Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

Journal

2016

Institution
Keyword
Publication

Articles 1 - 30 of 187

Full-Text Articles in Law

Quintavalle: The Quandary In Bioethics, Lisa Cherkassky Dec 2016

Quintavalle: The Quandary In Bioethics, Lisa Cherkassky

Journal of Law and Health

The case of R. (Quintavalle) v. Human Fertilisation Embryology Authority (and Secretary of State for Health) presents a handful of legal problems. The biggest legal query to arise from the case is the inevitable harvest of babies, toddlers and very young children for their bone marrow. This article unpacks the judicial story behind Quintavalle to reveal how the strict provisions of the Human Fertilisation and Embryology Act 1990 - namely ‘suitable condition’ under schedule 2 paragraph 1(1)(a) and ‘treatment services’ and ‘assisting’ under section 2(1) - were widely misinterpreted to introduce the social selection of embryos into law. The legal …


The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan Dec 2016

The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan

Richmond Journal of Law & Technology

After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of 2012 as “The Summer of the Data Breach.” Four years later, businesses across multiple industries have suffered brand-image damage and paid millions of dollars in remedial expenses; we are living in the era of the mega breach. In 2014, companies such as Target, Home Depot, JP Morgan Chase, Anthem, Sony, UPS, Jimmy John’s, Kmart, Neiman Marcus, Community Health Systems, and the White House suffered data breaches. The Home Depot breach alone resulted in the loss of “56 million credit card accounts,” …


R-Egg-Ulation: A Call For Greater Regulation Of The Big Business Of Human Egg Harvesting, Danielle A. Vera Dec 2016

R-Egg-Ulation: A Call For Greater Regulation Of The Big Business Of Human Egg Harvesting, Danielle A. Vera

Michigan Journal of Gender & Law

When it comes to young healthy women “donating” their eggs, America has a regulation problem. This Note explains the science behind the harvesting of human eggs, focusing on potential egg donors, and describes the specific factors that make egg donation a unique type of transaction. It describes the current regulatory status of the assisted reproductive technology industry in the United States and highlights the ways in which this scheme fails to protect egg “donors.” This Note concludes with a call for comprehensive regulation of the assisted reproductive technology industry.


Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian Dec 2016

Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian

Brooklyn Journal of Corporate, Financial & Commercial Law

As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts Dec 2016

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …


The Question Concerning Technology In Compliance, Sean J. Griffith Dec 2016

The Question Concerning Technology In Compliance, Sean J. Griffith

Brooklyn Journal of Corporate, Financial & Commercial Law

In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.


Compliance, Technology, And Modern Finance, Tom C.W. Lin Dec 2016

Compliance, Technology, And Modern Finance, Tom C.W. Lin

Brooklyn Journal of Corporate, Financial & Commercial Law

An important transformation is happening in the financial industry. The rise of new technology and compliance has dramatically altered many of the key functions and functionaries of modern finance. Artificial intelligence, algorithmic programs, and supercomputers, instead of human actors, now constitute the core of many financial operations. Compliance officers have become just as critical to financial institutions as traders, bankers, and analysts. Finance as we knew it has changed and continues to change. This symposium Article offers a studied commentary on these unfolding changes, the crosscutting developments in compliance, technology, and modern finance. It examines the concurrent and intersecting ascents …


Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


Mitigating Cyber Risk In It Supply Chains, Maureen Wallace Dec 2016

Mitigating Cyber Risk In It Supply Chains, Maureen Wallace

Global Business Law Review

This note argues that the United States needs to utilize current federal agencies to begin introducing cyber supply chain risk management regulation for IT supply chains. Cyber supply chain risk management is a critical area of cybersecurity that has barely been recognized by the United States government. The globalization of the digital world has introduced a new spectrum of risk management issues that affect the products exchanged by businesses and consumed by individuals and government agencies. While there have been some initiatives toward the promotion of tighter cybersecurity regulation, most initiatives only concern the public sector, leaving the private sector …


Playing Off-Key: Trans-Atlantic Data Regulation In A Discordant World, Jennifer L. Bauer Dec 2016

Playing Off-Key: Trans-Atlantic Data Regulation In A Discordant World, Jennifer L. Bauer

West Virginia Law Review

No abstract provided.


Optimal Property Rights For Emerging Natural Resources: A Case Study On Owning Atmospheric Moisture, Jianlin Chen Nov 2016

Optimal Property Rights For Emerging Natural Resources: A Case Study On Owning Atmospheric Moisture, Jianlin Chen

University of Michigan Journal of Law Reform

This Article critically examines the design of property rights for emerging natural resources—naturally occurring substances that humans have only recently come to be able to exploit viably—through a case study of how the fifty states allocate ownership in, and regulate the use of, atmospheric moisture, an issue that has emerged in the context of weather modification (particularly cloud seeding). Building on the surprising finding that legislative declarations of state ownership have not resulted in greater regulatory control or other substantial restrictions on private use, this Article highlights a dimension of property rights design that has yet to receive concerted scholarly …


Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz Nov 2016

Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz

The University of New Hampshire Law Review

The presumption of innocence and the right to a fair trial lie at the core of the United States justice system. While existing rules and practices serve to uphold these principles, the administration of justice is significantly compromised by a covert but influential factor: namely, implicit racial biases. These biases can lead to automatic associations between race and guilt, as well as impact the way in which judges and jurors interpret information throughout a trial. Despite the well-documented presence of implicit racial biases, few steps have been taken to ameliorate the problem in the courtroom setting. This Article discusses the …


Privatization Of The Judiciary, Eldar Haber Oct 2016

Privatization Of The Judiciary, Eldar Haber

Seattle University Law Review

The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …


The Internet Of Things: Where Privacy And Copyright Collide, Lidiya Mishchenko Oct 2016

The Internet Of Things: Where Privacy And Copyright Collide, Lidiya Mishchenko

Santa Clara High Technology Law Journal

The Internet of Things: Where Privacy and Copyright Collide


A Genre Theory Of Copyright, Omri Rachum-Twaig Oct 2016

A Genre Theory Of Copyright, Omri Rachum-Twaig

Santa Clara High Technology Law Journal

A Genre Theory of Copyright


Indifference And Secondary Liability For Copyright Infringement, Richard G. Kunkel Oct 2016

Indifference And Secondary Liability For Copyright Infringement, Richard G. Kunkel

Santa Clara High Technology Law Journal

Indifference and Secondary Liability for Copyright Infringement


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow Oct 2016

Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow

Loyola of Los Angeles Law Review

No abstract provided.


Change In Regulation Is Necessary For Genetically Engineered Mosquitoes, Insung Hwang Oct 2016

Change In Regulation Is Necessary For Genetically Engineered Mosquitoes, Insung Hwang

Michigan Journal of Environmental & Administrative Law

Millions of genetically engineered (GE) mosquitoes could soon be released in Key West, Florida as an effort to eradicate wild mosquitoes that are transmitters of diseases such as malaria, dengue, and chikungunya. Both international and domestic regulations fail to provide effective regulatory schemes that can facilitate the application of this technology while ensuring all safety and environmental aspects are properly addressed. The Food and Drug Administration’s assertion of jurisdiction is based on its assessment that the GE mosquitoes are “animal drugs” under the Federal Food, Drug, and Cosmetic Act. This is especially troublesome because the end goal of using these …


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Ebola, Experimental Medicine, Economics, And Ethics: An Evaluation Of International Disease Outbreak Law, Sara L. Dominey Sep 2016

Ebola, Experimental Medicine, Economics, And Ethics: An Evaluation Of International Disease Outbreak Law, Sara L. Dominey

Georgia Journal of International & Comparative Law

No abstract provided.


Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder Sep 2016

Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder

The University of Cincinnati Intellectual Property and Computer Law Journal

Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …


"I'Ll See": How Surveillance Undermines Privacy By Eroding Trust, Robert H. Sloan, Richard Warner Aug 2016

"I'Ll See": How Surveillance Undermines Privacy By Eroding Trust, Robert H. Sloan, Richard Warner

Santa Clara High Technology Law Journal

"I'll See": How Surveillance Undermines Privacy By Eroding Trust


Can Digital Speech Loosen The Gordian Knot Of Reputation Law?, Elizabeth A. Kirley Aug 2016

Can Digital Speech Loosen The Gordian Knot Of Reputation Law?, Elizabeth A. Kirley

Santa Clara High Technology Law Journal

Can Digital Speech Loosen the Gordian Knot of Reputation Law?


Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher Aug 2016

Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher

Pace International Law Review

Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …


After O2 Micro: The Court's Evolving Duty To Map Words To Things, Peter E. Gratzinger Aug 2016

After O2 Micro: The Court's Evolving Duty To Map Words To Things, Peter E. Gratzinger

Santa Clara High Technology Law Journal

After O2 Micro: The Court's Evolving Duty to Map Words to Things


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Neuroimaging Evidence: A Solution To The Problem Of Proving Pain And Suffering?, Brady Somers Jul 2016

Neuroimaging Evidence: A Solution To The Problem Of Proving Pain And Suffering?, Brady Somers

Seattle University Law Review

Envision a plaintiff who was injured on the job at a construction site due to his employer’s negligence. The plaintiff has chronic back pain, but it is not verifiable on an X-ray, nor is a physical injury readily discernible by any other technology. Presently, fact finders are given the broad discretion to decide whether they find this plaintiff credible, and accordingly, whether they believe he is truly in pain and deserves damages for pain and suffering. However, neuroimaging—specifically functional magnetic resonance imaging (fMRI)—could allow those fact finders to visualize whether this plaintiff was hurting by depicting the unique signatures that …