Tel Aviv-Berkeley LL.M. Program 2016
Technology Antitrust
Hanno Kaiser. University of California, Berkeley, School of Law, Room 100; Time: 9-11:45 am
Class 1: Technology Antitrust: A Framework and a Baseline Case
August 8, 2016 (Monday)
Topics for discussion
- Antitrust policy
- Distributed antitrust enforcement in the U.S.
- Private plaintiffs
- DOJ & FTC
- State Attorneys General
- Analytical framework
- Coordinated/unilateral
- Horizontal/vertical
- Per se/rule of reason
- Legal framework
- §1 of the Sherman Act
- §2 of the Sherman Act
- §7 of the Clayton Act
- §5 of the FTC Act
- Hart-Scott-Rodino (“HSR”) Act
- Criminal price fixing: A baseline case
Reading Materials
Optional
Class 2: Disruptive Business Models or Illegal Cartels?
August 9, 2016 (Tuesday)
Topics for discussion
- Disruption via de novo entry as per se illegal conduct?
- Platform competition and price effects
- Collective licensing and the aggregation of IP rights
- Anatomy of a complex civil antitrust litigation, involving multiple defendants, DOJ, State Attorneys General as parens patriae, and private class action plaintiffs, etc.
- Hiring cartels?
Reading Materials
- Broad. Music, Inc. v. Columbia Broad. Sys., Inc., 441 U.S. 1 (1979). Excerpts
- United States v. Apple Inc., et al., United States v. Apple, Inc., 791 F.3d 290 (2d Cir. 2015). Excerpts
- United States v. Adobe Systems, Inc., Apple Inc., Google Inc., Intel Corporation, Intuit, Inc., and Pixar (2010) Complaint.
Optional
Class 3: Platform Wars and the Modern Law of Monopolization
August 11, 2016 (Thursday)
Topics for discussion
- Monopolization and abuse of dominance cases in the high tech sector
- U.S. v. Microsoft (2001)
- EC v. Google/Search (pending)
- EC v. Google/Android (pending)
- German Federal Cartel office investigation of Facebook (pending)
- Network effects and market power
- Operating systems and applications
- Mobile operating systems and services
- Internet search
- Social networks
- Messaging applications
- Single brand "aftermarkets"
- Exclusionary strategies
- Locking up OEMs and distribution channels
- Tying and bundling
- Attacking interoperability layers (e.g., Java)
- “Predatory innovation” and breaking interoperability
- “Embrace, extend, extinguish"
- Product disparagement and FUD
- Planned obsolescence and the "hard switch"
Reading Materials
Optional
This work is licensed under a Creative Commons Attribution 3.0 United States License.