Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 193

Full-Text Articles in Law

The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris Apr 2015

The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris

Emily Michiko Morris

Once the stuff of science fiction, nanotechnology is now expected to be the next technological revolution, but despite millions of dollars of investment, we still have yet to see the brave new world of cheap energy, cell-specific drug delivery systems, and self-replicating nanobots that nanotechnology promises. Instead, nanotechnology seems to be in a holding pattern, perpetually stuck in the status of “emerging science,” “immature field,” and “new technology” for over three decades now. Why? Professor Mark Lemley and a number of others have suggested that the answer to this puzzling question is simple: nanotechnology differs from the all of the …


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Apr 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Julian Dibbell

When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …


, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta Mar 2015

, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta

Jeffrey A. Van Detta

This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":

“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”

This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education, …


Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter Mar 2015

Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter

Megan M Carpenter

This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan Mar 2015

The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan

Fazal Khan

The nascent field of mobile health technology is still very small but is predicted to grow exponentially as major technology companies such as Apple, Google, Samsung, and even Facebook have announced mobile health initiatives alongside influential healthcare provider networks. Given the highly regulated nature of healthcare, significant legal barriers stand in the way of mobile health’s potential ascension. I contend that the most difficult legal challenges facing this industry will be restrictive professional licensing and scope of practice laws. The primary reason is that mobile health threatens to disrupt historical power dynamics within the healthcare profession that have legally enshrined …


The Law And Ethics Of High-Frequency Trading, Steven R. Mcnamara Mar 2015

The Law And Ethics Of High-Frequency Trading, Steven R. Mcnamara

Steven R. McNamara

Michael Lewis’s recent book Flash Boys has resurrected the controversy concerning “high-frequency trading” (HFT) in the stock markets. While HFT has been important in the stock markets for about a decade, and may have already peaked in terms of its economic significance, it touched a nerve with a public suspicious of financial institutions in the wake of the financial crisis of 2008-2009. In reality, HFT is not one thing, but a wide array of practices conducted by technologically adept electronic traders. Some of these practices are benign, and some even bring benefits such as liquidity and improved price discovery to …


Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello Feb 2015

Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello

Adam Lamparello

In Riley v. California, the United States Supreme Court ushered privacy protections into the digital era and signaled that the Fourth Amendment would not become a constitutional afterthought. The Court unanimously held that, absent exigent circumstances, law enforcement officers could not search any area of an arrestee’s cell phone, including the outgoing call log, without a warrant and probable cause. At first glance, Riley appears to be a landmark decision in favor of individual privacy rights. As with most things, however, the devil is in the details, and the details in Riley make any celebration over the seemingly enhanced …


Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello Feb 2015

Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello

Adam Lamparello

In Riley v. California, the United States Supreme Court ushered privacy protections into the digital era and signaled that the Fourth Amendment would not become a constitutional afterthought. The Court unanimously held that, absent exigent circumstances, law enforcement officers could not search any area of an arrestee’s cell phone, including the outgoing call log, without a warrant and probable cause. At first glance, Riley appears to be a landmark decision in favor of individual privacy rights. As with most things, however, the devil is in the details, and the details in Riley make any celebration over the seemingly enhanced …


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele Feb 2015

Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele

Layne S. Keele

In Apple, Inc. v. Motorola, Inc., 757 F.3d 1286 (Fed. Cir. 2014), the four federal judges who considered the case—Judge Posner by designation at the trial level, and three Federal Circuit judges on appeal—all expressed differing opinions on the question of whether and to what extent extraordinary patent remedies should be available for the infringement of standard-essential patents. This article aims to simplify this muddled and confusing topic.

The article employs a teleological approach, examining the purposes behind remedies in general, the purposes of extraordinary remedies in patent law, and the purposes of RAND commitments (commitments to license standard-essential …


Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg Feb 2015

Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg

Seth C Oranburg

Title III of the JOBS Act of 2012, which attempts to encourage entrepreneurship by allowing startups and small business to sell stock to the general public over the Internet through “crowdfunding,” is completely backwards. Its ceiling should be a floor—the $1 million limit should be inverted. By capping startups at raising $1 million from crowdfunding, the JOBS Act does not address the private equity gap, a fundamental problem in startup markets, and exposes unsophisticated investors to risk and fraud. This Article presents a regulatory framework premised on “bridgefunding,” an approach that this article develops to protect new investors by encouraging …


Calling Out Maryland V. King: Dna, Cell Phones, And The Fourth Amendment, Jennie Vee Silk Feb 2015

Calling Out Maryland V. King: Dna, Cell Phones, And The Fourth Amendment, Jennie Vee Silk

Jennie Vee Silk

In Maryland v. King, the Supreme Court narrowly upheld a Maryland statute that permits police to obtain a DNA sample from an arrestee without a search warrant. A year later, the Court drastically changed course and provided significantly more protection to an arrestee’s privacy. In a unanimous decision, the Court in Riley v. California held that police must obtain a search warrant before they can search the cell phone of an arrestee.

This article is the first to compare the Court’s conflicting decisions in Riley and King. Riley and King present the same issue: governmental invasion of privacy for …


Bowman V. Monsanto: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman Feb 2015

Bowman V. Monsanto: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman

Christopher M Holman

The inherent tendency of patented seeds to self-replicate has led to fears that farmers might face liability for inadvertent patent infringement. To address the perceived problem, some have proposed severely limiting the availability of effective patent protection for self-replicating technologies, for example by denying patent rights to “second generation” self-replicating products, or even by broadly declaring such technologies ineligible for patent protection. The fact is, lawsuits against inadvertently infringing farmers remain of largely hypothetical concern. However, changes in the market could soon render such lawsuits a reality. In addressing the resulting policy concerns, the courts and/or Congress have at their …


Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort Jan 2015

Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort

Scott Shackelford

According to Frank Montoya, the U.S. National Counterintelligence Chief, “We’re an information-based society now. Information is everything. That makes . . . company executives, the front line – not the support mechanism, the front line – in [determining] what comes.”[1] Chief Montoya’s remarks underscore the central role played by the private sector in ongoing efforts aimed at enhancing cybersecurity, much like the increasingly vital role firms are playing in fostering sustainability. For example, according to Accenture surveys, the number of managers who consider sustainability to be critical to the future success of their organizations jumped from fifty to more …


How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum Jan 2015

How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum

Angela Goodrum

No abstract provided.


Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler Jan 2015

Transformative Teaching And Educational Fair Use After Georgia State, Brandon C. Butler

Brandon C. Butler

The Supreme Court has said that copyright’s fair use doctrine is a “First Amendment safety valve” because it ensures that certain crucial cultural activities are not unduly burdened by copyright. While many such activities (criticism, commentary, parody) have benefited from the courts’ increased attention to first amendment values, one such activity, education, has been mired for years in a minimalist, market-based vision of fair use that is largely out of touch with mainstream fair use jurisprudence. The latest installment in the history of educational fair use, the 11th Circuit’s opinion in the Georgia State e-reserves case, may be the last …


The Doctrine Of True Threats: Protecting Our Ever-Shrinking First Amendment Rights In The New Era Of Communication, Mary M. Roark Jan 2015

The Doctrine Of True Threats: Protecting Our Ever-Shrinking First Amendment Rights In The New Era Of Communication, Mary M. Roark

Mary M Roark

The First Amendment provides that “Congress shall make no law . . . abridging the freedom of speech.” Such protection has withstood the test of time and is heralded as one of our most precious rights as Americans. “The hallmark of the protection of free speech is to allow ‘free trade in ideas’—even ideas that the overwhelming majority of people might find distasteful or discomforting." However, “[t]here are certain well-defined and narrowly limited classes of speech, the prevention and punishment of which has never been thought to raise any Constitutional problem." One such proscribable form of speech is the “true …


The Harmonization Of Browsewrap Agreements Abroad And The Protection Of American Consumers, Tinsley A. Ashley Jan 2015

The Harmonization Of Browsewrap Agreements Abroad And The Protection Of American Consumers, Tinsley A. Ashley

Tinsley A Ashley

No abstract provided.


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh Jan 2015

The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh

Kavid Singh

Bitcoin is the most popular online decentralized currency in the world. Created by an enigmatic figure, Satoshi Nakamoto, in 2009, its propagation and use has caused heated controversy. On the legal side of its use, businesses both large and small have started to accept bitcoins as a form of payment. On the illegal side of its use, large quantities of bitcoins worth hundreds of millions of dollars have been stolen from businesses and large Bitcoin currency exchanges. The aim of this article is to introduce workable federal regulation that will help deter money laundering, a pervasive problem in the world …


Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague Dec 2014

Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Law Abiding Drones


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway.

Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello Oct 2014

The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello

Adam Lamparello

Technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world. The original purposes of the First Amendment, which from time immemorial have protected civil liberties and preserved the free, open, and robust exchange of information, support net neutrality. After all, laws or practices that violate cherished freedoms in the physical world also violate those freedoms in the virtual world. The battle over net neutrality is “is absolutely the First Amendment issue of our time,” just as warrantless searches of cell phones were …


‘Point And Click’ Versus Byod: Student Engagement Technologies As An Ethical Imperative For Teaching Law, Elizabeth A. Kirley Oct 2014

‘Point And Click’ Versus Byod: Student Engagement Technologies As An Ethical Imperative For Teaching Law, Elizabeth A. Kirley

Elizabeth A Kirley

What conscientious law professor of first year, large format classes in torts, contracts, or criminal law has not pondered how to better engage students while easing their reluctance to speak out in class? While many students entering law schools are quite adept with student engagement technologies (SETs) from their undergraduate studies, some law faculty seem tied to the passive environment of lectures and PowerPoint presentations and hence reject SET methodologies as so much techno-wizardry. With the entry of web-based programs into the expanding field of SETs, and increasing empirical evidence that interactive learning improves grades, closes gender gaps, and helps …


The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland Sep 2014

The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland

Steven I. Friedland

In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together in judicial decisions, creating a Stickiness Principle. In particular, form and function historically were viewed as an identity, not a dichotomy. For example, containers carried things, watches told time, and telephones were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle.

In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question …