Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr Jul 2014

"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr

Robert Hupf Jr

This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …


Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty Jul 2014

Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty

Meredith W. Doherty

As the technology of smartphones has progressed, electronic communication has become an integral and portable part of our daily lives. A recent New Jersey case highlighted the issue of holding the sender of a text message liable for injuries resulting from a motor vehicle accident in which the driver at fault was reading a text message from the sender at the time of the accident. This note focuses on the implications of such liability being imposed on senders of text messages as well as the slippery slope that could result, taking all forms of electronic communication, social media and mobile …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Jun 2014

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


The Infringement Continuum, Bernard H. Chao Apr 2014

The Infringement Continuum, Bernard H. Chao

Bernard H Chao

For many years, patent law has struggled with the issue of permissible claim scope. A patent’s specification and its claims often suffer from a surprising disconnect. The specification generally describes an invention in terms of one or more specific implementations; suggesting a relatively narrow invention. But claims are drafted far more broadly. They frequently encompass unforeseen variations and even cover after arising technology.

Although there are numerous existing doctrines that try to prevent claims from straying too far from their specification, these doctrines offer binary outcomes ill-suited for patent law. Under these doctrines, as a claim encompasses subject matter further …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Consciousness And Futility: A Proposal For A Legal Redefinition Of Death, Christopher Smith Mar 2014

Consciousness And Futility: A Proposal For A Legal Redefinition Of Death, Christopher Smith

Christopher R Smith

Recent controversies in Texas (with the Marlise Muñoz case) and in California (with the Jahi McMath case) have highlighted a lamentable flaw in the current legal conception of human death, and the difficulty of defining when death finally occurs. The unworkable notion of “brain-death” remains the law in every state in the union, yet the philosophical and scientific foundations of this notion remain open to attack. This article posits that death is a fundamentally social construct, and that it is society at large (through its laws, public opinions, religious attitudes, etc.) that actually defines death. This essay then argues that …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner Mar 2014

Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement—based on their forecast of the outcome at trial and associated costs. Lawyers bargaining in the shadow of trial have traditionally relied on their knowledge of precedent, intuition, and previous interactions with the presiding judge and opposing counsel to forecast trial outcomes and litigation costs. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in aggregated litigation data. In this Article, we describe the tools …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


“Step Into The Game”: Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of “Terroristic Speech”, Robert Hupf Jr Jan 2014

“Step Into The Game”: Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of “Terroristic Speech”, Robert Hupf Jr

Robert Hupf Jr

This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …


An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock Jan 2014

An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock

Ferris K Nesheiwat

This article seeks to provide a socio-legal framework for the examination of the attitude of a section of the Jordanian public towards intellectual property rights (IPRs), using copyright protected software as an example; it provides an overview of perceptions of IPRs within an Arabic and predominantly Muslim society, and examines how such perceptions impact attitudes towards abiding with, and enforcement of, IPRs. Through its analytical value and empirical research, this paper fills a void in the availability of reliable empirical data in Jordan as part of the analysis to gauge the impact of intellectual property (IP) laws. A review of …


Will More, Better, Cheaper, And Faster Monitoring Improve Environmental Management?, Ryan P. Kelly Jan 2014

Will More, Better, Cheaper, And Faster Monitoring Improve Environmental Management?, Ryan P. Kelly

Ryan P Kelly

Two critical problems in environmental management are a lack of primary data and the difficulty of assessing the environmental impacts of human activities. Producing the information necessary to address these twin challenges is often difficult and expensive, which impedes decisionmaking in environmental management. I focus here on the possibility of making data collection more powerful and more cost-effective with a suite of analyses made tractable by emerging technology for genetic analysis. More, better, cheaper, and faster information about the planet’s living resources promises to influence a wide range of legal and policy processes—from Clean Water Act compliance and related public …


Eccentric Positionally As A Precondition For The Criminal Liability For Artificial Life Forms, Mireille Hildebrandt Jan 2014

Eccentric Positionally As A Precondition For The Criminal Liability For Artificial Life Forms, Mireille Hildebrandt

Mireille Hildebrandt

This contribution explores Plessner’s distinction between animal centricity and human eccentricity as “a difference that makes a difference” for the attribution of criminal liability to artificial life forms (ALFs). Building on the work of Steels and Bourgine & Varela on artificial life and Matura & Varela’s notion of autopoiesis I will reason that even if ALFs are autonomous in the sense even of having the capacity to rewrite their own program, this in itself is not enough to understand them as autonomous in the sense of instantiating an eccentric position that allows for reflection on their actions as their own …