Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Law

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest Aug 2015

Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest

Sean Pager

INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?

Sean A. Pager Michigan State University College of Law

Eric Priest University of Oregon School of Law

ABSTRACT

This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …


Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal Jul 2015

Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal

Nathan M. Crystal

The practice of law is increasingly becoming “delocalized.” Globalization and the use of technology are two important factors in this fundamental change in practice. Delocalization is affecting almost all areas of practice, including issues involving attorney-client privilege (ACP). To some extent the choice-of-law rules governing ACP are also – like other fields of the law - being “delocalized,” but in our view only partially. This paper discusses six approaches to choice of law issues governing ACP that are being used by the courts. Aside from the traditional lex loci approach (which simply applies the law of the forum to the …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper Jul 2014

Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper

Casey J Cooper

The right to freedom of expression and free press is recognized under almost all major human rights instruments and domestic legal systems—common and civil—in the world. However, what do you do when a fundamental right conflicts with another equally fundamental right, like the right to a fair trial? In the United States, the freedom of speech, encompassing the freedom of the press, goes nearly unfettered: the case is not the same for other common law countries. In light of cultural and historic facts, institutional factors, modern realities, and case-law, this Article contends that current American jurisprudence does not take into …


An Other History Of Knowledge And Decision In Precautionary Approaches To Sustainability, Saptarishi Bandopadhyay Jul 2014

An Other History Of Knowledge And Decision In Precautionary Approaches To Sustainability, Saptarishi Bandopadhyay

Saptarishi Bandopadhyay

In this paper, I offer an alternative reading of precaution with the hope of recovering the capacity of this ethic to facilitate legal and political decisions. Despite being a popular instrument of international environmental governance, decision-makers continue to understand this principle as reflecting an immemorial and natural instinct for preserving the environment in cases of scientific uncertainty. Such a reading, however, ignores the history and moral basis underlying this principle and thereby renders it obvious, and automatically adaptable to the politics of Sustainable Development. By offering a thicker history of precautionary governance at exemplary moments of ecological crisis I trace …


Copyright And Inequality, Lea Shaver Feb 2014

Copyright And Inequality, Lea Shaver

Lea Shaver

The prevailing theory of copyright law imagines a marketplace efficiently serving up new works to an undifferentiated world of consumers. Yet the reality is that all consumers are not equal. The majority of the world’s people experience copyright law not as a boon to consumer choice, but as a barrier to acquiring knowledge and taking part in cultural life. The resulting patterns of privilege and disadvantage, moreover, reinforce and perpetuate preexisting social divides. Class and culture combine to explain who wins, and who loses, from copyright protection. Along the dimension of class, the insight is that just because new works …


Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer Jan 2014

Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer

David Barnhizer

None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr

Matthew Rimmer

The Australian Law Reform Commission poses a question in respect of international law in the issues paper on Copyright and the Digital Economy.Question 1. The ALRC is interested in evidence of how Australia’s copyright law is affecting participation in the digital economy. For example, is there evidence about how copyright law: a. affects the ability of creators to earn a living, including through access to new revenue streams and new digital goods and services; b. affects the introduction of new or innovative business models; c. imposes unnecessary costs or inefficiencies on creators or those wanting to access or make use …


A Submission To The New Zealand Government On The Plain Packaging Of Tobacco Products, Matthew Rimmer Oct 2012

A Submission To The New Zealand Government On The Plain Packaging Of Tobacco Products, Matthew Rimmer

Matthew Rimmer

EXECUTIVE SUMMARYThis submission draws upon a number of pieces of research and policy papers on the plain packaging of tobacco products including:1. Becky Freeman, Simon Chapman, and Matthew Rimmer, 'The Case for the Plain Packaging of Tobacco Products' (2008) 103 (4) Addiction 580-590.2. Matthew Rimmer, 'A Submission to the Senate Legal and Constitutional Committee on the Trade Marks Amendment (Tobacco Plain Packaging) Bill (Cth)', September 2011, https://senate.aph.gov.au/submissions/comittees/viewdocument.aspx?id=dabfcd75-9807-493f-bc99-4a7506bf493b3A. Matthew Rimmer, 'Tobacco's Mad Men Threaten Public Health', The Conversation, 23 September 2011, http://theconversation.edu.au/tobaccos-mad-men-threaten-public-health-34503B. Matthew Rimmer, 'Big Tobacco's Box Fetish: Plain Packaging at the High Court', The Conversation, 20 April 2012, https://theconversation.edu.au/big-tobaccos-box-fetish-plain-packaging-at-the-high-court-65183C. Matthew …


A Submission To The Joint Standing Committee On Treaties On The Anti-Counterfeiting Trade Agreement 2011 (#Acta), Matthew Rimmer Mar 2012

A Submission To The Joint Standing Committee On Treaties On The Anti-Counterfeiting Trade Agreement 2011 (#Acta), Matthew Rimmer

Matthew Rimmer

“If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close.” David Fewer“While European and American IP maximalists have pushed for TRIPS-Plus provisions in FTAs and bilateral agreements, they are now pushing for TRIPS-Plus-Plus protections in these various forums.” Susan Sell“ACTA is a threat to the future of a free and open Internet.” Alexander Furnas“Implementing the agreement could open a Pandora's box of potential human rights violations.” Amnesty International.“I will not take part in this masquerade.” Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European ParliamentExecutive SummaryAs an independent scholar …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Social Networking: A Conceptual Analysis Of A Data Controller, Rebecca Wong Dec 2009

Social Networking: A Conceptual Analysis Of A Data Controller, Rebecca Wong

Dr Rebecca Wong

This article updates a working party looking at the definition of a "data controller" under the Data Protection Directive 95/46/EC within the context of a social networking environment. In brief, the article considers twhether the phenomenom of social networking (through Facebook (FB), MySpace and Bebo) has produced unintended consequences in the interpretation and application of the Data Protection Directive 95/46/EC to the online environment. The Data Protection Directive 95/46/EC defines a "data controller" broadly to refer to the 'natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means …


Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington May 2009

Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington

Matthew Hoisington

Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …