Open Ahmed Alrawi Thesis.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Open Ahmed Alrawi Thesis.Pdf The Pennsylvania State University The Graduate School A PROPOSAL FOR A LAW TO PRESERVE AND PROTECT DIGITAL PRIVACY FOR AMERICAN CITIZENS A Thesis in Media Studies by Ahmed Alrawi 2021 Ahmed Alrawi Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts May 2021 The thesis of Ahmed Alrawi was reviewed and approved by the following: Benjamin W.Cramer Associate Teaching Professor Thesis Advisor Ford Risley Professor of communications Patrick Parsons Professor of telecommunications Anthony Olorunnisola Professor, Associate Dean for Graduate Programs and Research ii ABSTRACT The problem of third parties, such as telecommunications and digital media companies, sharing people’s private data with government agencies like the National Security Agency (NSA), has become more common in the Internet era. Private data like Internet search histories, contact lists, phone and video calls, pictures, health information, and so on are shared with the government by third parties. Such conduct leads to people’s private data being unsecured and accessible to government security agencies. Thus, a real problem exists when third-party companies share people’s private data. In addition, third parties are sharing people’s private data with the government without asking for a warrant. Such conduct has resulted in a change in the application of the Fourth Amendment and the search and seizure process. Hence, lawmakers are not sure how to deal with third parties when applying the Fourth Amendment to solve privacy issues. Therefore, this thesis posits the problem of data privacy and the Third-Party Doctrine on the Fourth Amendment to the public, as well as encouraging the federal lawmakers to establish a law to stop the sharing of people’s private data. Furthermore, this thesis proposes a new law called the U.S. Digital Privacy Protection Act that aims to solve the data privacy issue in the United States. iii TABLE OF CONTENTS ACKNOWLEDGEMENTS ..................................................................................................... v Chapter 1 Introduction ............................................................................................................ 1 Chapter 2 Literature Review ................................................................................................... 12 General Overview of Scholars’ Work on the Data Priavcy Issue .................................... 12 Scholars Works Regarding the USA PATRIOT Act ....................................................... 14 Scholars’ Work Regarding the USA Freedom Act .......................................................... 21 Scholars’ Work Regarding the Third-Party Doctrine ...................................................... 23 Scholars’ Work Regarding the New Digital Devices....................................................... 26 Chapter 3 Historical Analysis of Search and Seizure and Phone Service ............................... 31 The English Experience of Search and Seizure ............................................................... 32 The American Experience of Search and Seizure ............................................................ 36 The Development of Telecommunications from Landline Phone Service to the Internet and the Legal Challenges that Resulted ...................................................... 38 Chapter 4 Legal Analysis ........................................................................................................ 44 Katz v. United States ........................................................................................................ 44 Smith v. Maryland ............................................................................................................ 47 American Civil Liberties Union v. Clapper ..................................................................... 52 Klayman v. Obama .......................................................................................................... 56 Chapter 5 Discussion .............................................................................................................. 65 Proposed Law—U.S. Digital Privacy Protection Act (U.S. DPPA) ................................ 73 Bibliography ............................................................................................................................ 78 Court Cases .............................................................................................................................. 85 iv ACKNOWLEDGEMENTS I would like to express my gratitude to my advisor, Dr. Benjamin W. Cramer, for the support and guidance of my thesis research. Dr. Cramer’s knowledge and expertise directed my thesis on the right path. I could not imagine my master’s research without Dr. Cramer’s assistance and supervision, and I feel I am lucky to have him as my advisor. Additionally, I would like to thank Dr. Ford Risley for his assistance, patience, and motivation in my thesis research. Dr. Risley’s efforts encouraged me to include essential material in my thesis research. I am lucky to have one of the experts and eminent professors in the field of mass communication history. Further, I want to express my sincere thanks to Dr. Patrick Parsons for the direction and feedback, which led my thesis to a safe harbor. I am also lucky to have Dr. Parsons, who is one of the pillars of the telecommunications field in the U.S. and the world. Lastly, I would like to thank my late father, my mother Nahidah, my sisters Deena and Dr. Zeena, my brother Dr. Zaid and his family, my lovely wife Cigdem, my son Alibartu, my mother-in-law Leyla, my father-in-law Kemal, and my brother-in-law Ozan. v Chapter 1 The Third-Party Doctrine Most Americans live in a world surrounded by more electronics and sophisticated digital technologies. These sophisticated technologies are characterized by the fact that they store all types of data for users, including health data, social security numbers, and other types of data related to the citizenry. In the end, different types of data are brought together, thus providing a detailed picture of the lives of each and every individual. In looking closely at American law, we find that little protection is provided for the privacy of information for those electronic activities.1 Furthermore, sharing people’s private data with government security agencies may be a violation of the Fourth Amendment.2 The repercussions, when the government has personal information, might be dangerous. This is because government employees, like security ones, might misuse people’s private data when they obtain it. For example, government security employees might misuse the information obtained about specific people from a specific race or minority group against them, so people might be under extra scrutiny even though they are, in fact, innocent. The so-called Third-Party Doctrine badly distorted the Fourth Amendment and increased the rift in the relationship between the state and its citizens.3 Companies such as Verizon, Facebook, and others collect large amounts of data from users and sell it to other advertisers.4 According to Statista, telecommunication companies like Verizon and social media companies like Twitter and 1 Orin S. Kerr, “The Case for the Third-Party Doctrine,” Michigan Law Review 107, no. 4 (2009): 561-601. 2 Patrick P. Garlinger, “Privacy, Free Speech, and the Patriot Act: First and Fourth Amendment Limits on National Security Letters,” New York University Law Review 84, no. 4 (2009): 1105-1148. 3 Sarah E. Pugh, “Cloudy with a Chance of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo,” American University Law Review 66, no. 3 (2017): 971. 4 Asuncion Esteve, “The Business of Personal Data: Google, Facebook, and Privacy Issues in the E.U. and the U.S.A,” International Data Privacy Law 7, no. 1 (2017): 36-47. 1 Facebook shared private data of about 41% of US citizens aged eighteen to twenty-nine with government security agencies.5 Nevertheless, this only marks the beginning of the problem because, beyond that, the major telecommunications and digital media companies give the data to the state on demand. In itself, this breaches the Fourth Amendment and search and seizure process. The Fourth Amendment is not a complex and lengthy amendment,6 simply stating “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall be issued, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”7 The Fourth Amendment consists of fifty-four words and five important terms: persons, houses, papers, effects, and unreasonable.8 These five terms greatly impact the subject of privacy. In any case, the history of the Fourth Amendment has a strong relationship with the First Amendment,9 especially in terms of freedom of speech, which connects the Fourth Amendment with the subject of privacy.10 The Third-Party Doctrine suggests that corporations such as telecommunications and digital media companies might be able to share peoples’ private data when they give their private information to any of these business companies voluntarily and without any coercion or pressure to share this information.11 For instance, when somebody subscribes to a telecommunication 5 James Clement, “Online Privacy,” Statista, Mar. 22, 2019, https://www.statista.com/topics/2476/online-
Recommended publications
  • 2016 Ncta Intx May 16Th & 17Th
    A Center for Law, 2016 NCTA INTX Technology, and Entrepreneurship ACADEMIC WORKSHOP at the University Silicon of Colorado MAY 16TH & 17TH latirons WORKSHOP PARTICIPANTS Workshop Locations Yochai Benkler, Professor of Law, Harvard University Babette E. Boliek, Associate Professor, Pepperdine University School of Law Monday, May 16, 2016 Adam Candeub, Professor, Michigan State University College of Law Samberg Conference Center - MIT David Clark, Professor, Massachusetts Institute of Technology 6th Floor, Dining Room 5 & 6 Stacey Dogan, Professor, Boston University School of Law MIT Chang Building (E52) Carolyn Gideon, Assistant Professor of International Communication and Technology 50 Memorial Drive Policy and Director of Hitachi Center for Technology and International Affairs, The Cambridge, MA 02139 Fletcher School, Tufts University Ray Gifford, Senior Fellow, Silicon Flatirons, University of Colorado Shane Greenstein, Professor, Harvard Business School Tuesday, May 17, 2016 Christiaan Hogendorn, Associate Professor of Economics, Wesleyan University Boston Convention and John B. Horrigan, Senior Researcher, Pew Research Center Expo Center Gus Hurwitz, Assistant Professor, University of Nebraska College of Law 415 Summer Street Roslyn Layton, PhD Fellow, Aalborg University Boston, MA 02210 William Lehr, Research Scientist/CSAIL, Massachusetts Institute of Technology Directions & Parking Daniel Lyons, Associate Professor, Boston College Law School Information John Mayo, Professor of Economics, Business and Public Policy, Georgetown University
    [Show full text]
  • Visions of Electric Media Electric of Visions
    TELEVISUAL CULTURE Roberts Visions of Electric Media Ivy Roberts Visions of Electric Media Television in the Victorian and Machine Ages Visions of Electric Media Televisual Culture Televisual culture encompasses and crosses all aspects of television – past, current and future – from its experiential dimensions to its aesthetic strategies, from its technological developments to its crossmedial extensions. The ‘televisual’ names a condition of transformation that is altering the coordinates through which we understand, theorize, intervene, and challenge contemporary media culture. Shifts in production practices, consumption circuits, technologies of distribution and access, and the aesthetic qualities of televisual texts foreground the dynamic place of television in the contemporary media landscape. They demand that we revisit concepts such as liveness, media event, audiences and broadcasting, but also that we theorize new concepts to meet the rapidly changing conditions of the televisual. The series aims at seriously analyzing both the contemporary specificity of the televisual and the challenges uncovered by new developments in technology and theory in an age in which digitization and convergence are redrawing the boundaries of media. Series editors Sudeep Dasgupta, Joke Hermes, Misha Kavka, Jaap Kooijman, Markus Stauff Visions of Electric Media Television in the Victorian and Machine Ages Ivy Roberts Amsterdam University Press Cover illustration: ‘Professor Goaheadison’s Latest,’ Fun, 3 July 1889, 6. Cover design: Coördesign, Leiden
    [Show full text]
  • Searchable PDF Index
    TELEPHONE COLLECTORS INTERNATIONAL Telephone Collectors International is an organization of telephone collectors, hobbyists and historians who are helping to preserve the history of the telecommunications industry through the collection of telephones and telephone related material. Our collections represent all aspects of the industry; from the very first wooden prototypes that started the industry to the technological marvels that made the automatic telephone exchange possible. If any of this interests you, we invite you to join our organization. Look around and see what we have to offer. Thanks for stopping by! Telephone Collectors International website including become a member: http://www.telephonecollectors.org/ Questions or comments about TCI? Send e-mail to [email protected] ********************************************************************************* Books Recommended by the editors: Available now ... Old-Time Telephones! Design, History, and Restoration by Ralph O. Meyer ... 264pp Soft Cover 2nd Edition, Expanded and Revised ... A Schiffer Book with Price Guide for Collectors Available at Phoneco.com or Schiffer Publishing, Ltd., 4880 Lower Valley Rd, Atglen, PA 19310 e-mail: [email protected] ********************************************************************************** Coming Soon: TELEPHONE Dials and Pushbuttons Their History, Development and Usage by Stanley Swihart ... 2 volumes, 300 pp ea. Box 2818, Dublin, CA., 94568-0818. Phone 1 (925)-829-2728, e-mail [email protected] *********************************************************************************
    [Show full text]
  • The Myth of the Sole Inventor
    Michigan Law Review Volume 110 Issue 5 2012 The Myth of the Sole Inventor Mark A. Lemley Stanford Law School Follow this and additional works at: https://repository.law.umich.edu/mlr Part of the Intellectual Property Law Commons Recommended Citation Mark A. Lemley, The Myth of the Sole Inventor, 110 MICH. L. REV. 709 (2012). Available at: https://repository.law.umich.edu/mlr/vol110/iss5/1 This Article is brought to you for free and open access by the Michigan Law Review at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. THE MYTH OF THE SOLE INVENTORt Mark A. Lemley* The theory of patent law is based on the idea that a lone genius can solve problems that stump the experts, and that the lone genius will do so only if properly incented. But the canonical story of the lone genius inventor is largely a myth. Surveys of hundreds of significant new technologies show that almost all of them are invented simultaneously or nearly simultaneous- ly by two or more teams working independently of each other. Invention appears in significant part to be a social, not an individual, phenomenon. The result is a real problem for classic theories of patent law. Our domi- nant theory of patent law doesn't seem to explain the way we actually implement that law. Maybe the problem is not with our current patent law, but with our current patent theory.
    [Show full text]
  • Who Invented the Telephone?: Lawyers, Patents, and the Judgments of History
    Who Invented the Telephone?: Lawyers, Patents, and the Judgments of History Christopher Beauchamp Technology and Culture, Volume 51, Number 4, October 2010, pp. 854-878 (Article) Published by The Johns Hopkins University Press DOI: 10.1353/tech.2010.0038 For additional information about this article http://muse.jhu.edu/journals/tech/summary/v051/51.4.beauchamp.html Access Provided by Princeton University at 02/10/13 1:14PM GMT 05_51.4beauchamp 854–78:03_49.3dobraszczyk 568– 10/31/10 11:04 AM Page 854 Who Invented the Telephone? Lawyers, Patents, and the Judgments of History CHRISTOPHERBEAUCHAMP Who invented the telephone? In the United States, this question has a widely known answer. Alexander Graham Bell routinely ranks among the hundred “greatest” or “most influential” Americans, whether chosen by historians or internet polls.1 His cry of “Mr. Watson—come here—I want to see you,”al- though often misquoted, is one of the best-known exclamations in Amer- ican history.2 More than one hundred and thirty years after the event, Bell and Watson’s first telephone call remains a classroom staple: a standard de- vice for teaching Americans about the nation’s inventive past, and even for placing technological change at the center of mainstream history.3 Christopher Beauchamp is the Sharswood Fellow in Law and History at the University of Pennsylvania Law School. In an earlier form, this essay received the Levinson Prize of the Society for the History of Technology. The author is grateful for the advice of Anisha Dasgupta, Martin Daunton, Richard John, Robert MacDougall, Christine MacLeod, John Staudenmaier, and four anonymous referees for T&C.
    [Show full text]
  • Luis Rosario Albert Estado, Empresa Y
    REDES ESTADO, EMPRESA Y TELECOMUNICACIONES EN PUERTO RICO LUIS ROSARIO ALBERT JuntaREGLAMENTADORA de Telecomunicaciones DE PUERTO RICO Para ver este documento como un libro ajuste el formato en Adobe Reader realizando los siguientes pasos: Adobe Reader > Ver > Presentación de Página > Vista de Dos Páginas Adobe Reader > View > Page Display > Two Page View Importante asegúrese que las siguientes opciones no estén seleccionadas: Mostrar Espacios Entre Páginas Mostrar Página de Portada en Vista de Dos Páginas Show Gaps Between Pages Show Cover Page in Two Page View REDES: ESTADO, EMPRESA Y TELECOMUNICACIONES EN PUERTO RICO © Junta Reglamentadora de Telecomunicaciones de Puerto Rico Todos los derechos reservados. Prohibida la reproducción parcial o total de este libro. Primera edición: Noviembre 2016 Investigación/Derechos morales Luis Rosario Albert Edición/Corrección de textos Maria Eugenia Hidalgo Coordinadora de producción Karen Garnik, Beyond Branding Communications Diseño gráfico/Montaje Alberto Rigau & Edna Isabel Acosta, Estudio Interlínea Diseño de gráficas Stephanie Rodríguez, Estudio Interlínea Impresión Model Offset Printing ISBN: 978-0-9981550-0-5 Impreso y encuadernado en Humacao, Puerto Rico. Fotos páginas 1-7: AGPR Foto páginas 8-9: El Mundo, UPR AbreviAturAs en ilustrAciones El Mundo, UPR Colección del periódico El Mundo, Biblioteca Digital Puertorriqueña, Universidad de Puerto Rico AGPR Archivo General de Puerto Rico FLMM Fundación Luis Muñoz Marín FRHC Fundación Rafael Hernández Colón ACPR Autoridad de Comunicaciones de
    [Show full text]
  • Short Skirts, Telephonoscopes and Ancient Locomotives
    Junctions volume 2 issue 2 9 ! Short Skirts, Telephonoscopes and Ancient Locomotives Albert Robida’s Vision of the Twentieth Century Lotte Kremer ABSTRACT Albert Robida (1848-1926) was a French illustrator, caricaturist and novelist. In 1883 he wrote and illustrated Le Vingtième Siècle, a futuristic novel which gives us a look at twentieth-century life. This book is a science-fiction landmark, with its ambivalent attitude towards technology. In his development of such a detailed and coherent aesthetic of the future, Robida was the first true science fiction illustrator. Robida’s illustrations are an integral part of the novel and are thus worth analysing as a means of expression. I take a closer look at the illustrations, analysing their content and the way they interact with the text. I especially focus on the way they relate to Robida’s own historical context. First, the novel’s place in the science fiction genre is discussed, then its place in developments in illustration. Toward the end, the fashion, architecture, technology and general culture is taken into account. This provides the answers to the central question: how does Robida’s imagined future fit within his time? The novel acutely describes the mass effects of technological change. Robida creates a world akin to an anti-utopia. He conveys his ambivalence towards this progress and its repercussions through the fate of monuments, unthinking historicising fads and the effects of new technology on daily life. He creates a fleshed out world where his contemporary culture is mixed with a futuristic one. His illustrations contribute to this realistic world, which the reader explores from within.
    [Show full text]
  • Patent Alienability and Its Discontents
    Patent Alienability and Its Discontents Hannibal Travis* I. INTRODUCTION ................................................................................. 110 II. LEGAL AND ECONOMIC THEORIES OF ASSET ALIENABILITY .......... 114 A. The Alienability of Property in Economic History and Theory ........................................................................ 114 B. The Contemporary Importance of Patent Alienability ....................................................................... 119 III. CRITIQUES OF PATENT ALIENATION AND MONETIZATION ............. 123 A. Brief History of Patent Reform ........................................ 123 B. The America Invents Act and Efforts To Reduce Infringers’ Patent Licensing Costs ................................... 125 C. The Innovation Act as a Measure Aimed Directly at Patent Alienability ............................................................ 127 IV. ASSESSING PROPOSED REFORMS TO PATENT LAW DESIGNED TO PREVENT “ABUSE” ..................................................................... 128 A. Identifying Exaggerated Claims of Harm to Patent Infringers .......................................................................... 128 B. Highlighting the Role of Patent Licensors in the Research and Development Process ................................. 136 C. Reaffirming Settled Law and Legitimate Expectations Under the Patent Act of 1952 ..................... 139 1. Abstract Method or Process Patents .............................. 139 2. Imitative, Inevitable, or Obvious Improvements ..........
    [Show full text]
  • The Myth of the Sole Inventor]
    Lemley [THE MYTH OF THE SOLE INVENTOR] The Myth of the Sole Inventor1 Mark A. Lemley2 Any elementary-school student can recite a number of canonical American invention stories. Thomas Edison invented the light bulb from his famous home laboratory in Menlo Park, New Jersey. Alexander Graham Bell invented the telephone, again from his home invention laboratory, famously using the phone to call his assistant, saying “Come here, Watson, I need you.” Orville and Wilbur Wright invented the airplane from their bicycle shop, taking it to Kitty Hawk, North Carolina to put it in the air. The list of lone genius inventors goes on and on: Samuel Morse and his telegraph, Eli Whitney and his cotton gin, Robert Fulton and his steamboat, Philo Farnsworth and the television, etc., etc. Patent law is built around these canonical tales. First written in 1790, in the first year of Congress, the patent law betrays its individual-inventor bias at various points, from the requirement that patents always issue to individuals rather than companies to the rule that the first to invent, not the first to file, is entitled to the patent.3 More importantly, the very theory of patent law is based on the idea that a lone genius can solve problems that stump the experts, and that the lone genius will do so only if properly incented by the lure of a patent. We deny patents on inventions that are “obvious” to ordinarily innovative scientists in the field. 1 © 2011 Mark A. Lemley. 2 William H. Neukom Professor, Stanford Law School; partner, Durie Tangri LLP, San Francisco, CA.
    [Show full text]
  • March 20,1888
    ESTABLISHED JUNE 23, 1862-VOL. 26. FAVOR. there may be can be of THE NATIONAL CAPITAL. TO THE PAVEMENT. and the removal of the registry tax and IN BELL’S temporarily disposed MISCELLANEOUS. cannot about such an end, there are DASHED list, by the purchase of bonds. NFECIAL NOTICE*. milCKIXAHEOl'It. bring the for voters in government They two measures that puni- property qualification are worth as high a to the suggest themselves, Rhode Island. premium govern- tion and The means for the first Decision in the Tele* ment as to the holder. They may be sold, if Jay Oouid’s Company Must Pay Its persuasion. Fatal from Her Supreme Court are in the resolution of Congress Mrs. Westlake’s Leap needed, or held until due. If the legal ob- promised Cases. Taxes In Massachusetts. authorizing the President to inflict retaliatory Burning Home. GENERAL NEWS. phone jection really exists Congress will remove it C FINE OFFICES TO LET measures. The second is the much discussed if the administration desire it. It can plain- of commercial union. Deprive Can- ly be seen that there has been no contrac- question Over dealers in Rochester, N. Mike Burns Cets Some Attention ada of all business relations with this coun- thirty liquor Bell Entitled to Patents as a Discov- tion of the currency incident to the tariff, Life Nets Save the Lives of Her Three will 1. The enforce- in the First National to her a on a basis of un- U„ shut ud shop April for 1. 1887, there were in the banks from Persons try, or grant treaty the last erorand Inventor.
    [Show full text]
  • Reduction to Practice, Experimental Use, and the "On Sale" and "Public Use" Bars to Patentability
    St. John's Law Review Volume 63 Number 1 Volume 63, Fall 1988, Number 1 Article 1 Reduction to Practice, Experimental Use, and the "On Sale" and "Public Use" Bars to Patentability William C. Rooklidge W. Gerard von Hoffmann III Follow this and additional works at: https://scholarship.law.stjohns.edu/lawreview This Article is brought to you for free and open access by the Journals at St. John's Law Scholarship Repository. It has been accepted for inclusion in St. John's Law Review by an authorized editor of St. John's Law Scholarship Repository. For more information, please contact [email protected]. ST. JOHN'S LAW REVIEW VOLumE 63 FALL 1988 NUMBER 1 REDUCTION TO PRACTICE, EXPERIMENTAL USE, AND THE "ON SALE" AND "PUBLIC USE" BARS TO PATENTABILITYt WILLIAM C. RooKLmGE* W. GERARD VON HOFFMANN, III** Professor William Robinson introduced his 1890 treatise on patent law with the observation that: [A] period had at last been reached when the Law of Patents could be successfully treated as a department of jurisprudence whose doctrines were derived by logical processes from estab- lished principles, and not as a mere body of legislative enact- ments verbally interpreted by the decisions of the courts .... [W]henever questions of Patent Law are now presented to our courts the factors of the problem lie before them, certain and in- telligible, requiring only careful distinctions and accurate reason- ing to attain impregnable results.1 If patent law had indeed achieved jurisprudential stability in 1890, it strayed far from such stability over the next ninety years.
    [Show full text]
  • Thebaragainstpatentingo
    THE BAR AGAINST PATENTING OTHERS’ SECRETS Christopher C. Funk* CITE AS: 19 STAN. TECH. L. REV. 239 (2016) ABSTRACT In patent litigation, courts frequently allow patent holders to access an accused infringer’s trade secrets and other confidential technology. Those secrets may be relevant to claims of patent infringement. But the confidential access creates a risk that patent holders will misuse those secrets when their attorneys or experts wear two hats— litigating the patent suit in court and working on patent applications in the same field as the accused infringer’s confidential technology. These two hats allow certain attorneys and experts the opportunity to target the accused infringer’s secret technology—either inadvertently or deliberately— by patenting it as their client’s own intellectual property (IP). Several courts attempt to prevent this potential misuse of IP by imposing a patent prosecution bar, which typically forbids those with access to another party’s confidential technology from working at all on patent applications in the same field. But the U.S. Court of Appeals for the Federal Circuit has created a flawed test for determining when a district court may impose prosecution bars. As implemented by most district courts, prosecution bars apply to only those attorneys and experts who are “competitive decisionmakers” and who have a history of working on patent applications. The test is based on a vague and underinclusive term and leaves those without a similar history free of a prosecution bar and positions them to target the other side’s trade secrets with new patent claims. This targeted patenting undermines the IP system’s channeling between patents and trade secrets.
    [Show full text]