Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit Jan 2016

Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit

Hezi Margalit

The last few decades have witnessed dramatic changes in the conceptualization and methodologies of determining legal parentage in the U.S. and other countries in the western world. Through various sociological shifts, growing social openness and bio-medical innovations, the traditional definitions of family and parenthood have been dramatically transformed. This transformation has led to an acute and urgent need for legal and social frameworks to regulate the process of determining legal parentage. Moreover, instead of progressing in a piecemeal, ad-hoc manner, the framework for determining legal parentage should be comprehensive. Only a comprehensive solution will address the differing needs of today’s …


From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit Jan 2016

From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit

Hezi Margalit

In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello Feb 2015

Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello

Adam Lamparello

In Riley v. California, the United States Supreme Court ushered privacy protections into the digital era and signaled that the Fourth Amendment would not become a constitutional afterthought. The Court unanimously held that, absent exigent circumstances, law enforcement officers could not search any area of an arrestee’s cell phone, including the outgoing call log, without a warrant and probable cause. At first glance, Riley appears to be a landmark decision in favor of individual privacy rights. As with most things, however, the devil is in the details, and the details in Riley make any celebration over the seemingly enhanced …


Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello Feb 2015

Riley V. California: A Pyrric Victory For Privacy, Adam Lamparello

Adam Lamparello

In Riley v. California, the United States Supreme Court ushered privacy protections into the digital era and signaled that the Fourth Amendment would not become a constitutional afterthought. The Court unanimously held that, absent exigent circumstances, law enforcement officers could not search any area of an arrestee’s cell phone, including the outgoing call log, without a warrant and probable cause. At first glance, Riley appears to be a landmark decision in favor of individual privacy rights. As with most things, however, the devil is in the details, and the details in Riley make any celebration over the seemingly enhanced …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway.

Put differently, a hotel owner’s expectation of privacy in a guest registry …


Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos Apr 2014

Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos

Katharine M. Villalobos

The Digital Age has introduced a new form of expression that totalitarian states are struggling to silence. With social sharing websites like Twitter and Youtube, political dissidents living under oppressive governments can expose governmental abuse to web-users worldwide in a matter of seconds. However, while digital media has proved more difficult to control than traditional, non-electronic media, dictatorships like Cuba and China are resolved to prevent its inhabitants from freely using and expressing themselves on the Internet—even if that means violating their obligations as signatories of the International Covenant on Civil and Political Rights (ICCPR).

Both Cuba and China are …


Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall Mar 2014

Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall

Adam A Marshall

In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson Jul 2013

Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson

Taylor R Robertson

Grab your cellphone, press the record button, and amaze your friends!

No advertisement like this exists in real life, of course, because the action is already universally automatic—it needs no encouragement or instruction. But aim the camera at the police and you could be arrested and face up to fifteen years in prison under some eavesdropping or wiretapping laws simply for recording the police in public speaking at volumes audible to any unassisted ear. While wiretapping laws were originally intended to protect citizens from the snooping detective, some states have effectively turned these laws into government protection from the watchful …


Contextual Expectations Of Privacy, Andrew Selbst Feb 2013

Contextual Expectations Of Privacy, Andrew Selbst

Andrew Selbst

Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …


Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias Jan 2007

Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias

ExpressO

The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.

Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.

Despite accelerating technological …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Aug 2006

In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

ExpressO

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


The Expressive Impact Of Patents, Timothy R. Holbrook Mar 2006

The Expressive Impact Of Patents, Timothy R. Holbrook

ExpressO

Patents represent a quid pro quo between the public and the inventor: in exchange for disclosing the invention, the inventor receives the right to exclude others from practicing her invention. They therefore serve as a source technical information. Patents also communicate information to markets and companies that serve to reduce various transaction costs, allowing more efficient transactions and investment. Patents consequently communicate various types of information beyond the technical.

There is no reason, however, that such messages must be limited to the technical or the pecuniary. This Article explores whether patents, like other governmental acts such as legislation, can create …


Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt Sep 2005

Getting Real About Privacy: Eccentric Expectations In The Post-9/11 World, Jeffrey A. Breinholt

ExpressO

What if science developed technology that would eliminate violent crime on American streets entirely, without jeopardizing civil liberties or personal privacy? This article describes such a scenario, and uses it to take a critical look at some of legal commentary claiming that Americans are bound to lose their rights and privacy if they fail to object to modern tools of domestic security. It concludes that those who have criticize modern scientific applications to the security challenge are overlooking well-established legal doctrines, based on eccentric fears of technology and the nation's law enforcers.


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


Race Against The Machine: An Argument For The Standardization Of Voting Technology, Jason Belmont Conn Jul 2005

Race Against The Machine: An Argument For The Standardization Of Voting Technology, Jason Belmont Conn

ExpressO

In this article/note, I examine a lingering question from the court cases arising out of the 2000 election: Does Bush v. Gore and the relevant equal protection case law open the door for a legal challenge to a state’s use of different voting machines/technologies and how do racial disparities in machine error rates impact this analysis? In addition to reviewing the current literature and case law on voting machine standardization, I also present an unrecognized and undocumented connection between the “all deliberate speed” order in Brown and the Court’s discussion of voting technology in Bush v. Gore.


‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops May 2005

‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops

ExpressO

The notion of software code replacing legal code as a mechanism to control human behavior – ‘code as law’ – is often illustrated with examples in intellectual property and freedom of speech. This article examines the neglected issue of the impact of ‘code as law’ on privacy. To what extent is privacy-related ‘code’ being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects …