Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Law

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Feb 2016

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Thomas E. Baker

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr. Nov 2015

One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.

Henry H. Perritt, Jr.

The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …


Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone Apr 2015

Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone

Michele R. Pistone

1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Mar 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague Dec 2014

Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Law Abiding Drones


One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood Sep 2014

One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood

Jonathan R. K. Stroud

Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …


Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo Aug 2014

Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo

A. Michael Froomkin

This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Jan 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2013

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …


"Do-Not-Track" As Contract, Joshua A.T. Fairfield Oct 2013

"Do-Not-Track" As Contract, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically — telephone numbers do not change, whereas Internet protocol (IP) …


The Magic Circle, Joshua A.T. Fairfield Oct 2013

The Magic Circle, Joshua A.T. Fairfield

Joshua A.T. Fairfield

This Article examines the concept of the "magic circle," the metaphorical barrier that supposedly excludes real-world law from virtual worlds. The Article argues that this metaphor fails because there is no "real" world as distinguished from "virtual" worlds. Instead of a magic circle, this Article advocates a rule of consent: actions in a virtual world give rise to legal liability if they exceed the scope of consent given by other players within the game. The Article concludes that although real-world law cannot reasonably be excluded from virtual worlds, game gods and players can control the interface between law and virtual …


The End Of The (Virtual) World, Joshua A.T. Fairfield Sep 2013

The End Of The (Virtual) World, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Virtual worlds have been the next big thing for some time now. In 2008, more than 100 public virtual worlds received venture capital funding - a significant increase over previous years. Yet virtual worlds have been going bankrupt faster than ever, including several high-profile firms and worlds. Every technology goes through a shakedown phase, and for virtual worlds the current recession has served as a catalyst for a downturn that, although not unexpected, is nevertheless startling in both numbers and rapidity. This article examines the intimate relationship between how a virtual world begins life and how it ends. The amount …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature. The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …


Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield Sep 2013

Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Just as the Internet linked human knowledge through the simple mechanism of the hyperlink, now reality itself is being hyperlinked, indexed, and augmented with virtual experiences. Imagine being able to check the background of your next date through your cell phone, or experience a hidden world of trolls and goblins while you are out strolling in the park. This is the exploding technology of Mixed Reality, which augments real places, people, and things with rich virtual experiences. As virtual and real worlds converge, the law that governs virtual experiences will increasingly come to govern everyday life. The problem is that …


Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield Sep 2013

Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Researchers love virtual worlds. They are drawn to virtual worlds because of the opportunity to study real populations and real behavior in shared simulated environments. The growing number of virtual worlds and population growth within virtual worlds has led to a sizeable increase in the number of human subjects experiments taking place in such worlds. Virtual world users care deeply about their avatars, their virtual property, their privacy, their relationships, their community, and their accounts. People within virtual worlds act much as they would in the physical world because the experience of the virtual world is “real” to them. The …


Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield Sep 2013

Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations. A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski May 2013

A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Michael J. Malinowski

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


Defying Dna: Rethinking The Role Of The Jury In An Age Of Scientific Proof Of Innocence, Andrea L. Roth Feb 2013

Defying Dna: Rethinking The Role Of The Jury In An Age Of Scientific Proof Of Innocence, Andrea L. Roth

Andrea L Roth

In 1946, public outrage erupted after a jury ordered Charlie Chaplin to support a child who, according to apparently definitive blood tests, was not his. Half a century later, juries have again defied apparently definitive evidence of innocence, finding criminal defendants guilty based on a confession or eyewitness notwithstanding exculpatory DNA test results. One might expect judges in such cases to direct an acquittal, on grounds that the evidence is legally insufficient because no rational juror could find guilt beyond a reasonable doubt. Yet few if any do. Instead, courts defer to juries when they form an actual belief in …


Patents And The University, Peter Lee Feb 2013

Patents And The University, Peter Lee

Peter Lee

This Article advances two novel claims about the internalization of academic science within patent law and the concomitant evolution of “academic exceptionalism.” Historically, relations between patent law and the university were characterized by mutual exclusion, based in part on normative conflicts between academia and exclusive rights. These normative distinctions informed “academic exceptionalism”—the notion that the patent system should exclude the fruits of academic science or treat academic entities differently than other actors—in patent doctrine. As universities began to embrace patents, however, academic science has become internalized within the traditional commercial narrative of patent protection. Contemporary courts frequently invoke universities’ commercial …


Access To Justice And Technology Clinics: A 4% Solution (With Andrew P. Medeiros) (Symposium), Ronald W. Staudt Dec 2012

Access To Justice And Technology Clinics: A 4% Solution (With Andrew P. Medeiros) (Symposium), Ronald W. Staudt

Ronald W Staudt

No abstract provided.


The Four Factor Test, Susan Freiwald Dec 2012

The Four Factor Test, Susan Freiwald

Susan Freiwald

No abstract provided.


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


Interests In The Balance: Fda Regulations Under The Biologics Price Competition And Innovation Act, Parker Tresemer Dec 2011

Interests In The Balance: Fda Regulations Under The Biologics Price Competition And Innovation Act, Parker Tresemer

Parker Tresemer

Recent biotechnology advances are yielding potentially life-saving therapies, but without FDA regulations designed to minimize product costs, patients will continue to be unable to afford these expensive biologic products. Many believe that these prohibitive costs stem from weak competition from generic biologic products, also known as follow-on biologics. To correct this deficiency, and to address the often conflicting regulatory and policy concerns associated with biologic products, Congress enacted the Biologics Price Competition and Innovation Act. The Act created an abbreviated approval pathway for biologic products and, if effective, could increase competition while driving down product costs. But legislation alone is …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …