Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (12)
- Intellectual Property Law (11)
- Privacy Law (6)
- Internet Law (5)
- Social and Behavioral Sciences (5)
-
- Computer Law (4)
- Criminal Procedure (4)
- Fourth Amendment (4)
- First Amendment (3)
- Public Affairs, Public Policy and Public Administration (3)
- Communication (2)
- Communications Law (2)
- Economics (2)
- Indigenous, Indian, and Aboriginal Law (2)
- International Law (2)
- Jurisprudence (2)
- Law and Economics (2)
- Legal Education (2)
- Legal History (2)
- Life Sciences (2)
- Administrative Law (1)
- Agricultural and Resource Economics (1)
- Animal Law (1)
- Arts and Humanities (1)
- Banking and Finance Law (1)
- Biodiversity (1)
- Broadcast and Video Studies (1)
- Business (1)
- Business Organizations Law (1)
- Institution
-
- University of Michigan Law School (6)
- Northwestern Pritzker School of Law (4)
- University of Pennsylvania Carey Law School (4)
- New York Law School (3)
- Case Western Reserve University School of Law (2)
-
- Fordham Law School (2)
- Marquette University Law School (2)
- Boston University School of Law (1)
- George Washington University Law School (1)
- SelectedWorks (1)
- UIdaho Law (1)
- University of Cincinnati College of Law (1)
- University of Colorado Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of New Hampshire (1)
- University of New Mexico (1)
- University of Richmond (1)
- Vanderbilt University Law School (1)
- Publication
-
- All Faculty Scholarship (4)
- Michigan Law Review (4)
- Northwestern Journal of Technology and Intellectual Property (4)
- Case Western Reserve Law Review (2)
- Michigan Telecommunications & Technology Law Review (2)
-
- NYLS Law Review (2)
- Articles (1)
- Articles & Chapters (1)
- Best Management Practices and Adaptive Management in Oil and Gas Development (May 12-13) (1)
- Faculty Articles and Other Publications (1)
- Faculty Scholarship (1)
- Fordham Journal of Corporate & Financial Law (1)
- Fordham Urban Law Journal (1)
- GW Law Faculty Publications & Other Works (1)
- Law Faculty Publications (1)
- Marquette Intellectual Property Law Review (1)
- Marquette Sports Law Review (1)
- Native American Water Rights Settlement Project (1)
- Nevada Law Journal (1)
- The University of New Hampshire Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Wayne Miller (1)
- Publication Type
Articles 1 - 30 of 34
Full-Text Articles in Law
Re-Reifying Data, James Gibson
Re-Reifying Data, James Gibson
Law Faculty Publications
There's a war on between those who view digital technology as a reason to expand intellectual property law and those who oppose this expansion. One front in the war is technological: the pro-expansionists enclose their products in restrictive code, which the anti-expansionists circumvent and hack. A second is legislative: the pro-expansionists seek extended copyright duration, favorable changes to contract law, and other new legal entitlements, while the anti-expansionists lobby for the opposite. And a third front is a combination of the first two: it is technological. On this battlefield, the pro-expansionists use the law to fortify their technological protections. But …
Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola
Fair's Fair: An Argument For Mandatory Disclosure Of Technological Protection Measures, Robert C. Denicola
Michigan Telecommunications & Technology Law Review
Section 1201(a)(1) of the Copyright Act prohibits the act of "circumvent[ing] a technological measure that effectively controls access to a work," including, for example, by-passing password protection or encryption intended to restrict access to paying customers. Section 1201(a)(2) prohibits the manufacture or sale of "any technology, product, service, device, component, or part thereof" primarily designed for the purpose of circumventing access controls on copyrighted works. Additionally, § 1202(b) prohibits the manufacture or sale of products, devices or services primarily designed to circumvent "a technological measure that effectively protects a right of a copyright owner"--for example, a technological measure intended to …
Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine
Better, Faster, Cheaper - Later: What Happens When Technologies Are Suppressed, Kurt M. Saunders, Linda Levine
Michigan Telecommunications & Technology Law Review
Some inventions never see the light of day. Others enter the spotlight after long delays and the factors that slowed the arrival of that innovation are ignored. Technology suppression is a real occurrence involving well known and widely used products. In this Article, we examine the topic of technology suppression, seeking to reveal the tactics of suppression and the patterns and conditions under which it occurs. Current examples of US technologies are used to highlight the significance of this phenomenon. We consider related factors, including market and innovation forces, and we identify suppressive tactics, using illustrative cases where patent nonuse …
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
Water Conservation Plan, Rocky Boy / North Central Montana Regional Water System (2004), Hkm Engineering
Water Conservation Plan, Rocky Boy / North Central Montana Regional Water System (2004), Hkm Engineering
Native American Water Rights Settlement Project
Tribal Water Code: Water Conservation Plan, Rocky Boy / North Central Montana Regional Water System (Sep. 2004). Parties: Chippewa-Cree Tribe and NCM-RWS. The Rocky Boy/North Central Montana Regional Water System Act of 2002 (Pub. L. 107-331) authorized construction of the Rocky Boy/North Central Montana Regional Water System in north-central Montana. To meet the requirements of the Act, the Chippewa Cree Tribe and the North Central Montana Regional Water Authority developed and submitted a water conservation plan to Reclamation. The purpose of this water conservation plan is to ensure that users of water from the core system, non-core system and the …
Privacy Concerns Regarding The Monitoring Of Instant Messaging In The Workplace: Is It Big Brother Or Just Business?, Ira David
Nevada Law Journal
No abstract provided.
What Does Pruneyard Have To Do With California Internet Trade Secret Law?, Adam J. Sheridan
What Does Pruneyard Have To Do With California Internet Trade Secret Law?, Adam J. Sheridan
Marquette Intellectual Property Law Review
This comment discusses the facts of the Bunner case and the decisions of the Sixth District and the Supreme Court. The Bunner case involves Andrew Bunner and his act of putting a link on his Web page allowing visitors to access a Digitial Video Disc (DVD) descrambler program, which allowed a computer user to decrypt DVDs. The DVD Copy Control Association sought an injunction against Bunner under the California Uniform Trade Secrets Act (UTSA). The author analyzes the historical protection given free speech and trade secrets under California law. Looking at the Bunner case in light of Pruneyard, the author …
Slides: Nepa And Adaptive Management, Denise A. Dragoo
Slides: Nepa And Adaptive Management, Denise A. Dragoo
Best Management Practices and Adaptive Management in Oil and Gas Development (May 12-13)
Presenter: Denise A. Dragoo, Partner, Snell & Wilmer L.L.P., Salt Lake City, UT
22 slides
Criminal Justice In The Information Age: A Punishment Theory Paradox, Paul H. Robinson
Criminal Justice In The Information Age: A Punishment Theory Paradox, Paul H. Robinson
All Faculty Scholarship
This paper suggests how the information age might produce high capture and conviction rates and speculates on the effect of such developments on the criminal justice system's punishment theory. The low rate at which offenders presently are punished makes a deterrent threat of official sanction of limited effect. With a high punishment rate, however, a distribution of liability and punishment based upon a deterrence principle might, for the first time, make sense. On the other hand, the greater deterrent effect might eliminate crime as a serious social concern. And, without the pressure of a serious crime problem, the theory for …
Katz Is Dead. Long Live Katz, Peter P. Swire
Katz Is Dead. Long Live Katz, Peter P. Swire
Michigan Law Review
Katz v. United States is the king of Supreme Court surveillance cases. Written in 1967, it struck down the earlier regime of property rules, declaring that "the Fourth Amendment protects people, not places." The concurrence by Justice Harlan announced the new regime - court-issued warrants are required where there is an infringement on a person's "reasonable expectation of privacy." Together with the companion case Berger v. New York, Katz has stood for a grand conception of the Fourth Amendment as a bulwark against wiretaps and other emerging forms of surveillance. Professor Orin Kerr, in his excellent article, shows that …
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
Michigan Law Review
To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …
Biotechnology And The Law: A Consideration Of Intellectual Property Rights And Related Social Issues, Michael D. Mehta
Biotechnology And The Law: A Consideration Of Intellectual Property Rights And Related Social Issues, Michael D. Mehta
The University of New Hampshire Law Review
[Excerpt] “Recent advances in biotechnology are expected by many to improve crop yield, reduce reliance on agricultural inputs like pesticides and herbicides, alleviate world hunger, improve the safety and effectiveness of pharmaceuticals, assist in the discovery of genes that trigger diseases like cancer, and make more efficient our legal institutions through DNA testing. Clearly, innovations in biotechnology are a powerful force for social change, and they pose unique challenges and opportunities for legal scholars and institutions. This section of the Pierce Law Review focuses on the interface between law and technology by examining how innovations in biotechnology accelerate debates about …
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
A World Without Privacy: Why Property Does Not Define The Limits Of The Right Against Unreasonable Searches And Seizures, Sherry F. Colb
Michigan Law Review
Imagine for a moment that it is the year 2020. An American company has developed a mind-reading device, called the "brain wave recorder" ("BWR"). The BWR is a highly sensitive instrument that detects electrical impulses from any brain within ten feet of the machine. Though previously thought impossible, the BWR can discern the following information about the target individual: (1) whether he or she is happy, sad, anxious, depressed, or irritable; (2) whether he or she is even slightly sexually aroused; (3) whether he or she is taking any medication (and if so, what the medication is); (4) if a …
Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr
Technology, Privacy, And The Courts: A Reply To Colb And Swire, Orin S. Kerr
Michigan Law Review
I thank Sherry Colb and Peter Swire for devoting their time and considerable talents to responding to my article, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution. I will conclude with a few comments.
Law School Education In The 21st Century: Adding Information Technology Instruction To The Curriculum, Kenneth J. Hirsh, Wayne Miller
Law School Education In The 21st Century: Adding Information Technology Instruction To The Curriculum, Kenneth J. Hirsh, Wayne Miller
Faculty Articles and Other Publications
For the past 120 years, legal education in the United States has been fundamentally unchanged, even while the practice of law has been revolutionized by information technology. The ideal of the Socratic Method is still dominant in first year and many upperclass courses. Clinical and practice courses have expanded since the early-1980s; however, although state-of-the-art technology is now commonplace in law offices, most federal courthouses, and some state courtrooms, until now, there has been little effort to contextualize the importance of technology for law students. The authors review the availability of courses covering use of technology in law practice at …
Avoiding And Resolving Disputes During Sports Competition: Of Cameras And Computers , James A.R. Nafziger
Avoiding And Resolving Disputes During Sports Competition: Of Cameras And Computers , James A.R. Nafziger
Marquette Sports Law Review
No abstract provided.
Law School Education In The 21st Century: Adding Information Technology Instruction To The Curriculum, Kenneth J. Hirsh, Wayne Miller
Law School Education In The 21st Century: Adding Information Technology Instruction To The Curriculum, Kenneth J. Hirsh, Wayne Miller
Wayne Miller
For the past 120 years, legal education in the United States has been fundamentally unchanged, even while the practice of law has been revolutionized by information technology. The ideal of the Socratic Method is still dominant in first year and many upperclass courses. Clinical and practice courses have expanded since the early-1980s; however, although state-of-the-art technology is now commonplace in law offices, most federal courthouses, and some state courtrooms, until now, there has been little effort to contextualize the importance of technology for law students. The authors review the availability of courses covering use of technology in law practice at …
A Traitor In Our Midst: Is It Your Tivo?, Teresa W. Chan
A Traitor In Our Midst: Is It Your Tivo?, Teresa W. Chan
Vanderbilt Journal of Entertainment & Technology Law
Part I of this Note provides a backdrop of the different aspects of privacy law, focusing on the federal statutory schemes that are applicable to the issue of information gathering and the different possible uses of that information as a violation of privacy rights that have appeared in similar technology cases up to this point in time. This section will also focus on the capabilities of TiVo in more depth.
Part II of the Note examines both of TiVo's questionable actions: first, whether gathering information to sell to advertisers and networks in the form of aggregate data violates privacy rights; …
Comment: Exactly Backwards: Exceptionalism And The Federal Circuit, R. Polk Wagner
Comment: Exactly Backwards: Exceptionalism And The Federal Circuit, R. Polk Wagner
Case Western Reserve Law Review
No abstract provided.
Technology In A War Crimes Tribunal: Recent Experience At The Icty, David Pimentel
Technology In A War Crimes Tribunal: Recent Experience At The Icty, David Pimentel
Articles
No abstract provided.
Virtual Property: The Challenges Of Regulating Intangible, Exclusionary Property Interests Such As Domain Names, David Nelmark
Virtual Property: The Challenges Of Regulating Intangible, Exclusionary Property Interests Such As Domain Names, David Nelmark
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
How The Established Business Relationship Exemption To The National Do-Not-Call Registry Forces Consumers To Pay For Unwanted Sales Calls, Shannon D. Torgerson
How The Established Business Relationship Exemption To The National Do-Not-Call Registry Forces Consumers To Pay For Unwanted Sales Calls, Shannon D. Torgerson
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Revisiting Standard-Setting Organizations' Patent Policies, Kraig A. Jakobsen
Revisiting Standard-Setting Organizations' Patent Policies, Kraig A. Jakobsen
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
New Strategies For Owners Of Discontinued Brands, David S. Ruder
New Strategies For Owners Of Discontinued Brands, David S. Ruder
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
The Law, Technology And The Arts Symposium: The Past, Present And Future Of The Federal Circuit - Introduction, Gerald Korngold
The Law, Technology And The Arts Symposium: The Past, Present And Future Of The Federal Circuit - Introduction, Gerald Korngold
Case Western Reserve Law Review
No abstract provided.
Sound And Fury Signifying Nothing?: Jurgen Bϋssow’S Battle Against Hate-Speech On The Internet, Eric T. Eberwine
Sound And Fury Signifying Nothing?: Jurgen Bϋssow’S Battle Against Hate-Speech On The Internet, Eric T. Eberwine
NYLS Law Review
No abstract provided.
Reconstructing Electronic Surveillance Law, Daniel J. Solove
Reconstructing Electronic Surveillance Law, Daniel J. Solove
GW Law Faculty Publications & Other Works
After the September 11th attacks in 2001, Congress hastily passed the USA-Patriot Act which made several changes to electronic surveillance law. The Act has sparked a fierce debate. However, the pros and cons of the USA-Patriot Act are only one part of a much larger issue: How effective is the law that regulates electronic surveillance?
The USA-Patriot Act made a number of changes in electronic surveillance law, but the most fundamental problems with the law did not begin with the USA-Patriot Act. In this article, Professor Solove argues that electronic surveillance law suffers from significant problems that predate the USA-Patriot …
The Role Of Politics And Policy In Television Regulation, Christopher S. Yoo
The Role Of Politics And Policy In Television Regulation, Christopher S. Yoo
All Faculty Scholarship
This article is a reply to Thomas Hazlett’s commentary on my article entitled, “Rethinking the Commitment to Free, Local Television.” Although politics and public choice theory represent an important approach for analyzing government actions, economic policy still exercises some influence over the regulation of television. On the one hand, we agree that the regulatory preference of free television and local programming is more a reflection of political considerations than economic policy and that the importance of promoting communities of interest over geographic communities, and the potential for new services such as Digital Audio Radio Services to benefit consumers. On the …
Risk Management For The Age Of Information – The New Financial Order: Risk In The 21st Century, Robert J. Shiller, Princeton University Press, 2003, Michael Pereira
Risk Management For The Age Of Information – The New Financial Order: Risk In The 21st Century, Robert J. Shiller, Princeton University Press, 2003, Michael Pereira
Fordham Journal of Corporate & Financial Law
No abstract provided.
Public Service In A Time Of Crisis: A Report And Retrospective On The Legal Community's Response To The Events Of September 11, 2001
Fordham Urban Law Journal
The attacks on September 11, 2001 were unprecedented in scope, and the legal needs that grew out of the attacks were varied and far-reaching. This report summarizes the response of the legal community to these needs. The response was fast, thoughtful, comprehensive, and creative. And as a result, thousands of people were helped and thousands of lawyers were able to use their professional talents and skills in a manner that both led to important services being provided to people in need and resulted in great personal satisfaction. In response to 9/11, the institutions that make up the New York area …