Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

Technology

Discipline
Institution
Publication Year
Publication

Articles 121 - 145 of 145

Full-Text Articles in Law

Who Are These People? New Generation Employees And Trade Secrets, Elizabeth A. Rowe Sep 2008

Who Are These People? New Generation Employees And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Traditional approaches to examining the efficacy of trade secret protection in the workplace are often focused on technological and process based measures. Indeed, much attention has focused on the use of technology, by itself, to stem trade secret misappropriation. This Article offers a novel approach to the problem by incorporating contextual factors that might be important to trade secret protection and focuses on the people. It also, for the first time, applies sociological theories about employee theft to trade secret misappropriation. Working from the outside in, the Article examines first the reported societal effects on the values of those workers …


Interstate Intercourse: How Modern Assisted Reproductive Technologies Challenge The Traditional Realm Of Conflicts Of Law, Sonia B. Green Sep 2008

Interstate Intercourse: How Modern Assisted Reproductive Technologies Challenge The Traditional Realm Of Conflicts Of Law, Sonia B. Green

Sonia Bychkov Green

New technologies have always posed challenges to established legal norms. Assisted Reproductive Technologies (ART) in particular pose legal and ethical challenges to the law, and create never before seen legal problems. Although the ABA House of Representatives recently approved the Model Act Governing Assisted Reproductive Technology, differences in laws and rules will continue to exist. The legal issued involved are wide-ranging, including: liability issues arising from the failure of ART technology, parentage issues, disposition of embryos, and many others. As ART becomes more widely used, it is also used more in an interstate and international context. Thus, when a dispute …


Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe Sep 2008

Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe

Elizabeth A Rowe

The very technological tools in use today that increase the efficiency with which companies do business create challenges for trade secret protection. They make trade secrets easier to store, easier to access, easier to disseminate, and more portable, thus increasing the risks that trade secrets will be destroyed. While secrecy is the sine qua non of trade secret protection, it can be difficult to accomplish. There is a tension between the need to keep information secret and modern technological methods that allow the information to be easily accessed, reproduced, and disseminated. In trade secret misappropriation cases, courts evaluate the sufficiency …


Last-Mile Dilemma: How Network Neutrality Legislation Could Create Barriers To Innovation, Nicholas R. Brown Apr 2008

Last-Mile Dilemma: How Network Neutrality Legislation Could Create Barriers To Innovation, Nicholas R. Brown

Nicholas R Brown

This paper takes a look at the various concepts of Network Neutrality and their affects on the end user. And then investigates proposed policy solutions and how that policy may hinder future Internet innovation.


What Google Knows: Privacy And Internet Search Engines, Omer Tene Feb 2008

What Google Knows: Privacy And Internet Search Engines, Omer Tene

Omer Tene

Search engines are the dominant actors on the Internet today and Google is undoubtedly, the undisputed king of search, evoking ambivalent feelings. It is adored for its ingenuity, simple, modest-looking interface, and superb services offered at no (evident) cost. Yet increasingly, it is feared by privacy advocates who view it as a private sector "big brother," posing what one commentator dubbed “the most difficult privacy problem in all of human history.” Google is an informational gatekeeper, harboring previously unimaginable riches of personal data. Billions of search queries stream across Google servers each month, the aggregate thoughtstream of humankind online. Google …


Law's Misguided Love Affair With Science, Robin Feldman Feb 2008

Law's Misguided Love Affair With Science, Robin Feldman

Robin C Feldman

The allure of science has always captivated members of the legal profession. Its siren’s song has followed us throughout much of American legal history. We look to science to rescue us from the experience of uncertainty and the discomfort of difficult legal decisions, and we are constantly disappointed.

The notion of what constitutes science and what it would take to make law more scientific varies across time. What does not vary is our constant return to the well. We are constantly seduced into believing that some new science will provide answers to law’s dilemmas, and we are constantly disappointed.

This …


The Technology Of Law And Economics, John H. Moran Feb 2008

The Technology Of Law And Economics, John H. Moran

John H Moran

The article suggests that the field of Technology drives the fields of Economics and Law. It relies on Richard Posner's law and economics ideas, but also argues that technologists have increasing influence on the emerging world order, to the detriment of the existing government and banking based power structure.


Technical Capacity, Policymaking And Food Standards: An Overview Of Indian Experience, Nupur Chowdhury, Sanjay Kumar Jan 2008

Technical Capacity, Policymaking And Food Standards: An Overview Of Indian Experience, Nupur Chowdhury, Sanjay Kumar

Nupur Chowdhury

The SPS Agreement in the WTO gives legal validity to the CODEX standards. Since the developed countries have been at the forefront of setting the food standards in the CODEX, the developing countries have been increasingly engaged in the CODEX, and also in the WTO, with an objective to increase their exports of the agricultural and food products. But such objective and desire have often been stymied by the lack of institutions which can sustain the intense technical negotiations at the CODEX. If these participations are not qualitatively satisfactory, the very objective of such participations is not fulfilled. But since …


Fighting The Food Crisis: Feeding Africa One Family At A Time, Karol C. Boudreaux, Adam Aft Dec 2007

Fighting The Food Crisis: Feeding Africa One Family At A Time, Karol C. Boudreaux, Adam Aft

Karol C. Boudreaux

Food riots have exploded. Prices for staple goods—wheat, maize, rice—have risen dramatically. 1 in 3 people in sub-Saharan Africa confront hunger and malnutrition, persistent threats. Many of the hungry are Africa’s smallholder farmers, subsistence farmers whose productivity has fallen over the past three decades while agricultural productivity rates have soared in other parts of the word. This article asks: what kinds of strategies, both legal and practical, will it take to effectively address the problem of a food crisis in sub-Saharan Africa? Scholars and politicians point to the need for a Green Revolution for Africa, a new effort to increase …


From Face-To-Face To Screen-To-Screen: Real Hope Or True Fallacy, Philippe Gilliéron May 2007

From Face-To-Face To Screen-To-Screen: Real Hope Or True Fallacy, Philippe Gilliéron

Philippe Gilliéron

The development of e-commerce involves the implementation of effective Online Dispute Resolution (ODR) methods. While the enactment of ODR methods is made particularly easy thanks to the technological tools at disposal, their mere implementation does still not ensure their efficiency. ODR has drawn much attention in legal scholarships in recent years. Strangely enough, hardly any scholar has however focused on a key factor for the good development of ODR: differences between face-to-face and computer-mediated interactions. After having described the current state of literature related to ODR, I shall focus more specifically on these differences based upon experiments conducted in the …


Some Job Hunters Are What They Post, Michael D. Mann Apr 2007

Some Job Hunters Are What They Post, Michael D. Mann

Michael D. Mann

Plug a prospective employee's name into an Internet search engine, and you might be surprised at what you find. Web pages may tell hiring attorneys that the person they just interviewed wrote for an undergraduate newspaper or belonged to a specific sorority, but the Web may also reveal the recent interviewee's drink of choice and dating status. Law firms can use the Internet for their own recruiting needs, says attorney Michael D. Mann, but they should take what they read on the Web with a grain of salt.


Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton Feb 2007

Letting Katz Out Of The Bag: Cognitive Freedom And Fourth Amendment Fidelity, Christian Halliburton

Erin Espedal

Emerging surveillance technologies now allow operators to collect information located within the brain of an individual, allow the collection of forensic evidence regarding cerebral and cognitive processes, and are even beginning to be able to predict human intentions. While science has not yet produced a mind-reading machine per se, the devices referred to as “cognitive camera technologies” are substantial steps in the direction of that inevitable result. One such technique, a proprietary method called Brain Fingerprinting, is used as an example of the strong trend towards increasingly invasive and ever more powerful surveillance methods, and provides an entrée to a …


The Advocacy And Technology Institute: Real-World Training Using Real-World Tools, John F. Nivala Dec 2006

The Advocacy And Technology Institute: Real-World Training Using Real-World Tools, John F. Nivala

John F. Nivala

No abstract provided.


Changing Expectations Of Privacy And The Fourth Amendment, Robert Power Dec 2005

Changing Expectations Of Privacy And The Fourth Amendment, Robert Power

Robert C Power

Public attitudes about privacy are central to the development of fourth amendment doctrine in two respects. These are the two “reasonableness” requirements, which define the scope of the fourth amendment (it protects only “reasonable” expectations of privacy), and provide the key to determining compliance with its commands (it prohibits “unreasonable” searches and seizures). Both requirements are interpreted in substantial part through evaluation of societal norms about acceptable levels of privacy from governmental intrusions. Caselaw, poll data, newspaper articles, internet sites, and other vehicles for gauging public attitudes after the September 11 attacks indicate that public concerns about terrorism and the …


Unburdening The Constitution: What Has The Indian Constitution Got To Do With Private Universities, Modernity And Nation States?, Shubhankar Dam Dec 2005

Unburdening The Constitution: What Has The Indian Constitution Got To Do With Private Universities, Modernity And Nation States?, Shubhankar Dam

Shubhankar Dam

This article critically analyses the decision of the Indian Supreme Court in Yashpal and another v. State of Chhattisgarh and others holding the establishment of private universities as unconstitutional. Swayed by the overwhelmingly irresponsible character of the respondent universities, the Supreme Court innovated constitutional arguments to uphold the claims of the petitioners. While intuitively correct in the context of the immediate facts, the judgment, when analysed in the abstract, reveals the self-inflicted harm it has the potential to cause. The judgment is technologically regressive: it fails to account for the emerging trends in education, especially those related to the use …


Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson Dec 2005

Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson

Stephen E Henderson

We are all aware of, and many commentators are critical of, the Supreme Court's third-party doctrine, under which information provided to third parties receives no Fourth Amendment protection. This constitutional void becomes increasingly important as technology and social norms dictate that increasing amounts of disparate information are available to third parties. But we are not solely dependent upon the Federal Constitution. We may have more constitutional protection as citizens of states, each of which has a constitutional cognate or analog to the Federal Fourth Amendment. As Justice Brennan urged in a famous 1977 article, those provisions should be interpreted to …


Treason, Technology, And Freedom Of Expression, Tom W. Bell Dec 2004

Treason, Technology, And Freedom Of Expression, Tom W. Bell

Tom W. Bell

The power to punish treason against the U.S. conflicts with the First Amendment freedoms of speech and of the press. Far from a question of mere theory, that conflict threatens to chill public dissent to the War on Terrorism. The government has already demonstrated its willingness to punish treasonous expression. After World War II, the United States won several prosecutions against citizens who had engaged in propaganda on behalf of the Axis powers. Today, critics of the War on Terrorism likewise face accusations of treason. Under the law of treasonous expression developed following World War II, those accusations could credibly …


Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson Dec 2004

Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson

Stephen E Henderson

The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …


Law School Education In The 21st Century: Adding Information Technology Instruction To The Curriculum, Kenneth J. Hirsh, Wayne Miller Jan 2004

Law School Education In The 21st Century: Adding Information Technology Instruction To The Curriculum, Kenneth J. Hirsh, Wayne Miller

Wayne Miller

For the past 120 years, legal education in the United States has been fundamentally unchanged, even while the practice of law has been revolutionized by information technology. The ideal of the Socratic Method is still dominant in first year and many upperclass courses. Clinical and practice courses have expanded since the early-1980s; however, although state-of-the-art technology is now commonplace in law offices, most federal courthouses, and some state courtrooms, until now, there has been little effort to contextualize the importance of technology for law students. The authors review the availability of courses covering use of technology in law practice at …


Implementing Virtual Reference: Hollywood Technology In Real Life, Ray Balleste, Gordon R. Russell Apr 2003

Implementing Virtual Reference: Hollywood Technology In Real Life, Ray Balleste, Gordon R. Russell

Gordon R. Russell

No abstract provided.


Colloquium On Privacy & Security, Ann Bartow Jan 2002

Colloquium On Privacy & Security, Ann Bartow

Ann Bartow

On November 2-3, 2001, the University of Buffalo sponsored Digital Frontier: The Buffalo Summit 2001. The attendees included Gary M. Schober (Moderator), Shubha Ghosh (Organizer), Ann Bartow, Chris Hoofnagle, and Phyllis Borzi. The participants were drawn from a wide range of specialties, from lawyers and doctors to business-men and academics, in order to provide some perspective on our data-driven world. This session on Privacy and Security identified some of the trends in technology that threaten privacy rights, as well as those that may assists preserving privacy. The speakers also explored legal developments and political structure influencing cyber-privacy.


Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough Dec 2001

Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough

Stephen E Henderson

The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …


Arresting Technology: An Essay, Ann Bartow May 2001

Arresting Technology: An Essay, Ann Bartow

Ann Bartow

This Essay considers the current trend of content owners using copyright laws (particularly the doctrine of contributory infringement) to "arrest technology," thereby burdening file sharing technologies with a duty to prevent unauthorized copying of copyrighted works in digital formats. The Author argues that copying is not necessarily theft, and that sharing music files (for example) shouldn't be treated by courts or lawmakers as if it was "the moral equivalent of looting." Instead, copyright owners should take responsibility for developing technological measures to minimize unauthorized copying, so that file trading technologies, themselves often copyrightable innovations, can flourish and copyright law promotes …


The Legal Architecture Of Virtual Stores, Walter Effross Dec 1997

The Legal Architecture Of Virtual Stores, Walter Effross

Walter Effross

INTRODUCTION: A major "selling point" of the World Wide Web is its ability to offer a "virtual storefront" to anyone, from an individual to a multinational corporation, with a product to market. Commercially available software packages enable even those computer users who are not versed in the intricacies of programming to create customized Web sites quickly, and at a relatively low cost. The swift development of this technology and a cultural shift towards encouraging on-line commerce have led to dramatic growth in the demographics and dollar amounts of the on-line marketplace, which in turn offers a challenging new context for …


Inventors Of The World, Unite! A Call For Collective Action By Employee-Inventors, Ann Bartow Jan 1997

Inventors Of The World, Unite! A Call For Collective Action By Employee-Inventors, Ann Bartow

Ann Bartow

While technological innovation is often lauded as the cornerstone of the American economy into the next century, and both governmental and private observers ponder with fascination and some trepidation the ability of U.S. companies to reach and sustain high levels of innovative productivity, very little attention is paid to actual inventors. This article is one effort to draw attention to the importance of employee-inventors, the people who conceive and develop the inventions that American corporations rely on for growth and profitability. Though it is universally accepted that skills gained by an employee in the course of his employment belong to …