Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Law

Global Networks And The Legal Profession, Laurel S. Terry Jan 2019

Global Networks And The Legal Profession, Laurel S. Terry

Faculty Scholarly Works

The importance of networks and the power of exponential growth within networks have become much more apparent to the world as a result of the COVID-19 pandemic. This Article addresses the topic of global legal profession networks. The introductory section provides information about our global economy and society that helps explain why global legal profession networks are valuable. It argues that global networks are beneficial for clients, lawyers, and other legal services stakeholders.

After introducing some of the scientific literature about networks in general and legal profession networks specifically, Section II identifies ways in which lawyers participate in global legal …


Privacy And Security Across Borders, Jennifer Daskal Jan 2019

Privacy And Security Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …


Verification Methods In Cyber Attack Treaties, Grant Hodgson Feb 2016

Verification Methods In Cyber Attack Treaties, Grant Hodgson

Grant Hodgson

The fundamental differences between cyber weapons and traditional military weapons present challenges to verification techniques used in the past. This paper will discuss the challenges in constructing, implementing, and verifying a cyberattack treaty. Part I, will discuss the nature of cyberattacks and what makes them difficult for verification purposes. Part II will describe techniques that have previously been used to verify other treaties. Each technique is evaluated for its potential efficacy when applied to cyberattacks.


New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford Aug 2015

Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford

Scott Shackelford

Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …


Developing An International Carbon Tax Regime, Steven Specht Aug 2015

Developing An International Carbon Tax Regime, Steven Specht

Steven Specht

As atmospheric CO2 remains in the range of 400 ppm, it is necessary to find new international coordination to deal with climate change. The best way forward is an international regime of harmonized domestic carbon taxes. By agreeing to a minimum amount of taxation on domestic, point-source producers, money can be set aside for adaptation costs and alternative means of energy production. Finally, such a plan will overcome the problem of non-participation of countries in agreements like the Kyoto Protocol. As this is a treaty dealing with economics and trade, countries can place taxes on imports of non-participatory countries under …


Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco Aug 2015

Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco

Xiao Recio-Blanco

The world runs on electricity, but its global distribution is uneven and incomplete. The lack of access to electricity denies some people the most basic benefits, from healthcare and sanitation to security and economic development.

To increase access to electricity, most developing nations have relied on traditional sources of energy, namely fossil fuels, and the extension of a central electrical grid. Scholars and specialized International Organizations suggest that the implementation of renewable energy technologies through small-to-mid scale grid projects could be a reliable alternative. However, renewable energy technologies must overcome three formidable hurdles: low reliability, uneven availability, and the high …


Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi May 2015

Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi

Hussam M. Alkanbashi

Cybercrime is one of the greatest threats facing the International community. Defined as criminal activity perpetrated using computers and the internet, cybercrime has developed into a trillion dollar a year industry, affecting millions of people around the world, as well as countless businesses and the governments of every nation. With nearly 431 million victims projected in 2015, cyber related crime is one of if not the most frequent, costly and pervasive crimes worldwide. This article examines and assesses the effectiveness of Saudi and American Cyber Laws in deterring the growing global threats posed by cybercrime. The article studies cyber identity …


Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno Feb 2015

Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno

Constance E. Bagley

In 2014, the European Commission announced the launch of a study of knowledge transfer by public research organizations and other institutes of higher learning “to determine which additional measures might be needed to ensure an optimal flow of knowledge between the public research organisations and business thereby contributing to the development of the knowledge based economy.” As the European Commission has recognized, the EU needs to take action to “unlock the potential of IPRs [intellectual property rights] that lie dormant in universities, research institutes and companies.” This article builds on our earlier work on structuring efficient pharmaceutical public-private partnerships (PPPPs) …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock Jan 2014

An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock

Ferris K Nesheiwat

This article seeks to provide a socio-legal framework for the examination of the attitude of a section of the Jordanian public towards intellectual property rights (IPRs), using copyright protected software as an example; it provides an overview of perceptions of IPRs within an Arabic and predominantly Muslim society, and examines how such perceptions impact attitudes towards abiding with, and enforcement of, IPRs. Through its analytical value and empirical research, this paper fills a void in the availability of reliable empirical data in Jordan as part of the analysis to gauge the impact of intellectual property (IP) laws. A review of …


Science And Compliance In The Arctic: A Constructivist Approach To The Un Commission On The Limits Of The Continental Shelf, Sari M. Graben, Peter Harrison Jun 2013

Science And Compliance In The Arctic: A Constructivist Approach To The Un Commission On The Limits Of The Continental Shelf, Sari M. Graben, Peter Harrison

Sari M Graben

The United Nations Commission on the Limits of the Continental Shelf is expected to play an essential role in delineating the rights of the Arctic states to sea bed resources in the Arctic Ocean. Positivist theories of international law generally source Arctic state compliance to the binding effect of Article 76 of the UN Convention on the Law of the Sea. However, positivist explanations fail to answer why the Arctic states, which are authorized to establish their own limits, would accept the sovereignty costs associated with the Commission’s legal and scientific interpretations. In order to better understand how the Commission …


A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski May 2013

A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Michael J. Malinowski

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


The Extraterritoriality Of Eu Data Privacy Law - Its Theoretical Justification And Its Practical Effect On U.S. Businesses, Dan Jerker B. Svantesson Apr 2013

The Extraterritoriality Of Eu Data Privacy Law - Its Theoretical Justification And Its Practical Effect On U.S. Businesses, Dan Jerker B. Svantesson

Dan Svantesson

Due to its extraterritorial effect, the European Union’s trailblazing data privacy law has long been a major concern for U.S. businesses. With the proposal for a new data privacy framework in the EU, with potential penalties of up to 2% of an offending enterprise’s annual worldwide turnover, such concerns are justified indeed; particularly as the EU at the same time seems to be expanding the extraterritorial reach of its data privacy law.

This article examines the extraterritoriality of current and proposed EU data privacy law and analyses whether those claims of extraterritoriality can be either justified or objected to by …


Intellectual Property, Ag-Biotech And The Right To Adequate Food: A Critical African Perspective, Chidi Oguamanam Jan 2013

Intellectual Property, Ag-Biotech And The Right To Adequate Food: A Critical African Perspective, Chidi Oguamanam

Chidi Oguamanam

Recent transformations in agricultural innovations have resulted in the consolidation of intellectual property rights in the agricultural arena resulting in an ongoing struggle for the control of plant genetic resources. For many developing countries, especially in Africa, traditional and communal-based artisanal farmers are the producers of over three quarters of regional food supply. But contemporary techno-legal transformations in agriculture undermine the critical role of these informal actors in a manner that aggravates the state of regional food insecurity in Africa. The aspirations of African countries to implement their obligations in regard to the right to adequate food under the International …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor Jan 2012

Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor

Jonathan I. Ezor

In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …


A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski Feb 2010

A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Michael J. Malinowski

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski Jan 2009

A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Journal Articles

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


A Climate Of Extremes: Transboundary Conflict Resolution, Prof. Elizabeth Burleson Jan 2008

A Climate Of Extremes: Transboundary Conflict Resolution, Prof. Elizabeth Burleson

Prof. Elizabeth Burleson

This Article examines evolving climate change policy. In April 2007 Massachusetts v. Environmental Protection Agency clarified that the EPA has the authority to regulate greenhouse gas emissions. This Supreme Court ruling coincided with the United Nations Security Council's decision to put climate change on its agenda. The Intergovernmental Panel on Climate Change (IPCC) has found that anthropogenic climate change has impacted the natural world and human societies. Scientific and governmental consensus has coalesced that multilateral climate mitigation and adaptation must be implemented. International institutions, governments, businesses, non-governmental organizations, and civil society can achieve multilateral greenhouse gas mitigation and climate adaptation.


Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook Jan 2007

Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook

ExpressO

This Comment assesses the use of the Alien Tort Statute (“ATS”) as a jurisdictional basis for claims of international copyright infringement occurring outside of the United States. Under the ATS, aliens may sue in United States district courts for torts that amount to violations of treaties or the law of nations.

Given that copyright infringement is a tort, an alien may only be able to establish ATS jurisdiction in a suit of extraterritorial infringement if the infringement violated a treaty or the law of nations. This comment argues that extraterritorial copyright infringement does indeed amount to a violation of the …


Resolving Conflicts Between Multilateral Environmental Agreements: The Case Of The Montreal And Kyoto Protocols, Daniel G. Mccabe Jan 2007

Resolving Conflicts Between Multilateral Environmental Agreements: The Case Of The Montreal And Kyoto Protocols, Daniel G. Mccabe

ExpressO

The Kyoto Protocol to the United Nations Framework Convention on Climate Change and the Montreal Protocol on Substances that Deplete the Ozone Layer are multilateral environmental agreements that regulate the use of chemicals that contribute to climate change and ozone depletion. The Montreal Protocol, however, encourages the replacement of ozone depleting substances with chemicals that contribute to climate change. Likewise, the Kyoto Protocol encourages the production of an ozone depleting substance by allowing companies to profit by destroying the byproduct of its manufacture. This comment attempts to resolve these conflicts through conventional and customary international law. It concludes that the …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


The Wto Appellate Body Gambles On The Future Of The Gats: Analyzing The Internet Gambling Dispute Between Antigua And The United States Before The World Trade Organization, Kelly Ann M. Tran Sep 2006

The Wto Appellate Body Gambles On The Future Of The Gats: Analyzing The Internet Gambling Dispute Between Antigua And The United States Before The World Trade Organization, Kelly Ann M. Tran

ExpressO

The World Trade Organization’s recent Appellate Body decision in the Antigua – United States dispute found that U.S. restrictions on Internet gambling qualified for an exception under Article XIV of the GATS. This paper criticizes the Appellate Body’s decision to overturn the WTO Panel on two grounds. First, it argues that the Appellate Body erred when it concluded that U.S. gambling restrictions are necessary to protect public morals or maintain public order. Second, it argues that the Appellate Body failed to adhere to previous WTO measures dealing with similar jurisprudence and both panels did not adequately explain the significance of …


Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali Aug 2006

Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali

ExpressO

As the wave of outsourcing to India swells, there is growing concern about the inadequacies of the India legal system in protecting data being transferred to it from other nations for the purpose of processing. India has a smattering of laws that scantily address the issue of data privacy. Under pressure from the business processing industry in India, as well as from the European Union and other nations, it is but a matter of time before India adopts a slate of laws that address the issue of data protection. Once these laws are enacted, the main issue that remains is …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi Apr 2006

Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi

ExpressO

This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …