Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 48

Full-Text Articles in Law

Narrowing Data Protection's Enforcement Gap, Filippo Lancieri Mar 2022

Narrowing Data Protection's Enforcement Gap, Filippo Lancieri

Maine Law Review

The rise of data protection laws is one of the most profound legal changes of this century. Yet, despite their nominal force and widespread adoption, available data indicates that these laws recurrently suffer from an enforcement gap—that is, a wide disparity between the stated protections on the books and the reality of how companies respond to them on the ground. Indeed, Appendix I to this Article introduces a novel literature review of twenty-six studies that analyzed the impact on the ground of the GDPR and the CCPA: none found a meaningful improvement in citizen’s data privacy. This raises the question: …


3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom Apr 2016

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom

Evan R. Youngstrom

Today, our society is on a precipice of significant advancement in healthcare because 3D printing will usher in the next generation of medicine. The next generation will be driven by customization, which will allow doctors to replace limbs and individualize drugs. However, the next generation will be without large pharmaceutical companies and their justifications for strong intellectual property rights. However, the current patent system (which is underpinned by a social tradeoff made from property incentives) is not flexible enough to cope with 3D printing’s rapid development. Very soon, the social tradeoff will no longer benefit society, so it must be …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo Aug 2015

"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo

Críspulo Marmolejo

This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …


Visualizing Dna Proof, Nicholas L. Georgakopoulos Aug 2015

Visualizing Dna Proof, Nicholas L. Georgakopoulos

Nicholas L Georgakopoulos

DNA proof inherently involves the use of probability theory, which is often counterintuitive. Visual depictions of probability theory, however, can clarify the analysis and make it tractable. A DNA hit from a large database is a notoriously difficult probabi­li­ty theory issue, yet the visuals should enable courts and juries to handle it. The Puckett facts are an example of a general approach: A search in a large DNA database produces a hit for a cold crime from 1972 San Francisco. Probability theory allows us to process the probabilities that someone else in the database, someone not in the database, or …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


The Law And Ethics Of High-Frequency Trading, Steven R. Mcnamara Mar 2015

The Law And Ethics Of High-Frequency Trading, Steven R. Mcnamara

Steven R. McNamara

Michael Lewis’s recent book Flash Boys has resurrected the controversy concerning “high-frequency trading” (HFT) in the stock markets. While HFT has been important in the stock markets for about a decade, and may have already peaked in terms of its economic significance, it touched a nerve with a public suspicious of financial institutions in the wake of the financial crisis of 2008-2009. In reality, HFT is not one thing, but a wide array of practices conducted by technologically adept electronic traders. Some of these practices are benign, and some even bring benefits such as liquidity and improved price discovery to …


Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg Feb 2015

Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg

Seth C Oranburg

Title III of the JOBS Act of 2012, which attempts to encourage entrepreneurship by allowing startups and small business to sell stock to the general public over the Internet through “crowdfunding,” is completely backwards. Its ceiling should be a floor—the $1 million limit should be inverted. By capping startups at raising $1 million from crowdfunding, the JOBS Act does not address the private equity gap, a fundamental problem in startup markets, and exposes unsophisticated investors to risk and fraud. This Article presents a regulatory framework premised on “bridgefunding,” an approach that this article develops to protect new investors by encouraging …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Copyright Porn Trolls, Wasting Taxi Medallions, And The Propriety Of ‘Property’, Tom W. Bell Dec 2014

Copyright Porn Trolls, Wasting Taxi Medallions, And The Propriety Of ‘Property’, Tom W. Bell

Tom W. Bell

What happens when the government creates privileges that have powers rivaling those that the common law accords to property? Recent events in two seemingly unrelated areas suggest a troubling answer to that question. First, in copyright, porn trolls have sued thousands of John Does for allegedly participating in illegal file sharing. These suits evidently seek not judicial vindication but merely the defendants' identities, which the plaintiffs then use to reap settlement payments from guilty and innocent alike. Second, taxi drivers in cities across the world have launched legal, political, and physical attacks against Uber and other networked transportation services, accusing …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner Mar 2014

Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement—based on their forecast of the outcome at trial and associated costs. Lawyers bargaining in the shadow of trial have traditionally relied on their knowledge of precedent, intuition, and previous interactions with the presiding judge and opposing counsel to forecast trial outcomes and litigation costs. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in aggregated litigation data. In this Article, we describe the tools …


C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt Feb 2014

C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt

Victor B Flatt

After several decades of improvement, water quality in the United States is getting worse, and the problem is primarily caused by run-off from non-point sources, such as farms and urban development. These non-point sources have never had regulatory mandates in the Clean Water Act, and have proven very difficult to control. With little likelihood of comprehensive statutory changes, the EPA and the states that administer the Clean Water Act have looked to other regulatory means to address this problem. One of the most prominent has been the use of markets in pollution (particularly for nutrient pollution from run-off) to provide …


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner Sep 2013

Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …


Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen Aug 2013

Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen

Mirit Eyal-Cohen

Small businesses are regarded the engine of the economy. But just what is a “small” business? Depending on where one looks in the law, the definitions vary and they differ from one section to another. Unfortunately, what these various size classifications fail to assess, are the policy considerations and the legislative intent for granting regulatory preferences to small concerns to begin with.

In the last century, the U.S. government has been cultivating one such policy of fiscal and economic growth. Consequently, Congress and private institutions have been acting to incentivize, support and reward entrepreneurship through the law in order to …


Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower Apr 2013

Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower

Richard Cameron Gower

Despite some difficulties, state tort law can be argued to create a unique exception to patent law. Specifically, the prevented rescue doctrine suggests that charities and others can circumvent patents on certain critical medications when such actions are necessary to save individuals from death or serious harm. Although this Article finds that the prevented rescue tort doctrines is preempted by federal patent law, all hope is not lost. A federal substantive due process claim may be brought that uses the common law to demonstrate a fundamental right that has long been protected by our Nation’s legal traditions. Moreover, this Article …


Copyright Freeconomics, John M. Newman Feb 2013

Copyright Freeconomics, John M. Newman

John M. Newman

Innovation has wreaked creative destruction on traditional content platforms. During the decade following Napster’s rise and fall, industry organizations launched litigation campaigns to combat the dramatic downward pricing pressure created by the advent of zero-price, copyright-infringing content. These campaigns attracted a torrent of debate, still ongoing, among scholars and stakeholders—but this debate has missed the forest for the trees. Industry organizations have abandoned litigation efforts, and many copyright owners now compete directly with infringing products by offering licit content at a price of $0.

This sea change has ushered in an era of “copyright freeconomics.” Drawing on an emerging body …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Cyberspace Self-­‐Governance And Its Role And Limits In Regulating Virtual World Property Relationships, Linda Margaret Broughton Mar 2011

Cyberspace Self-­‐Governance And Its Role And Limits In Regulating Virtual World Property Relationships, Linda Margaret Broughton

Linda Margaret Broughton

The purpose of this paper is to explore the limits of cyberspace self-governance in governing property relationships in the virtual world. First this paper will explore what constitutes a virtual world and the theory of cyberspace self-rule within a virtual world. Next this paper will explore the four common types of property relationships originating from a virtual world. Then this paper will explore the concept of cyberspace self-rule as it is applied in virtual worlds, drawing on current academic literature covering this topic. Finally, this paper will demonstrate the limitations of self-determination in adequately governing these property relationships.


When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry Jan 2007

When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry

ExpressO

As research has advanced, technologies have become more closely knit, and the relationships between them—both complementary and competitive—have become increasingly important. Unfortunately, the patent system’s use of monopoly power to reward innovators creates inefficient results by overly encouraging the development of substitute technologies and discouraging the development of complementary technologies. This paper explains how an optional patent purchase system could help ameliorate such problems and discusses the implications of such a system.


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Copyright's Empire: Why The Law Matters , Alina Ng Sep 2006

Copyright's Empire: Why The Law Matters , Alina Ng

ExpressO

Two separate and distinct movements have colonized research in the field of intellectual property. Law and economics has deepened our understanding of the justification for granting monopoly rights over intellectual property. In recent years, economic theories have been used to support the growth of the commons – the free environment, where intellectual property plays little role in generating new creative works and innovation. The second movement is law and technology that has sought to increase understanding of intellectual property through the exploration of how technologies either provide freedoms or impose limitations to how creative works and innovation are created and …


Cash, Credit Or Cell Phone? How To Influence Public Preferences About Payment Systems, Sarah E. Waldeck, Erik Lillquist Sep 2006

Cash, Credit Or Cell Phone? How To Influence Public Preferences About Payment Systems, Sarah E. Waldeck, Erik Lillquist

ExpressO

The paper examines how the government can influence the public’s choice of a particular payment system: not only existing systems like credit and debit cards, but innovative products such as stored value cards, electronic checks and electronic money. The success or failure of a new payment system can have a large economic impact, with shifts toward electronic payment options in particular having the potential to save up to one percent of a nation’s gross domestic product. For the United States, that translates to approximately one hundred billion dollars worth of savings.

Whether a new payment system succeeds or fails depends …


Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs Sep 2006

Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs

ExpressO

The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …


Law And The Science Of Networks: An Overview And An Application To The "Patent Explosion", Katherine J. Strandburg Aug 2006

Law And The Science Of Networks: An Overview And An Application To The "Patent Explosion", Katherine J. Strandburg

ExpressO

The network may be the metaphor of the present era. A network, consisting of “nodes” and “links,” may be a group of individuals linked by friendship; a group of computers linked by network cables; a system of roads or airline flights -- or another of a virtually limitless variety of systems of connected “things.” The past few years have seen an explosion of interest in “network science,” which seeks to move beyond metaphor to analysis in fields from physics to sociology. Network science highlights the role of relationship patterns in determining collective behavior. It underscores and begins to address the …


Why It Is Time To Eliminate Genomic Patents, Together With Natural Extracts Doctrine That Have Supported Such Patents, Allen K. Yu Jul 2006

Why It Is Time To Eliminate Genomic Patents, Together With Natural Extracts Doctrine That Have Supported Such Patents, Allen K. Yu

ExpressO

The constitutional purpose of intellectual property is to “promote the progress of science and useful arts.” Given the utilitarian basis of patents, it is critical that policies and laws must be continually adjusted to reflect the needs of new technologies. When the law tries to shield itself from rather than confront the realities of underlying technologies, patents end up actually subverting rather than promote technological progress. This paper explores why the natural extracts doctrine belongs to the class of doctrines that subvert progress. The doctrine, established over a century ago to enable the patenting of purified compounds for use as …


Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel Jul 2006

Are Patented Research Tools Still Valuable? Use, Intent, And A Rebuttable Presumption: A Proposed Modification For Analyzing The Exemption From Patent Infringement Under 35 Usc 271 (E) (1), Vihar R. Patel

ExpressO

Briefly, the article proposes to have courts focus on the nature of an individual's use and apply the "UART" (Use As a Research Tool) factors to determine if a patented invention is being used as a research tool. If a patented invention is being used as a research tool, then the court is to presume that the activities are not covered by the FDA exemption. However, this presumption can be rebutted by a researcher's demonstration of the research tool owner using his patent to block efforts to develop a competing product. If the presumption is rebutted, then the court applies …