Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 15 of 15
Full-Text Articles in Entire DC Network
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
Hezi Margalit
In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Iq, Intelligence Testing, Ethnic Adjustments And Atkins, Robert M. Sanger
Iq, Intelligence Testing, Ethnic Adjustments And Atkins, Robert M. Sanger
Robert M. Sanger
The "Progress Clause": An Empirical Analysis Based On The Constitutional Foundation Of Patent Law, Lori Andrews
The "Progress Clause": An Empirical Analysis Based On The Constitutional Foundation Of Patent Law, Lori Andrews
Lori B. Andrews
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck
Renée M. Hutchins
Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn
The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn
Robert Bloom
In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Lily M Strumwasser
Dear Editor:
I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …
Regulating Choice: A Constitutional Law Response To Professor John A. Robertson's Children Of Choice, Ann Maclean Massie
Regulating Choice: A Constitutional Law Response To Professor John A. Robertson's Children Of Choice, Ann Maclean Massie
Ann MacLean Massie
No abstract provided.
Through A Prism Darkly: Surveillance And Speech Suppression In The Post-Democracy Electronic State", David Barnhizer
Through A Prism Darkly: Surveillance And Speech Suppression In The Post-Democracy Electronic State", David Barnhizer
David Barnhizer
Through a PRISM Darkly: Surveillance and Speech Suppression in the “Post-Democracy Electronic State” David Barnhizer There is no longer an American democracy. America is changing by the moment into a new political form, the “Post-Democracy Electronic State”. It has “morphed” into competing fragments operating within the physical territory defined as the United States while tenuously holding on to a few of the basic creeds that represent what we long considered an exceptional political experiment. That post-Democracy political order paradoxically consists of a combination of fragmented special interests eager to punish anyone that challenges their desires and a central government that …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron
David C. Gray
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
Danielle Keats Citron
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …
Funding Stem Cell Research: The Convergence Of Science, Religion & Politics In The Formation Of Public Health Policy, Edward A. Fallone
Funding Stem Cell Research: The Convergence Of Science, Religion & Politics In The Formation Of Public Health Policy, Edward A. Fallone
Edward A Fallone
The controversy over the funding of stem cell research by the federal government is used as a case study for examining how policy choices are made in the field of public bioethics. This article examines the manner in which the decision to fund stem cell research has been influenced by the convergence of evolving scientific knowledge, conflicting religious values, and the role of elected officials in a representative democracy. The article begins by reviewing the current state of scientific knowledge concerning adult stem cells, embryonic stem cells, induced pluripotent stem cells, and the process of direct cell re-programming. Because each …
Somebody's Watching Me: Protecting Patient Privacy In De-Identified Prescription Health Information, Christopher R. Smith
Somebody's Watching Me: Protecting Patient Privacy In De-Identified Prescription Health Information, Christopher R. Smith
Christopher R Smith
Increasingly, legal scholars, state legislatures and the federal courts are examining patient privacy concerns that arise in the context of the dissemination, distribution and use of patient prescription information. However, less attention has been paid to the sharing of de-identified or encrypted patient prescription information versus identifiable patient prescription information. Though many patients may not realize it, identifiable, de-identified and encrypted patient prescription information is being used for a host of purposes other than insurance reimbursement and treatment, most notably for pharmaceutical marketing purposes. Existing state and federal laws and ethical guidelines provide some protection for the privacy of patient …
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski
Aaron K. Perzanowski
This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment. The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …