Santa Clara High Technology Law Journal

Articles from Vol. 25, No. 2, January

Data Breaches: What the Underground World of "Carding" Reveals
I. INTRODUCTION A. Large Scale Data Breaches The term "data breach" is generally and broadly defined to include "an organization's unauthorized or unintentional exposure, disclosure, or loss of sensitive personal information, which can include...
Efficient Definition and Communication of Patent Rights: The Importance of Ex Post Delineation
I. INTRODUCTION: THE PROBLEM OF DEFINING THE SCOPE OF PATENTS In many respects, patents comport with traditional notions of property. (1) Patents can be owned, bought, sold, and licensed. Patents can also be incredibly valuable assets, as shown...
Implied License: An Emerging New Standard in Copyright Law
I. INTRODUCTION There are two basic truths about copyright law: it is an area of law in which a complex web of interests must be reconciled, (1) and it is an area of law that is constantly challenged by rapid technological developments. (2) The...
Is the Use of Patents Promoting the Creation of New Types of Securities?
INTRODUCTION In the last few years a renewed interest in the validity of patenting business methods has emerged. The issues appeared to have been settled in 1998 with the State Street Bank and Trust Co. v. Signature Financial Group, Inc. decision....
Virtual Third Parties
In virtual worlds, where 20 million people spend $200 million each year, (1) rules of life are governed by contract, (2) and three-party transactions are ubiquitous; every exchange of virtual cash, property, sound, pictures, and even conversation introduces...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.