Predicting Patent Litigation

Colleen V. Chien

90 Texas L. Rev. 283

PDF Document

In this article, Professor Colleen Chien examines if, and to what extent, a patent’s acquired characteristics can be used to determine whether that patent is likely to end up in litigation. Although only around 1% of patents are ever litigated, patent lawsuits are disruptive and costly. Furthermore, their unpredictability makes patent litigation a practically uninsurable risk, causing companies to expend valuable resources accumulating patents that they believe might be asserted against them in the hope of preventing future litigation. To determine whether a patent’s acquired characteristics—those qualities that a patent develops after its issuance—can be used to enhance the predictability of patent litigation, Chien examines the relationship between eventual litigation and several acquired characteristics: changes in ownership, continued investment in the patent by the owner, collateralization, and citation to the patent.

Finding that litigated patents have markedly different acquired characteristics than unlitigated patents along all dimensions studied, and that these characteristics develop prior to litigation, Chien argues that acquired characteristics can be used to develop models that will enhance the predictability of patent litigation. She also asserts that, by highlighting the relationship between a patent owner’s identity and the likelihood of patent litigation, her findings argue in favor of reforming the patent-notice system to provide better information regarding patent ownership and transfer status in order to enhance the predictability of patent litigation.

Substituting Substantive for Procedural Review of Guidance Documents

Mark Seidenfeld

90 Texas L. Rev. 331

PDF Document

In this Article, Professor Seidenfeld looks at issues concerning how federal agencies issue interpretive rules and policies and how courts respond to such documents. Seidenfeld looks at how scholarship has focused on procedural impediments to the issuance of guidance documents. While he concludes that those who favor giving agencies more leeway to use them have the better argument, this argument is incomplete. While a number of scholars have attempted to transcend the debate and have suggested solutions to agency abuse that do not depend on courts finding defects in agency procedures, Professor Seidenfeld argues that these solutions are also imperfect.

Instead, Seidenfeld proposes to shift the debate from one of procedural requirements to one of substantive review, concluding that this approach preserves agency flexibility and encourages agencies to still solicit outside input.

The Failings of Education Reform and the Promise of Integration

Wendy Parker

90 Texas L. Rev. 395

PDF Document

Professor Parker reviews Five Miles Away, A World Apart by Professor James E. Ryan.  That book examines the persistence of de facto segregation in modern American schools. In this review, Parker summarizes the problems with current education policy that Ryan identifies.  Specifically, she observes how policy makers have taken a “save the city, spare the suburbs” approach to educational reform which has resulted in widening racial and economic disparities between urban and suburban schools. Though Parker recognizes that these policies have harmed urban educational outcomes, she is critical of Ryan’s proposed reform, which calls for implementing a parental-choice voucher system in less affluent school districts. Parker argues that Ryan’s proposal shifts too much responsibility for reintegration to parents and assumes that most parents will have the forethought to value the common good when making decisions about education. Though Parker lauds Ryan’s proposal as “compelling,” her review provides a measure of balanced skepticism against Ryan’s proposal.

Making Room in the Property Canon

Bela August Walker

90 Texas L. Rev. 423

PDF Document

Professor Walker reviews Integrating Spaces: Property Law and Race, by Professors Brophy, Lopez, and Murray. Professor Walker explores how the book addresses a major problem with most property curriculum—while race is a major issue in property law, it is unaddressed in law school curricula. While Walker commends this monumental effort to confront the intersection of property law and race, she criticizes it slightly for its omission of Cheryl Harris’s Whiteness as Property and its lack of discussion of the concept of whiteness at all. Walker concludes that while this book is an excellent resource and could contribute to any property course, in an ideal world, it would be unnecessary, as such topics would already be a part of a first-year property curriculum.

Moral Rights: Well-Intentioned Protection and Its Unintended Consequences

Lindsey A. Mills

90 Texas L. Rev. 443

PDF Document

Lindsey A. Mills analyzes the issues and implications surrounding Congress’s enactment of the Visual Artists Rights Act (VARA) in 1990, which, inter alia, provides moral rights protection to creators of artistic work. Although Mills recognizes certain social benefits associated with the protection of moral rights, particularly the incentives to promote artistic creation and society’s right to preserve irreplaceable works of art, she argues that such a law, by taking away ownership rights that purchasers of artwork would otherwise have, diminishes the economic value of the artwork in question and further, to the extent that artistic expression is deemed desirable, harms society as a whole. After weighing these interests against each other, she concludes that moral rights protection has no place in the United States, let alone as part of the Copyright Act.

Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate

Karson K. Thompson

90 Texas L. Rev. 465

PDF Document

In this Note, Mr. Karson Thompson explores the vulnerability of America’s internet networks and the various proposals that have been made to solve the cybersecurity problem. Thompson explores the history of the Internet—from its inception as ARPANET to its current status—and the major security issues that plague it.   He then discusses the role played in maintaining internet security by both the executive and legislative branches of government and proposes a new framework—one that takes power away from the executive as a means of ensuring a stable and transparent cybersecurity policy. Thompson concludes that the existing framework is an ineffective way of ensuring the security of the Internet, and recent events in Egypt should provide an impetus for reform.