Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 46 of 46

Full-Text Articles in Law

Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser Jan 2013

Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser

Lily M Strumwasser

Dear Editor:

I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …


Cybersecurity Policy For The Electricity Sector: The First Step To Protecting Our Critical Infrastructure From Cyber Threats, Zhen Zhang Ms. Jan 2013

Cybersecurity Policy For The Electricity Sector: The First Step To Protecting Our Critical Infrastructure From Cyber Threats, Zhen Zhang Ms.

Zhen Zhang Ms.

Electricity forever changed the dark nights. Without the human ingenuity that harnessed energy in the form of electricity, our world would be very different. Computers and information technology would have never become part of our social fabric. Today, no country is more reliant on information technology and electricity than the United States. Due to these inter-dependencies, cybersecurity threats can compromise the critical infrastructure foundation of the United States. In light of this, the electricity sector is among the only critical infrastructure sectors with mandatory cybersecurity standards. This Article focuses on cybersecurity in the context of the electricity sector, despite that …


What Should Be Patentable? A Proposal For Determining The Existence Of Statutory Subject Matter Under 35 U.S.C. Sec. 101, Andrew Beckerman Rodau Jan 2013

What Should Be Patentable? A Proposal For Determining The Existence Of Statutory Subject Matter Under 35 U.S.C. Sec. 101, Andrew Beckerman Rodau

Andrew Beckerman Rodau

The question of what type of inventions should be protectable under patent law is a controversial issue that has received significant attention. Recent Supreme Court decisions reject a bright line test in favor of a more-opened ended approach to determining patent eligibility. Unfortunately, this provides limited guidance to lower courts and consequently the issue remains unsettled. Most inventions fit within the statutory requirements defining patent-eligible inventions. This article will examine the scope of patent-eligible subject matter defined by patent law section 101. It will look at judicial interpretation of the statute including exceptions judicially engrafted onto the statute by the …


The New Frontier Of Advanced Reproductive Technology: Reevaluating Modern Legal Parenthood, Yehezkel H. Margalit Dr., John D. Loike Dr., Orrie Levy Adv. Jan 2013

The New Frontier Of Advanced Reproductive Technology: Reevaluating Modern Legal Parenthood, Yehezkel H. Margalit Dr., John D. Loike Dr., Orrie Levy Adv.

Hezi Margalit

Assisted reproductive technologies (ARTs) have challenged our deepest conceptions of what it means to be a parent by fragmenting traditional aspects of parenthood. The law has been slow to respond to this challenge, and numerous academic articles have proposed models for adapting parentage laws to ARTs. In the coming years, however, scientific advancements in reproductive technologies, such as somatic cell nuclear transfer and stem cell technologies, will challenge both parentage laws and proposed legal models for traditional ARTs in new and fascinating ways. For instance, these advanced technologies could allow two women to create a child without any male genetic …


Towards Determining Legal Parentage By Agreement In Israel, Yehezkel Margalit Jul 2012

Towards Determining Legal Parentage By Agreement In Israel, Yehezkel Margalit

Hezi Margalit

In Israel as in other parts of the world, families, parenthood, and relations between parents and children have changed dramatically over the past few decades. So, too, developments in modern medicine have enhanced the ability to separate sexuality from fertility and parenthood. Many researchers feel that the legal system has not kept pace with these changes, and that traditional models of familial relationships no longer provide adequate tools for dealing with them. In order to bridge the gap between a desired social status and current law, a growing number of parents seek to regulate the status, rights, and obligations of …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar Jan 2011

Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar

Reuven Ashtar

This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …


An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou Jan 2011

An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou

Konstantinos Stylianou

This paper considers the mechanics and role of innovation in telecommunications networks, and explains how regulation can be designed to maximize innovation. To better focus on the relationship between innovation and regulation an effort is made to distinguish innovation from competition, although the two concepts are closely related, and several reasons are presented on why the fast changing, networked and technical nature of telecommunications offers a very favorable environment for innovation to thrive, as well as why innovation benefits from a large number of actors. Moreover, the paper further explains that even small players are useful in the innovation process …


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Biometrics, Retinal Scanning, And The Right To Privacy In The 21st Century, Stephen Hoffman Jan 2010

Biometrics, Retinal Scanning, And The Right To Privacy In The 21st Century, Stephen Hoffman

Stephen P. Hoffman

Biometric identification techniques such as retinal scanning and fingerprinting have now become commonplace, but near-future improvements on these methods present troubling issues for personal privacy. For example, retinal scanning can be used to diagnose certain medical conditions, even ones for which the patient has no symptoms or has any other way of detecting the problem. If a health insurance company scans the retinas of potential clients before they purchase coverage, they could be charged higher premiums for conditions that do not present any issues. Not only is this unfair, but the ease with which these scans can be conducted—including scanning …


The Rise, Fall And Rise Again Of The Genetic Foundation For Legal Parentage Determination, Yehezkel Margalit Jan 2010

The Rise, Fall And Rise Again Of The Genetic Foundation For Legal Parentage Determination, Yehezkel Margalit

Hezi Margalit

Recently, we have witnessed dramatic changes in the formation of the family and parenthood. One of the results of those shifts is a growing number of children growing up outside of the traditional marriage framework. Therefore, the dilemma of determining a child's parentage, which was usually resolved by a legal fiction as to the child's legal parents, is becoming increasingly problematic. It is appropriate that any discussion of the establishment of legal parentage should start with a study of the rise of the most popular modern model, the genetic model.

It is relevant to point out that from the beginning …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …


A Defense Of Stem Cell Research, Gregory Dolin Oct 2009

A Defense Of Stem Cell Research, Gregory Dolin

Gregory Dolin

Isolation of human embryonic stem cells in 1998 simultaneously caused great excitement and concern in the scientific community and the population at large. The great promises that the discovery held were viewed with suspicion by many, because the isolation of these stem cells involved destruction of an embryo, and thus, according to some, destruction of innocent human life. Full ten years later, the debate still rages. The present Article proposes a solution to this debate.The solution concedes that the embryo is a human being entitled to full moral protection. Having made that concession, however, the Article proceeds to argue that …


International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth Jan 2009

International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth

Gary E. Marchant

Nanomedicine holds enormous promise for the improved prevention, detection and treatment of disease. Yet, at the same time, countervailing concerns about the potential safety risks of nanotechnologies generally, and nanomedical products specifically, threaten to derail or at least delay the introduction and commercial viability of many nanomedicine applications. All around the globe, national governments are struggling with balancing these competing benefits and risks of nanotechnology in the medical and other sectors. It is becoming increasingly clear that reasonable, effective and predictable regulatory structures will be critical to the successful implementation of nanotechnology. The question examined in this paper is whether …


International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth Jan 2009

International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth

Gary E. Marchant

Nanomedicine holds enormous promise for the improved prevention, detection and treatment of disease. Yet, at the same time, countervailing concerns about the potential safety risks of nanotechnologies generally, and nanomedical products specifically, threaten to derail or at least delay the introduction and commercial viability of many nanomedicine applications. All around the globe, national governments are struggling with balancing these competing benefits and risks of nanotechnology in the medical and other sectors. It is becoming increasingly clear that reasonable, effective and predictable regulatory structures will be critical to the successful implementation of nanotechnology. The question examined in this paper is whether …


Of Mice And Men: Why An Anticommons Has Not Emerged In The Biotechnological Realm, Chester J. Shiu Jan 2009

Of Mice And Men: Why An Anticommons Has Not Emerged In The Biotechnological Realm, Chester J. Shiu

Chester J Shiu

In 1998 Michael Heller and Rebecca Eisenberg posited that excessive patenting of fundamental biomedical innovations might create a “tragedy of the anticommons.” A decade later, their dire predictions have not come to pass, an outcome which calls much of the legal scholarship on the topic into question. This Article proposes that legal commentators’ theoretical arguments have largely ignored two very important factors. First, the National Institutes of Health (NIH)—the single most important actor in the biomedical research industry—has played an active role in keeping the biomedical research domain open. In particular, regardless of what the current patent regime may theoretically …