Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

Law and Technology

Discipline
Publication Year
Publication

Articles 31 - 60 of 215

Full-Text Articles in Law

The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss Jan 2014

The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss

Dorit R. Reiss

The California Public Utilities Commission addressed both pricing deregulation and universal service in telecommunications during the last decade. Both decisions had a similar cast of characters, and similarly elaborate processes. In relation to price deregulation, the utilities positions were accepted on every issue addressed; in relation to universal service, consumer organizations’ positions were accepted in about 60% of the issues. This article tells the story of how those decisions were made, and examines the reasons for the difference in impact. The article examines and reject an explanation of capture; accepts in part a focus on the influence of the commissioner …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Jan 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.


California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson Dec 2013

California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson

Jennifer Jackson

In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …


Anticipating The Storm: Predicting And Preventing Global Technology Conflicts, Sabrina Safrin Dec 2013

Anticipating The Storm: Predicting And Preventing Global Technology Conflicts, Sabrina Safrin

Sabrina Safrin

This article helps lay the foundation for a new field of international law — International Law and Technology — and opens novel avenues of inquiry in law and technology and intellectual property more broadly. It analyzes as a starting point why some technologies generate global conflicts while others do not. Technologies that face international resistance can trigger a barrage of international legal responses, ranging from trade bans and WTO disputes to international regulatory regimes and barriers to patenting. Agricultural biotechnology triggered all of these legal flashpoints, while the cellphone, a technology that grew up alongside it, triggered none. Why?

Understanding …


Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid Dec 2013

Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid

Melanie M. Reid

One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner Dec 2013

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

Richard Warner

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Discretionary Injunctive Relief For Patent Infringement: Partial Remuneration After Ebay And Its Implications For The Developing World, Richard Li-Dar Wang Dec 2013

Discretionary Injunctive Relief For Patent Infringement: Partial Remuneration After Ebay And Its Implications For The Developing World, Richard Li-Dar Wang

Richard Li-dar Wang

The eBay decision of the U.S. Supreme Court in 2006 opens the door for discretionary injunctive relief in patent infringement cases. This essay examines the development of case law and scholarly discussion in the post-eBay era. The author finds eBay illuminates that patents are not private rights that demand full remuneration when being infringed, but rather a tool of incentivizing sufficient innovations to the public. The remedies for patent infringement need not redress all the losses that the patentee suffers, but rather simply reimburse the R&D cost for the purpose of preventing over-incentivizing. Six indicators are put forth to assess …


Keeping Up With The Game: The Use Of The Nash Bargaining Solution In The Calculation Of Reasonable Royalty Damages In Patent Infringement Cases, Lance E. Wyatt Jr. Dec 2013

Keeping Up With The Game: The Use Of The Nash Bargaining Solution In The Calculation Of Reasonable Royalty Damages In Patent Infringement Cases, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

Determining damages are an integral stage in the patent litigation process. Since 1970, reasonable royalty damages have been calculated using the factors set forth in the seminal decision, Georgia-Pacific Corp. v. United States Plywood Corp. However, these factors are prone to manipulation and abuse by damages experts. Using a solution to a two-person bargaining situation developed by John Nash, Jr. in 1950, damages experts have utilized the Nash Bargaining Solution as a method to calculate reasonable royalty damages in patent infringement cases. Since its introduction in patent infringement cases, courts have been reluctant to admit the use of the NBS …


The Doctrine Of Equivalents And Interchangeability In The United States, Taiwan And China, Tien-Pang Chang, Li-Dar Wang, Shang-Jyh Liu Nov 2013

The Doctrine Of Equivalents And Interchangeability In The United States, Taiwan And China, Tien-Pang Chang, Li-Dar Wang, Shang-Jyh Liu

Richard Li-dar Wang

The United States, Taiwan and China have similar systems for determining patent infringement under the doctrine of equivalents. The courts in these countries apply the test of interchangeability in finding infringement under the doctrine of equivalents. However, the courts in the United States, Taiwan and China evaluate interchangeability in different ways. In the United States, the interchangeability is one important factor for determining equivalent infringement in addition to the function, way and result factors in the triple identity test. Nevertheless, the court does not necessarily have to consider interchangeability and can’t rely only on the interchangeability factor to find equivalent …


The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn Oct 2013

The Constitutional Infirmity Of Warrantless Nsa Surveillance: The Abuse Of Presidential Power And The Injury To The Fourth Amendment, Robert M. Bloom, William J. Dunn

Robert Bloom

In recent months, there have been many revelations about the tactics used by the Bush Administration to prosecute their war on terrorism. These stories involve the exploitation of technologies that allow the government, with the cooperation of phone companies and financial institutions, to access phone and financial records. This paper focuses on the revelation and widespread criticism of the Bush Administration’s operation of a warrantless electronic surveillance program to monitor international phone calls and emails that originate or terminate with a United States party. The powerful and secret National Security Agency heads the program and leverages its significant intelligence collection …


Doctors, Patients, And Pills--A System Popping Under Too Much Physician Discretion? A Law-Policy Prescription To Make Drug Approval More Meaningful In The Delivery Of Health Care, Michael J. Malinowski Oct 2013

Doctors, Patients, And Pills--A System Popping Under Too Much Physician Discretion? A Law-Policy Prescription To Make Drug Approval More Meaningful In The Delivery Of Health Care, Michael J. Malinowski

Michael J. Malinowski

This article challenges the scope of physician discretion to engage in off-label use of prescription drugs. The discretion to prescribe dimensions beyond the clinical research that puts new drugs on pharmacy shelves has been shaped by two historic influences: a legacy of physician paternalism, solidarity, autonomy, and self-determination that predates the contemporary commercialization of medicine by more than half a century, and regulatory necessity due to the limits of science and innate crudeness of pharmaceuticals prior to the genomics revolution (drug development and delivery based upon genetic expression). Although both factors have changed immensely, the standard for drug approval has …


"Do-Not-Track" As Contract, Joshua A.T. Fairfield Oct 2013

"Do-Not-Track" As Contract, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically — telephone numbers do not change, whereas Internet protocol (IP) …


The Magic Circle, Joshua A.T. Fairfield Oct 2013

The Magic Circle, Joshua A.T. Fairfield

Joshua A.T. Fairfield

This Article examines the concept of the "magic circle," the metaphorical barrier that supposedly excludes real-world law from virtual worlds. The Article argues that this metaphor fails because there is no "real" world as distinguished from "virtual" worlds. Instead of a magic circle, this Article advocates a rule of consent: actions in a virtual world give rise to legal liability if they exceed the scope of consent given by other players within the game. The Article concludes that although real-world law cannot reasonably be excluded from virtual worlds, game gods and players can control the interface between law and virtual …


The End Of The (Virtual) World, Joshua A.T. Fairfield Sep 2013

The End Of The (Virtual) World, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Virtual worlds have been the next big thing for some time now. In 2008, more than 100 public virtual worlds received venture capital funding - a significant increase over previous years. Yet virtual worlds have been going bankrupt faster than ever, including several high-profile firms and worlds. Every technology goes through a shakedown phase, and for virtual worlds the current recession has served as a catalyst for a downturn that, although not unexpected, is nevertheless startling in both numbers and rapidity. This article examines the intimate relationship between how a virtual world begins life and how it ends. The amount …


Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster Sep 2013

Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster

T. Noble Foster

This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature. The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …


Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield Sep 2013

Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Just as the Internet linked human knowledge through the simple mechanism of the hyperlink, now reality itself is being hyperlinked, indexed, and augmented with virtual experiences. Imagine being able to check the background of your next date through your cell phone, or experience a hidden world of trolls and goblins while you are out strolling in the park. This is the exploding technology of Mixed Reality, which augments real places, people, and things with rich virtual experiences. As virtual and real worlds converge, the law that governs virtual experiences will increasingly come to govern everyday life. The problem is that …


Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield Sep 2013

Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Researchers love virtual worlds. They are drawn to virtual worlds because of the opportunity to study real populations and real behavior in shared simulated environments. The growing number of virtual worlds and population growth within virtual worlds has led to a sizeable increase in the number of human subjects experiments taking place in such worlds. Virtual world users care deeply about their avatars, their virtual property, their privacy, their relationships, their community, and their accounts. People within virtual worlds act much as they would in the physical world because the experience of the virtual world is “real” to them. The …


Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield Sep 2013

Cracks In The Foundation: The New Internet Regulation's Hidden Threat To Privacy And Commerce, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations. A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, …


A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian Aug 2013

A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian

Vahagn Amirian

No abstract provided.


Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart Aug 2013

Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart

Allyson Haynes Stuart

This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …


No Path But One: Law School Survival In An Age Of Disruptive Technology, Michele R. Pistone, John J. Hoeffner Jul 2013

No Path But One: Law School Survival In An Age Of Disruptive Technology, Michele R. Pistone, John J. Hoeffner

Michele R. Pistone

In the absence of a dramatic shift in their approach to legal education, law schools are approaching the last days of Rome, a time when decline cannot be reversed and only the precise date of the final fall is to be determined. The role of marauding Germanic tribes will be played by new legal education competition whose emergence is enabled by recent technological developments. The new competition will be highly flexible, unencumbered by expensive legacy costs and, because it will reside mainly online, so scalable that no traditional, place-based law school will be immune from its impact. There will be …


The Scientifically Trained Law Clerk: Legal And Ethical Considerations Of Relying On Extra-Record Technical Training Or Experience, Timothy Li May 2013

The Scientifically Trained Law Clerk: Legal And Ethical Considerations Of Relying On Extra-Record Technical Training Or Experience, Timothy Li

Timothy Li

Technically trained law clerks should be permitted to rely on extralegal scientific principles, but only if those principles are objectively verifiable and not subject to reasonable dispute—a standard that matches Federal Rule of Evidence 201. By contrast, law clerks should not rely on extralegal scientific principles that are not objectively verifiable or beyond reasonable dispute. Technical training is particularly useful for law clerks at the Federal Circuit Court of Appeals because of its focus on patent cases. Technically trained clerks could also be useful at the trial level because the district courts recently began a ten-year Patent Pilot Program.


Patents For Chemicals, Pharmaceuticals And Biotechnology: Fundamentals Of Global Law, Practice And Strategy By Philip W. Grubb, Michael J. Malinowski May 2013

Patents For Chemicals, Pharmaceuticals And Biotechnology: Fundamentals Of Global Law, Practice And Strategy By Philip W. Grubb, Michael J. Malinowski

Michael J. Malinowski

No abstract provided.


A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski May 2013

A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski

Michael J. Malinowski

This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.


Dealing With The Realities Of Race And Ethnicity: A Bioethics-Centered Argument In Favor Of Race-Based Genetics Research, Michael J. Malinowski May 2013

Dealing With The Realities Of Race And Ethnicity: A Bioethics-Centered Argument In Favor Of Race-Based Genetics Research, Michael J. Malinowski

Michael J. Malinowski

No abstract provided.


United States Regulation Of Stem Cell Research: Recasting Government's Role And Questions To Be Resolved, Owen C. B. Hughes, Alan L. Jakimo, Michael J. Malinowski May 2013

United States Regulation Of Stem Cell Research: Recasting Government's Role And Questions To Be Resolved, Owen C. B. Hughes, Alan L. Jakimo, Michael J. Malinowski

Michael J. Malinowski

This article directly addresses the stem cell controversy, but also the broader history and norms regarding the roles of federal and state government in U.S. science research funding.


Patent Protection Of Pharmacologically Active Metabolites: Theoretical And Technological Analysis On The Jurisprudence Of Four Regions, Richard Li-Dar Wang, Pei-Chen Huang Mar 2013

Patent Protection Of Pharmacologically Active Metabolites: Theoretical And Technological Analysis On The Jurisprudence Of Four Regions, Richard Li-Dar Wang, Pei-Chen Huang

Richard Li-dar Wang

Active metabolite patents have been instrumental for brandname pharmaceutical companies to maintain their exclusivity even after the drug patents expire. This strategy obstructs market entry of generic medicine and reduces affordable drugs. The authors review jurisprudence from the United States, Europe, India, and Taiwan in search for practical solutions to confront this problem. Given the unique pharmacological value that active metabolites may possess, patent protection for those purified or synthesized in vitro should be preserved, but for those produced by metabolism should be declined. Except India, most countries under investigation comport with this dichotomy. Their jurisprudence may be subsumed into …