Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Kelo v. City of New London: Takings, 'Public Use,' Urban Waterfront Redevelopment, and the Likely Survival of the Republic

David G. Mandelbaum & Morton P. Fisher, Jr.

In June, the Supreme Court affirmed the power of municipal redevelopment agencies to take property by eminent domain in order to assemble large parcels for economic development. <i>Kelo v. City of New London</i>, No. 04-108 (U.S. June 23, 2005) held that a municipality may take private homes in good condition to transfer them to a private developer as a part of an integrated plan to redevelop an area of New London. This use of eminent domain did not violate the "public use" requirement of the Takings Clause of the Fifth Amendment that, at its core, prohibits the government from taking private property solely to transfer it to another private person to serve a private interest. Kelo follows the Court's decision in <i>Lingle v. Chevron U.S.A. Inc.</i>, 125 S. Ct. 2074 (2005), where the Court ruled that a state statute that was not reasonably calculated to achieve its stated goal was not, by virtue of that irrationality, an unconstitutional taking. (In that case, the statute imposed a cap on the rent that oil companies could charge service station owners in Hawaii in order to achieve the stated goal of lower gasoline prices.)

Features

Nonphysical Differences Are Enough to Create Material Differences with Gray Market Goods

G. Brian Busey & Rory J. Radding

Under U.S. law, the resale of imported genuine goods bearing a valid U.S. trademark generally does not constitute trademark infringement. This is in part because, under the first sale doctrine, the trademark protections under U.S. law can be exhausted after the trademark owner's first authorized sale anywhere of the product bearing the trademark. Thus, U.S. law does not generally preclude the sale of identical genuine goods bearing a legitimate trademark even if the sale in the United States is unauthorized by the trademark owner.

Features

IP News

Compiled by Eric Agovino

Highlights of the latest intellectual property news from around the country.

Features

If You're Confused, You Should Be: Two Federal Laws Apply to Cell Phone Messages

By: Kristen J. Mathews

When it comes to sending promotional messages to wireless devices, such as through e-mail or short message service ("SMS"), there is more than one reason to be confused. First, there are two different federal laws that apply to messages that end up on wireless devices such as cell phones. The Controlling the Assault of Non-Solicited Pornography and Market Act (the "CAN-SPAM Act"), 15 U.S.C. &sect;7701 <i>et seq.</i> and 18 U.S.C. &sect;1037, applies if the address that is used to send the message consists of a username and a domain name. (Commonly, if the wireless device is a cell phone, the username would be the number of the cell phone and the domain name would be the domain name of the wireless carrier. If the wireless device is of some other type, the address may be formulated differently.) The applicable rule is: If the address has a domain name in it, the CAN-SPAM Act's wireless e-mail regulations apply.

Features

Infringement By Source Code 'Golden Master': Developments in Patent Infringement Law Concerning Extra-U.S. Sales

Douglas E. Lumish & Sonal N. Mehta

Until recently, U.S. software companies comfortably operated under the assumption that selling software that was copied from a "golden master" CD outside of the United States, and which was sold only to customers outside of the United States, did not infringe U.S. patents. Recent developments in the law have destroyed that comfort and made clear that infringement liability may very well lie for exactly those types of foreign sales.

Features

Editor's Note

ALM Staff & Law Journal Newsletters

Every year is filled with new opportunity and as Henry Ford said: "If you think you can do a thing or think you can't do a thing, you are right." So, take a step back as a management team and look at what's happening in the legal market.

Features

Index

ALM Staff & Law Journal Newsletters

A complete listing of cases covered in this issue.

Features

Cooperatives & Condominiums

ALM Staff & Law Journal Newsletters

Discussion of recent cases.

Civil Forfeiture of Corporately Owned Property

Stewart E. Sterk

Federal statutes provide for forfeiture of real property used in conjunction with a variety of criminal activity. Although the primary focus of federal civil forfeiture statutes has been on drug-related offenses, the reach of these statutes now extends to a variety of other crimes. A recent Southern District case, however, raises an issue not explicitly resolved by the forfeiture statutes: when is the property of a corporate owner subject to forfeiture?

Real Property Law

ALM Staff & Law Journal Newsletters

Analysis of recent key rulings.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Surveys in Patent Infringement Litigation: The Next Frontier
    Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›