doesn't allow you to claim nuisance when "move to the nuisance"?
  • Most ISPs that are in existence ran E-mail systems before SPAM became a nuisance

  • What are we trying to achieve here? Why don't we get the spammers and make them stop? What is the vision or character of E-mail after SPAM is fixed?


  • SPAM does not compare to bulk-rate (and government subsidized through that bulk rate) mail; how do we deal with "regular corporations" and how do we prove harm?


  • This is a political economy question; businesses love spam as essentially cost free advertising
  • So how do we deal with this . . .

  • Nature of injunctive relief is important to private nuisance, in that it is a balancing of interests
  • This would solve some problems

  • But is it a public or a private nuisance
  • nuisance shifts the balance of who brings the action from user to ISP . . .

  • the corporations are probably actually supporting spam, while publicly speaking against it
  • true, and because it's costless, it makes profit even at very small return

  • Why not use public nuisance . . .
  • not sure it's going to fit, and not a clear question about whether it's public . . . don't want to go with public nuisance, as he wants case-by-case development, which is less likely to occur in public litigation
  • Session III 

    posted by Rob @ 9:47:00 pm Perm Link
    Session III [combining Sessions III and IV]


    Prof. Matt Jackson, Department of Communications, Penn State University

    “Rethinking Copyright: The Role of Intermediaries in Communication and the Law”

    Liability rules in terms of intermediaries in Communication and the Law
  • In one-way communication (broadcast), liability was imposed
  • in two-way communication (telephone, Internet), liability was generally not imposed

    Problem that the Internet poses for copyright is that it is a network (not that it is digital)
  • We are trying to use it for both one-way and two-way communication
  • This leads to conflict
  • can we create a network that facilitates both one-way (distribution) and two-way (communication); this is our struggle

    How does the imposition of liability standards effects development of resources by intermediaries
  • intuition is that way liability is imposed can turn system from two-way to one-way
  • Examples: in Australia, content being pulled from shelves on threat of liability;
  • Old US case: if you don't want to be liable for selling infringing records, deal with a reputable seller
  • In US, we say holding intermediary liable in defamation would chill speech, but still gets more protection than copyright

    In addition to liability, three prong strategy: liability, contract and technology
  • copyright owners use all three strategies
  • point is to set these out in examples
    • Hardware: DMCA is limiting the reach of the Sony case
    • Contracts: licensing agreements required under broadcast flag
    • End-users become intermediaries: different forms of liability may apply


    Hillel Sommer, Radzyner Law School, The Interdisciplinary Center (Israel)

    “Rethinking the Legal Protection of Television Formats”

    Some thought has been given to television formats
  • Cycle of thought of issue coming up and not being resolved
  • puzzling gap between economic reality and law
    • Significant part of production
    • Being sold worldwide at trade shows
    • opportunity to copy arises earlier

  • Market became much more global
  • easier to spot successful programs

    How does copyright fit into this?
  • copyright doesn't work to protect television formats
  • Copying formats hasn't fit well within the idea of copyright
  • unconnected use of phrases was not enough in format copying question
  • not dealing with trademark
  • not dealing with breach of confidence

    Howard Stern vs. ABC over format
  • Seven causes of action, but copyright is not there
  • ultimate proof that copyright doesn't work to protect format

    Fair Dealing or Fair Business Practices
  • Format infringement was found in Denmark (but not under copyright), but used the word "copying" in the judgment
  • not often available

    Leaves only sui generis, relying on catch phrases from patent area
  • distinguishable from prior art
  • non-obviousness


    Michael Landau, Georgia State University College of Law

    “Dastar v Twentieth Century Fox: Has the Supreme Court Granted a License to Pass-Off and Plagiarize Creative Content?”

    This case is the death of attribution . . .
  • Language about Lanham Act being in conflict with 106(a)
  • Act does not prevent unaccredited copying

    Film fell into public domain, Dastar copied and repackaged and then released it as Dastar as publisher, sued by TCF for false origination
  • "Goods" only applies to the origination of goods, and the good here is packaged and prepared by Dastar
  • Thus the Lanham act does not control this case because the of the nature of the goods
  • This is the most important trademark case to come down in ages

    Lars S. Smith, Louis D. Brandeis School of Law, University of Louisville

    “How IP Laws Can Discourage Innovation and Business Development”

    Basic idea came from reading Lexmark case
  • Idea to take law designed to stop scourge of downloading and copying, and apply it to code that was designed to infringe competition
  • Lexmark sells cartridges by "leasing" and giving back cartridge to Lexmark (for lower price), code is used to limit application
  • Static control produces chip to reproduce the code for refilled toner cartridges unauthorized by Lexmark
  • Lexmark sues under DMCA
  • Court issues injunction against it (likelihood of success on the merits)

    What is the result?
  • This would stop all competition in printer cartridges market; how did we get here?
  • Later case this arises again (replacement remote controls for garage door openers)
  • Trend is toward more control in IP related rights

    Wants to contrast this trend with Sega, where use of Sega trademark was approved, and the loss of leakage

    Possible solutions
  • mis-use (not used that well)
  • anti-trust (lots of people don't like this)
  • Possible answer short of statutory amendment: increase public interest standard in terms of injunction issues
  • give a damages remedy instead (this is a compulsory license agreement) where competition is appropriate
  • create an equitable defense for competition (inequitable competitive conduct defense)
  • give courts authority to combat absolute bar to competition

    M. Scott Boone, Appalachian School of Law

    “Rights in Virtual Objects: Contract or Property

    Why do we care about virtual objects (within massively multiplayer online gaming)?
  • societal value: economic value
  • examining alienability of these virtual objects can inform our discussion regarding first sale and digital objects
  • avatars collect things and sell them for real world money

    How does it work?
  • Avatars can transfer goods in real world money
  • Agree in game, transfer money in real world, transfer item in virtual world, transfer takes place on server

    First Sale Doctrine
  • Issue of alienability in virtual goods are analogous to first sale

    What does looking at this do for us?
  • no reproduction problem
  • understand series of magnetic/electronic bits (this may be a metaphor choice tool)
  • Tangible and intangible property is a difficult and confusing concept
  • looking at the reasons why we have these private property rights and copyright
  • raises questions of private property

    Comments
  • Some historical format cases do exist (comics, others)

  • but aren't television formats possibly protected by business methods patents?
  • the examination timing trouble

    I dropped out of recording the comments on this panel as I began to participate; sorry, I'm not much good at multi-tasking in both the real and virtual worlds at the same time!
  • Session II 

    posted by Rob @ 8:20:00 pm Perm Link
    Session II

    Mistrale Goudreau, University of Ottawa Faculty of Law (Civil Law Section)

    "Moral Rights and Freedom of Speech: Connecting the Dots"

    Moral Rights: Useful, Harmful, or uesless:

    Canadian scholars have been hostile to them; Berne Convention implementation has not been robust in the U.S. and UK (not adopting the French approach). ;

    USFrance
    U.S. statute: 17 USC Sec. 106A, Visual Artists Rights Act of 1990, prohibits "defamation style" distortionsFrench law (Article L121-1) includes distortion as interpreted by the artist; . French courts will not let artists go too far, but in principle it is the individual's choice
    waiveableNot easily wavied, but waiver may be upheld


    So do rights exist in the U.S. that are like moral rights, especially within the freedom of speech?
  • McEntyre v. Ohio Elections: Author free to disclose identify (analogous to right of paternity)
  • Person has right to control content of speech (compelled speech cases, right to remain silent cases) (analogous to of integrity)
  • Bartnicki v. Vopper: right to either speak when others want you to be public, but also right to be silent (right of divulgation)

    Can freedom of speech be waived? Yes and no; sometimes upheld and sometimes not upheld

    What about private intereference with freedom of speech? Not clearly regulated (only Red Lion)
    If we had a private tort for private interference with freedom of speech, you might have this . . .


    Margaret Ann Wilkinson, University of Western Ontario Faculty of Law

    "The Public Interest in Moral Rights Protection"

    Two questions
  • Why has adoption of moral rights lagged behind the adoption of economic copyright regimes?
  • Can moral rights serve an important function in the emerging global information economy?

    Sets copyright against technological development. Copyright followed "information containers" and distribution methods. Concludes that copyright bargain is a valid one in this context. Recent history of technological development is outlined, and following that leads to the finding that moral rights have a role. The appropriate role of moral rights is a bargain: give authors control so that audience gets knowledge of source. Paradigm of the moral rights does not fit all moral rights (such as the right of anonymity), though that should still be protected.

    Susan Scafidi, SMU Dedman School of Law

    "Constructive Iconoclasm"

    Borrowing from moral rights to talk about cultural property. Looking at the lifespan of cultural property, and the artificial creation of that lifespan. Destruction of cultural properties, drawing then on moral rights to explain reactions to the destruction of cultural property. Cultural property as images that represent culture. Iconoclasts do not despise icons, but they value them. Why is it that we (the international community) celebrate certain kinds of iconoclasm: toppling of statues of Lenin (more recently Hussein), yet protest other kinds of iconoclasm (destruction of the Bhuddas).

  • One reason may be the difference in perceived value (Bhuddas as works of antiquity, Hussein statues as not).
  • Utilitarian approach may help, Bhuddas were works of art, Lenin statues were utilitarian representatives of political power; but this also doesn't work, Bhuddas were religious
  • Political response: destruction of political symbols with a view toward reconstruction; this may be "constructive iconoclasm;"

    How do we determine what is "good" iconoclasm?
    Shared theories of intellectual and cultural property may give us some purchase. Borrow from IP for cultural property. In the context of iconoclasm, ask "who is the author" or "who is the community." Focus on the process of creation of these images.

    Statues (Lenin/Hussein): directed/created by political figures; given cultural meaning by citizens who lived under them.
    Bhuddas: community who supported their creation, or, since they are gone, the world Bhuddists community

    If this is the case, only the communities can "take them back." Taliban thus did not have this right. Authorship is located in the author or imagined community with the closest relation to them. If you ask the more traditional real property question, it would be harder to reach this conclusion.

    In terms of cultural heritage, the author or source community becomes the community interpreting the text. The decision whether to destroy (withdraw) an object would then be with the world community.

    International rather than national heritage gives greater international control, but this involves a contrary loss in national or local cultural control.

    Would this have stopped the Taliban from destroying the Bhuddas? No, they were outside the world system. But it does give a possible moral basis for discourse in the discussion of iconoclasm.

    Comments

  • What is the stopping point to the iconoclasm argument when you bring in modern icons and their protection within moral and economic rights? Isn't the idea of a world consensus just a fallacy? Does it exist, or is it really just another framework for political decisions?
  • The question can be restated: Isn't this just politically expedient? No, but this would be the purely aesthetic response; Susan is moving toward the more consensus building international model, where little would likely be destroyed. Where a national framework would be in place would allow greater autonomy locally; yes it is contextual, but we can still hope to attain some consensus: a supernational consensus. What about additional symbols? These should be retained in some form.

  • To the extent that culture is continuing evolving, why maintain past cultural icons? Will we begin to become global pack rats?
  • Culture is fluid, and this is one of the problems of trying to protect culture and knowledge; back to the Taliban, it was not their symbol, it was their property; when it has been taken out of its own culture, that raises the importance of the non-national (or international) approach.

  • False light tort, Cantrell case: free speech gives way in light of this, and it may be helpful; current Florida case about the movie "The Perfect Storm" not as a false light case, but as a right of publicity case (to avoid the loss of the false light tort at death)

  • How do you select which is the relevant community? Assuming that we're going to know the relevant community; assuming a consensus
  • where you can't, it wouldn't be destroyed; at least we would be able to have the conversation

  • readers as co-authors raise some interesting tensions in moral rights

  • What about the non-destruction, with the re-interpretation or appropriation of those icons (such as Lenin) instead of their destruction
  • This is first-order destruction, the author is destroyed but the icon remains and is reappropriated

  • Definition of moral rights changed during the discussion
  • Only international definition of moral rights that has been adopted is within Berne, and these are the ones we should focus on internationalizing.
  • Presentation II 

    posted by Rob @ 5:58:00 pm Perm Link
    Presentation II

    Prof. Jacqueline D. Lipton, Case Western Reserve University School of Law

    “Personal Property Security Law and Intellectual Property as Loan Collateral”
    (this presentation was originally scheduled for later today, but the schedule has changed a bit)

    Compares American approach with Anglo-Australian approach to Personal Property security law.
    Classified problems into two different groups
    • Risks inherent in dealing with IP generally (for generalist financiers); categorize IP in a way that makes sense for commercial people who don't deal with that on a regular basis in the regular course of their business;
    • To what extent does an Article 9 finance system solve all the problems?

    The second is the bigger point. Article 9 lawyers think they have dealt with it, but as commercial lawyers they may not have a full understanding of the implications of their categorization. So many problems, such as registerization, are still there. Sometimes the answer is to not take a security interest in particular knotty IP. If US commercial lawyers looked at English responses, some trouble might be avoided.

    Issue One: How do we categorize things helpfully and deal with risks
    Response has often been (in Australia and UK) we don't want to do it. It is starting, but is not strong yet. Rather than traditional patent/copyright, is rights that are clear property interests that are relatively easily transfered. This is what financiers are interested in. The legal formal issues are: is it property and can I deal with it? Commercial lender is not interested in theoretical property questions, but rather whether it has value and can be transferred. English approach of defining things are property may be helpful: it is property, it can be transferred in this way. Distinction between title exchange for security and equitable interest taken.

    Finding a property interest that is transferrable is central to that. This is not an issue under Article 9, which is a function over form approach. If it functions as a security transaction, then it is one. Maybe property question is not so important to creation of interest, but it may be on default sale.

    This leads to taking the approach that we can call it property if we know what it means.

    What are the commercial risk issues?

    • Harder to categorize
    • Might be designed around
    • Might only flourish with creator


    Categorization into legal and proprietary, with subsequent categorization between legal risks based on categorization and legal risks because of the nature of IP as a good.

    Compare statutory IP with "colloquial/common law IP; example: trade secrets (in the UK these are not property, are called "confidential information"), copyrights in software . . . advice is to not deal with them alone, but in combination it may be okay


    • Legal/conceptual: is it recognized as property, transferrable, etc.
    • Commercial risks: based on the nature of the right secured
    • Dual registration: detailed jurisprudence in the US; Canadians and UK are addressing it now; Australia
      • Where do you register? state Article 9 filing, federal IP register, company charges register?
      • In U.S., appears that you can register under Article 9, but that there is nothing that would stop you from transferring legal title on the IP register


    So maybe the answer is in the old forms of practice. Current inquiries are around whether to have a national register (Canada), in the UK they have tentatively concluded leaving them in the securities register.

    Is the question (where do we register) really the point? Or is it how you characterize the transaction? If a commercial transaction, then securities register. If it is dealing with property rights, then the IP register seems more appropriate. Mortgages are illustrative: if you create a commercial transaction by transferring title, then you don't need to do securities registration because the lender holds title.

    Legal mortages as the answer to IP security. The more control the lender exercises, the more risks can be controlled by the lender. It's all about control; the lender having the proprietary control, to be able to bring infringement proceedings, among other advantages. Maybe there are just some assets that don't belong in the Article 9 system, and where that's the case (and maybe that's the case with IP), do something else.

    Comments

    • U.S. did study this
    • U.S. study is available


    • Asset issues, where right comes about because of filing with patent office (for example), or federal copyright law, question is just about perfection of the security interest, and should it happen under federal law or state laws; the practical answer is, just file everywhere (this at least gets you protected); ninth circuit said federal if registered, but state if unregistered

      • Have always advised clients of this in the absence of some clear resolution, but it is more problematic in the U.S.; as to registered/unregistered, it is avoided elsewhere by not having a copyright register
      • Article 9 is great because things are spelled out, but we could do this with standard contract forms, as well, lowering transaction costs as well as article 9 does



    • security interests in licenses have been an issue in the US; where does this fit in?


    • Moving to legal mortgage is to get title is teaching commercial lawyers to be licensing lawyers; but this is taking a class of lawyers and retraining them (commerical to act as IP lawyers); bankruptcy issues may also be important in moving to a legal title system
    • this is always part of the problem, and sometimes exists within the same field; it's a commercial question, answered in the negative in UK/Australia in the rejection of taking security interests in IP; keep thinking about UCITA, and the need for them to speak together: the answer needs to be to draft a sets of laws that fit together (UCITA didn't work at this for various reasons)


    • Situation in relationship to copyright is a nightmare; perfection cases are all over the place, and incredibly complex, requiring belt and suspenders (file with everyone)
    • true, and due diligence required is very extensive and complicated; generally agree with everything you say, though in GB adoption of an article 9 type system would be easier because of no federal/state issues; but there are rights that may be missed (plant breeders rights, for example, in UK)


    • With regard to fitting IP into a category, it is a pretty general notion; are you ignoring that IP is a funny sort of property in respect of value and how it's determined; IP has a context specific value -- valuable to specific companies with ability to exploit it -- if patent is separated from company, it won't have that same value; has using patent cut the property too narrowly (like taking security interest in left shoe, not both); why not just take stock in the company?
    • Banks may not want to be seen as controlling companies instead of assets; in addition, other patents may have value outside of current situation.

  • As to Article 9 rules, as to where to file, there were rules relating to the location of the asset
  • This is now changed under revised article 9, it's at the state level, and it's not location of asset but now is location of the debtor


    • how do moral rights fit into this entire scheme?
    • Don't discuss them; do discuss it in other articles; always falling on the side that moral rights are property rights; think they are limitations on property rights; moral rights fix or limit property right


    • Patents and trademark are property-like, copyright is harder . . . maybe the security should be in something else that is relevant? performance rights, etc.
    • Interesting suggestion, but potentially more difficult (more education required for the lender)


    • Are the horror stories to tell about this?
    • Not a lot of empirical evidence, or even ad hoc, on this; the article is about the time being wasted on the issue when it might not be one (money wasted on law reform)


    • Your perspective is primarily commercial lawyers; to what extent should we think about promoting progress in science and the useful arts (IP policy)?
    • Not sure; needs further thought to put the two together; property is a transactional tool . . . fascinating suggestion


    • Article 9 explicitly mentions that IP is intangible property, but lots of other things that Article 9 says that don't deal with IP
      • classic situation is creditor v. licensor (licensor wants it back at bankruptcy)
      • depending on the form of IP, whole variety of routine issues for IP irrelevant under Article 9
    • This really should be a matter of good drafting of the charge document to begin with; the rules are not there, and so it needs to be spelled out


    • Is there evidence of any problems in this? Sounds like more of a lawyer's/academic's problem
    • This is a real issue, but we don't have empirical evidence; in Australia, England and Canada, there is the feeling that something must be done, and that all the bases must be covered; there is not litigation about most of this; also, writing this to say to those jurisdictions that think the US is the perfect model, that there are still issues in the US and it may not be perfect

  • Presentation I 

    posted by Rob @ 4:41:00 pm Perm Link
    Presentation I

    Prof. Michael A. Carrier, Rutgers Law School—Camden

    “Cabining Intellectual Property Through a Property Paradigm”

    If property is more limited, there would be less concern with calling information property. Four parts to the paper:

    Four parts:
    Propertization of IP
    Limits of Property
    Extrapolating to IP
    How IP can be limited

    Propertization of IP
      IP has come to look more like property rights in physical things. They have become longer, more exclusive, and more pervasive.

    Limits of Property

      Three paradigms based around development (including access, waste), necessity (including emergency, eminent domain), and fairness (limits promote equity).

    Extrapolating to IP

      IP is now considered absolute, which if not true for physical property, then may not be true for IP;
      Property works: if property works (in general), then IP could as well, to strike the appropriate balances;
      Utilitarian basis for property: no question of overuse (tragedy of the commons) in information, and so IP only has the incentive rationale to support it; and in IP, incentives are often other than IP rights (first mover advantage)
      Upshot: if limits are appropriate in property, with two utilitarian justifications, they are more so in IP with only one;
      Dangers more possible in IP; limits in IP can have effects outside of the property arena; to the extent that this is true, limits are more appropriate.

    Limiting IP

      They already exist: Generics and non-use in trademark law are quick examples

    What we do not have is new fundamental limits to IP

    • necessary fundamental fair use: uses needed for democracy (alternative viewpoints)
        How would this change things? Mickey Mouse alternative uses would be allowed; Free Republic would be allowed to include text from newspapers in its forums; Dr. Suess Cat-in-Hat version of OJ Simpson

    • Where necessity exists:
        Concern: present always seems more important when it happens than in hindsight, so a rigorous definition of emergency could be adopted;
        kinds of emergencies might be bio-terrorism attacks
        compulsory licensing with some royalty would be appropriate

    • Some others
      equitable fair use: whether or not a fair segment of the society is engaging in the behavior


    To the extent that IP is considered property, we are too late: it is. Now we should look to putting appropriate limits on it.

    Comments

    • There are more issues to talk about than two utilitarian justifications for property, and thus there is more to discuss than utilitarian to justify limits
    • It is too complex to try to address all issues and justifications, and will probably stay with utilitarian approach


    • How do things change when you do consider the broader picture?
    • The difficulty this applies to is how do we move from one area to another? Pick it up and apply it; Michael doesn't think this is very convincing. So he goes to necessity development in IP; there is nothing that automatically follows from this; there is slippage as to how it will work, and what doctrines will follow;


    • Doesn't a balancing test already exist in terms of the remedy? injunctions are balacing
    • Michael would rather have the balancing up front


    • Exceptions do exist in patent law; patent pools may exist; TRIPS public policy health exception;
    • Maybe some of these


    • When looking at ways to get incentives, it is not necessarily possible to choose just one, as long as market is competitive you cannot overflex your muscles; ex ante incentives will not necessarily be the same when substituted;
    • Michael is trying to look at the story of incentives, and, in the aggragate, it can be criticized, and we have these lessons that can be learned from that criticism


    • private ordering questions regarding property use
    • private ordering is important


    • leaving out moral rights is going to leave an entire culture out of the importance of the paper
    • this may be true


    • empirical claims: are these overstated?
    • they are based on US empirical studies, and there are contrary studies, as well


    • Should we look at the difference between producing cultures and non-producing cultures
    • Yes, we should


    • could we have the question be one of beneficial patents?
    • by definition, all patents fit the test, why question it second order?
    • distinguish between cat exercise patent and AIDS virus
    • but who is hurt by the cat exercise patent?


    • Fungibility in terms of copyright seems less troubling: no access to patent to save life and you die; not really true for copyrighted works
    • aggregate of copyright could equal problems in patenting, but not in the micro


    • Notion of transformative use, and parody, are questionable, and lead to a free rider effect; limited times for creation are not necessarily directly related to incentives; lots of people create without that; and they probably don't relate to things like publicity rights; all of this can be balanced by eliminating injunctions and move to determining what the damages are (which would also require losing fair use for free);
    • base limits in functional use, and compulsory license is another valid approach


    • real property is changing: non-use is now recognized to a degree in real property as valid (in regard to adverse possession); adverse possession may not be the right terminology; it is not a transfer of ownership
    • Michael belives this is covered within his framework


    • Should the question be whether patents increase dynamic efficiency? Isn't the answer "we don't know"?
    • Let's assume we don't know; but how would that affect the argument; patents are the necessary point to show that limits are necessary, but it helps the point to say patents are not necessary in all cases;


    • Transferring from one area of law to another, look at international law on this issue


    • What are the free speech implications of necessity in your framework, as well as problems of emergency in long-term illnesses; how do we limit the limits?
    • No need to limit the viewpoints; the more the better


    • Be aware of talking within the utilitarian framework that you are in one context
    • need to figure out how this fits


    Session I 

    posted by Rob @ 3:38:00 pm Perm Link
    Session I
    Debora Halbert, Department of History and Political Science, Otterbein College

    “Feminist Interpretations of Intellectual Property”

    Up front disclaimer: There is no general agreement on feminist interpretations of IP.

    Looking to how feminists would approach Intellectual Property from three perspectives: 1) epistomological 2) authorship and contextualism; 3) property itself; approach to the idea of property. How the law is written itself.

    Epistomology: knowledge construction; Firestone wrote about it in the 1970s. The feminist critique makes the argument is that knowledge has been constructed in a masculine way, and you must go beyond this and construct it anew. Investigation of craft labor, through the example of knitting as becoming commodified: how does the shift happen? Epistimological component from knowledge construction can lead to a new construction within feminism.

    Authorship and textual analysis: early copyright constructed within a male framework; women writers were seen almost as prostitutes. Hazlett thought women wouldn't even understand his writing. The question: Why was it necessary to set up reading, and knowledge and understanding in this way? This still exists as the staking of territory. Relationship of authorship is the key. Then bring in Focault and the deconstruction of the author: why did this happen as women were finally accepted as authors. Feminists are trying to find a middle ground.

    Property: decreasing boundaries in terms of property. Rethinking it from this perspective.

    Just starting to work on the textual analysis of bias in the text of the law.


    Michael J. Madison, University of Pittsburgh School of Law

    “Rights in Things”

    Hewlitt Packard inkjet print cartridge: "Intended for single use only. Not licensed for modification." Michael's not sure if it's binding, or why or why not. He wants to think about the tangible property question. Two things in looking at it as an IP lawyer: 1) it's not as weird as looking at it from a conventional property response; you cannot put a servitude on a chattel. But the conventional IP understanding of tangible/intangible is focused on the difference between the creator and the created; then the updated policy justifications for IP and first sale, etc.. But much of the world has gotten away from the dualist approach: we define the things in law and we moved away from the idea that there is an actual "thing" that we are simply applying law to. If this is true, why can't we say, "I've created a limited use print cartridge"? What if HP created the cartridge so that it was not useful physically after the appropriate amount of use? That would be okay. If HP can do that, why can't HP put the legend that defines that thing the same way?

    Our intuitive reaction as IP lawyers is that we should be able to do with it as we want. But software licensing works essentially the same way. Restrictions are also placed on the "physical thing" in terms of the code. The point of the paper is to figure out the answer to one of two questions: 1) maybe we need a different or better way to distinguish tangible/intangible; subject/object. Or, maybe we need to do a better job conceptualizing what "things" are.

    Robert A. Heverly, The Norwich Law School, University of East Anglia (U.K.)

    “Intangible Property: Oxymoron or Reality?”

    My piece is focusing on notions of how IP is treated as property, especially considering differing conceptions in different countries. The traditional idea of information as property is more firmly established in the UK than it is in other countries (to be updated later, as I was presenting rather than blogging).


    Comments:


    • The nature of the framework (linguistics as important, but not an end in and of itself);
    • The idea of women writers and anonymity (women taking male roles); women as property, women's stories as property; is it that women's creations were not covered, or that they may have gotten other coverage (such as that the design was covered)?
    • Was it that there was an underrepresentation of women as authors, artists, etc., and that women reacted to that and wrote as men because they thought they would be better accepted; or was it that there were not the appropriate areas for coverage, and it seems to the commenter that it was the former.
    • Property is often seen as being absolute, but that's just not accurate historically, and it's actually limited and contextual.
    • Go beyond the idea of contextual framework of language and include cognative aspects to acknowledge that people experience things differently even within the same contextual framework
    • Are we asking the wrong question; maybe it's not this versus that, thing versus not-thing, property versus commons, and that we need to ask another question to find what the hybrid may be
    • What is the question are we asking, and what does it mean? Is there tension between wanting to question
    • We should acknowledge that the economic argument for licensing restrictions on physical things only seem to go so far, and we should be cautious of that;
    • Real property rights are maleable; property right in divorcing spouse's income (courts call it a property right)
    • Post sale restrictions are well-known; software; seeds are another one; what is the difference to others?


    Blogging "First IP and Communications Law and Policy Scholars Roundtable" 

    posted by Rob @ 2:10:00 pm Perm Link
    Blogging "First IP and Communications Law and Policy Scholars Roundtable"
    So we're here, and all set up, and getting the introduction from Dean Terance Blackburn. I noted to one of the workshop participants, and I should note to you. I'm not the official (or even unoffical) workshop secretary. Secretaries are supposed to be accurate. I'm playing more of a journalist's mode; accuracy may suffer accordingly. What that means is that if things seem wrong, or don't make sense, that's my fault, not the panelists!

    17 February 2004

    Blogging the IP/Comm Law Scholars Workshop 

    posted by Rob @ 4:53:00 pm Perm Link
    Blogging the IP/Comm Law Scholars Workshop
    Peter Yu at Michigan State's Detroit College of Law is hosting a workshop for IP and communications law scholars [pdf] on Friday and Saturday, and has agreed to let me blog it. There are some really interesting people with some really interesting papers going to be there; some people in particular I am really keen to meet, but honestly I just can't wait to spend some time with the whole bunch of them! I'll be participating, as well (presenting an early draft of a piece I have on information as property . . . or, as not-property).

    Watch this space on Friday and Saturday for updates of the discussions, as best as I can capture them. Of course, it's not an "official" record, but hopefully it's the next best thing to being there!

    13 February 2004

    posted by oskeladden @ 12:09:00 pm Perm Link
    Raising the obviousness threshold for patents

    Some musings on Microsoft's new XML-related patent, which has blown up quite a ruckus on Slashdot and elsewhere.

    On the face of it, the patent's description is innocuous enough. Microsoft's method will consolidate scripts written in different languages into an XML file, and add tags to the file which contain the script's name, language and a brief description of what it does. The file will be parsed, and its contents presented to the user in the form of a menu or some other system enabling selection. The script selected by the user will then be extracted, and passed to the appropriate interpreter. So goodbye to the days of hunting for that old shell script you wrote in 1978: all shall be neatly organised and menu-driven for you. And for those running corporate intranets or even webservers, here's a great new sparkly way for you to bring together scripts which you want end-users to be able to run.

    So why am I grumbling?

    The answer lies in software history. Right from the early days of UNIX, scripts have been identifying their language through a tag (#!bin/sh, #!bin/ksh, #!usr/bin/perl, etc), and the OS has been passing them to the appropriate interpreter. Most UNIX systems don't hold different scripts in the same file, but as pointed out by one of its developers in a discussion on this patent, ALL-IN-1, the 80s' favourite office automation tool did hold multiple scripts in different languages in the same file, together with each script's name, language, description and a rudimentary help system; all of which was presented to the user through menus. And if you take many of the macro packages that extend Emacs' abilities apart they're - surprise, surprise - organised in the same way.

    So here's what's new in Microsoft's patented technology: they use XML to do this more efficiently.

    Now, it seems to me that even without ALL-IN-1, this is an exceedingly "obvious" application of XML, given that HTML has had a <SCRIPT LANGUAGE> attribute since the days of Netscape's original specification for LiveScript (the precussor to JavaScript), which was to be used, amongst other things, for permitting HTML to be compatible with scripts written in one or more scripting languages (a similar technology was actually used by Netscape's Certificate Server to serve out VBScript to IE browsers and JavaScript to Netscape browsers). But there's a bigger issue at stake here, which just underscores how problematic the whole area of software patents is. Effectively, what the patent office is saying in cases like this one is that if you're the first person to think of using a particular feature of a programming medium in a particular way, it's non-obvious and you're entitled to a patent.

    Is this an appropriate way of determining obviousness in relation to computer software?

    I would say that it is not. First of all, there's a huge difference between a medium like C++ that's been around for a while, and newer programming media like XML. If someone figures out a genuinely new way to do something with C++ now, it's pretty likely that it's not obvious. But this isn't necessarily so for XML. XML hasn't been around for that long, it offers a whole range of new possibilities, and it's not unreasonable to say that people wouldn't have gotten around to even using all its obvious features. Just because it hasn't been done before in XML, it doesn't mean it isn't obvious, particularly where - as seems to be the case with the patent in question - it's been done before using other programming media.

    Secondly, and more fundamentally, it creates a rather disturbing situation when you look at the way software standards such as the XML standard are arrived at. Many standards bodies - such as the W3C - require companies to agree not to charge royalties for technologies that are incorporated into standards. What patents such as this in effect do is to give companies a way of circumventing this - whilst pretending to keep the technologies themselves patent-free, they are free to patent the most important applications of the technologies thereby making them virtually useless to the programming community at large. Microsoft, for example, has repeatedly pledged to keep the XML standard royalty-free, while continuing to file for patents over several applications of the standard. If other companies are following suit, it looks like we can expect a rash of patents over various core applications of XML whilst preserving the façade of keeping the standard itself royalty-free.

    This problem isn't going to go away, since software patents look like they're around to stay for the foreseeable future. In the course of next week, I'll post explaining why I think raising the bar of "obviousness" can help mitigate some of their worst effects, and avoid the more absurd and damaging effects of patents on new technologies. In the meantime, I'll leave you with the thoughts of a programmer on an XML Developer's forum, who wondered what the software industry would look now if the very basic techniques of programming, such as using a stack to store subroutine calls' return addresses, had been patented. Well, if patent law continues dealing with new programming media and technologies as it is currently doing, we might just have the answer.

    07 February 2004

    To Copy or Not to Copy 

    posted by Rob @ 11:32:00 am Perm Link
    To Copy or Not to Copy
    In the ongoing discussions over control of information, we all start with certain basic premises. Some of these later become explicit, while others remain unspoken. At times both kinds can undermine our conclusions: Anyone investigating the world when it was thought to be flat (an explicit premise) would have run into this effect. But implicit premises can have this undermining effect, too, and sometimes with more pernicious effect.

    Some of the most interesting conversations on copyright in the United States flow out of a discussion about how much use individual users should be allowed of information goods, whether they've purchased them or acquired them in some other way. Commentators have followed the premise to notions like this one: when law provides protection to the owners of information goods to "lock up" their goods through technology, the law is actively shifting rights from users to owners. This is especially true where the "goods" include information that is in the public domain (ie, goods which do not need to paid for to use). In such a case, users are actively deprived of their rights, the theory goes. Duke Law Professor James Boyle refers to the attempts in U.S. copyright law to restrict use of the commons as the second enclosure movement [pdf]. At broad levels, this is an argument that individual use of information is necessary and perhaps even inherent (an argument I myself have made in at least some form here, but on a different premise).

    This idea is ingrained in the American pyschy. It's led a lot of people that I really respect to say things that, to me, made a lot of sense. But then I moved here [more specifically here to teach things like this here]. And the perspective from this side of the ocean has made me see how much I had bought into some basic and unstated assumptions about the nature of copyright. And since this is something I think about (the nature of copyright and information ownership, that is), I've become more intrigued as posts have gone up recently surrounding these issues.

    Within this "shrinking of the public domain" thread of discussion, Mary Hodder at BiPLaW picked up on the Cory Doctorow/me discussion over the "postman whistling" licensing issue (she actually picked up on it in a rather timely way; my response here is very, very late). And her response is the one I would have had not one year ago:
      I can't help thinking that it's utterly ridiculous that we are even discussing whether the Post Office need obtain licensing for postmen whistling tunes while working. I mean, what is the point here, what is the idea, what is the need? The postman is on duty, walking down the street, delivering mail, not performing on stage for money. He's entertaining himself. Is it the fact that he's singing while on duty, and there's the possibility of obtaining some sort of fee from his employer? Is it a desire for money, or a desire to control the content? I realize the statement is that licensing is unnecessary, but if they are thinking about it, it means they have some concern, the issue has come up, someone somewhere expressed a desire to control or profit on postmen whistling or someone somewhere thought they might violate a very tight reading of the copyright laws. The fact that this has to be clarified officially, formally, demonstrates how far tilted incumbent content control has become.
    Excellent point, appropriately indignant. Others thought so, too. But what it makes it more interesting to me given my current geographic proximity is the likely perplexed British response.

      "There is no general private right of use in copyrighted works," the British scholar would say.

      "What's that?" you say, mixing again the appropriate amounts of incredulity and indignation.

      "That's right," would come the response, "in the UK, there is not -- and has not been -- a private use right. It just hasn't existed. Why should one person be able to use another person's work, their property, without the owner's permission? The postman 'whistling' the song is using the song creator's property, and any use, even private, is use."
    And they would be right, at least as to their understanding of the law. English law spells out only a limited exception to the exclusive rights of copyright owners. The "Government-backed home of UK Intellectual Property on the Internet" states that "limited use of works may be possible for non-commercial research and private study, criticism or review, reporting current events, judicial proceedings, teaching in schools and other educational establishments, not for profit playing of sound recordings and to help visually impaired people." And in determining copyright infringement, UK courts are particularly unfriendly toward the use of another's work as the starting point for one's own work, even if the later work looks quite different from the original.

    So what's different in UK law as compared to US law? A provision (constitutional or otherwise) allowing general private use. The limited private use rights in UK law are explicitly defined. Fair use as it is understood in the US doesn't exist in the UK; the exception here is called "fair dealing," and it's just much more limited than fair use is. It's been that way; Section 6 of the Copyright Act 1956 (unfortunately not available on the Web), included fair dealing exceptions only for private study, review and criticism, reporting, and a few other esoteric things (like reading a short excerpt from a book in public). The Copyright, Designs, and Patents Act 1988 carries those provisions forward. There's nothing essentially new in it. And what was in the 1956 Act was carried forward from Acts prior to that (actually, finding repealed versions of law here in the UK is a royal pain in the neck, pardon the pun).

    Absent being within one of the stated exceptions, there is no private use right. This is not a new development; it's not a result of Disney (however much I'd like to blame them). Go back to the Statute of Anne . . . works subject to copyright protection are called "property." This is not a new conception on this side of the pond. It hasn't been hard fought by modern content industries trying to consolidate power. It's been here: Copyright law protects someone's property. You may disagree with the theory behind it, you may object to the classification, but you really can't argue with the fact that it's been here (in England) for a long time, and that once we admit this fact, it changes the nature of the discussion. If copyrighted works are someone's property, then use of them is use of someone else's property. Again, you don't have to agree with this to see that it is generally accepted here, and law and policy have been made that accept it clearly as a premise. England is not the U.S., where considerations of freedom of expression have predominated since the founding of the republic. Here, copyrighted works are property, and they are protected, conceived of, and understood as such.

    So what does this mean? The notion of copynorms might help [those being informal attitudes about the rightness or wrongness of duplicating material that is copyrighted--see also, Wikipedia's definition here]. Copynorms in the U.S. are often intricately intertwined with US ideals of freedom of speech; copynorms in the U.K. are premised on the notion of works as property. It's a completely different ideal. And so refrains such as "information yearns to be free" have limited application in the UK (but don't read that to allow generalization of the "no private use" to other European nations; Germany, for example, has constitutional protections for private use of information). Arguing here in the UK that "it's all about distribution" or for a concept of "normal use" are likewise a non-starters. You can't take the "copy" out of copyright here; it is about copying.

    So are the English forever stuck in a world of non-use, limited creation and mini-automated-instant-micro-payments? I doubt it; but the context [history, law, norms, culture] shows us a need for the debate here to be different. What should that debate be? Should we be arguing for a commons? Arguing against further expansion of property rights (in terms of length, given that there is not much possible expansion left in terms of rights)? Arguing for greater personal autonomy? Arguing for general personal or "normal" use? That seems to be the question of the day for the UK, but it i's a very, very different discussion from one in which it is argued that personal use is being taken away, both substantively and rhetorically. As we all know, when it comes to rights, the status quo is very hard to change. And changing it, not defending it, is what must happen in the UK. Understanding this point is critical to making the debate here (and abroad about here) more useful, progressive, and forceful.

    I should note here that I am not a copyright enthusiast; I believe strongly in the potential of computer processing power and network connectivity to turn consumers into users [pdf] and enhance the creative opportunities for people worldwide. I am, in that respect (and in others), a Benklerite. That said, we still need to take context into account when deciding how to proceed. I'm not sure what the next step is on this side of the pond, but I'm open to suggestions [if only our university would see fit to give us server space for this blog, we might actually be able to have comments; but for now please just E-mail me if you have ideas], but I know what the next step is not. It is not going on about how copying is not important; it is not going on about the increasing power of content providers; and it is not looking at everything through the lens of American copynorms. Taking into account English history, and particularly the history of copyright in this country, will be central to opening up use rights in the UK.

    So, shall we take the next step?