Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2015

Technology

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 71

Full-Text Articles in Law

Disruptive Technology And Securities Regulation, Chris Brummer Dec 2015

Disruptive Technology And Securities Regulation, Chris Brummer

Fordham Law Review

Nowhere has disruptive technology had a more profound impact than in financial services—and yet nowhere do academics and policymakers lack a coherent theory of the phenomenon more, much less a coherent set of regulatory prescriptions. Part of the challenge lies in the varied channels through which innovation upends market practices. Problems also lurk in the popular assumption that securities regulation operates against the backdrop of stable market gatekeepers like exchanges, broker-dealers, and clearing systems—a fact scenario increasingly out of sync in twenty-first-century capital markets.

This Article explains how technological innovation “disrupts” not only capital markets but also the exercise of …


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Newsroom: Logan On Drone Law, Roger Williams University School Of Law Nov 2015

Newsroom: Logan On Drone Law, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Taxation, William L.S. Rowe, Emily J.S. Winbigler Nov 2015

Taxation, William L.S. Rowe, Emily J.S. Winbigler

University of Richmond Law Review

This article reviews significant recent developments in the lawsaffecting Virginia state and local taxation. Each section coverslegislative activity, judicial decisions, and selected opinions fromthe Virginia Department of Taxation (the "Department") and the Virginia Attorney General over the past year.


Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law Oct 2015

Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


2015 Cardozo Life (Fall), Benjamin N. Cardozo School Of Law Oct 2015

2015 Cardozo Life (Fall), Benjamin N. Cardozo School Of Law

Cardozo Life

Table of Contents:

Top News & Events, page 3

Clinics News, page 8

Faculty Briefs, page 10

New Dean, New Era, page 14

Creative Enterprise, page 18

Tech Talks, page 26

Helping Clients: Clinics in Action, page 30

Student Briefs, page 34

Movers & Shakers, page 36

Alumni News & Class Notes, page 37

Advancement News, page 44

In Memoriam, page 47

End Note, page 48


Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek Sep 2015

Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


Clean Energy Federalism, Felix Mormann Sep 2015

Clean Energy Federalism, Felix Mormann

Faculty Scholarship

Legal scholarship tends to approach the law and policy of clean energy from an environmental law perspective. As hydraulic fracturing, renewable energy integration, nuclear reactor (re)licensing, transport biofuel mandates, and other energy issues have pushed to the forefront of the environmental law debate, clean energy law has begun to emancipate itself. The emerging literature on clean energy federalism is a symptom of this emancipation. This Article adds to that literature by offering two case studies, a novel model for policy integration, and theoretical insights to elucidate the relationship between environmental federalism and clean energy federalism.

Renewable portfolio standards and feed-in …


Emerging Technologies And Loac Signaling, Eric Talbot Jensen Aug 2015

Emerging Technologies And Loac Signaling, Eric Talbot Jensen

International Law Studies

As States seek to weaponize new technologies such as robotics, cyber tools and nanotechnology, the current law of armed conflict (LOAC) that guides the employment of existing weapons will signal rules and principles that should guide national decisions on what new technologies to weaponize and how to do so in a way that ensures compliance with battlefield regulation. LOAC has served this "signaling" function historically with respect to innovative weapon systems such as balloons, submarines, airplanes, and nuclear weapons, and will continue to do so as nations look forward to potentially weaponizing emerging technologies.


Bankruptcy Treatment Of Intellectual Property Assets: An Economic Analysis, Peter S. Menell Aug 2015

Bankruptcy Treatment Of Intellectual Property Assets: An Economic Analysis, Peter S. Menell

Peter Menell

No abstract provided.


Institutionalizing Legal Innovation: The (Re)Emergence Of The Law Lab, Martha F. Davis Aug 2015

Institutionalizing Legal Innovation: The (Re)Emergence Of The Law Lab, Martha F. Davis

Journal of Legal Education

No abstract provided.


Late Night Thoughts On Blogging While Reading Duncan Kennedy's Legal Education And The Reproduction Of Hierarchy In An Arkansas Motel Room, Franklin G. Snyder Jul 2015

Late Night Thoughts On Blogging While Reading Duncan Kennedy's Legal Education And The Reproduction Of Hierarchy In An Arkansas Motel Room, Franklin G. Snyder

Franklin G. Snyder

It has been more than twenty years since Duncan Kennedy published his seminal 'Legal Education and the Reproduction of Hierarchy'. In it he called for a radical assault on the hierarchies embedded in American law schools. But that assault failed. Over the past two decades, the hierarchies of legal education have, if anything, become even more fixed, insular, and status-driven, even while the elites of the practicing bar have changed dramatically and become more open to outsiders. It is vastly easier for the graduate of a fourth-tier law school to become a partner at an elite law firm than it …


Real Metamorphosis Or More Of The Same: Navigating The Practice Of Law In The Wake Of Ethics 20/20 - Globalization, New Technologies, And What It Means To Be A Lawyer In These Uncertain Times, Jack P. Sahl Jun 2015

Real Metamorphosis Or More Of The Same: Navigating The Practice Of Law In The Wake Of Ethics 20/20 - Globalization, New Technologies, And What It Means To Be A Lawyer In These Uncertain Times, Jack P. Sahl

Akron Law Review

On April 4 and 5, 2013, The University of Akron School of Law’s Miller-Becker Center for Professional Responsibility (“MBC”) hosted the symposium, Navigating the Practice of Law in the Wake of Ethics 20/20 – Globalization, New Technologies, and What It Means to Be a Lawyer in These Uncertain Times (Ethics 20/20 – Uncertain Times). The symposium examined the myriad of changes and problems confronting the bar, legal education, and the courts. Although law schools, courts, and the organized bar have provided a steady supply of programs addressing the recent changes confronting the profession and legal education, Ethics 20/20 – Uncertain …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern Jun 2015

Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern

Catholic University Law Review

In an ever-changing technological landscape, strictly adhering to the language and definitions of the Copyright Act in cases involving emerging technologies may contravene the purpose and intent of copyright law. However, the Supreme Court’s 2014 opinion in American Broadcasting Cos. v. Aereo Inc. puts forth a commercial interest rationale that suggests copyright infringers may no longer be able to avoid liability based on perceived technological loopholes that have typically absolved online infringers of infringement liability. This Note argues that Aereo’s commercial interest rationale paves the way for a new approach to technologically complex copyright cases, particularly where in-line linking …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Bowman V. Monsanto Co.: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman Jun 2015

Bowman V. Monsanto Co.: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman

Missouri Law Review

The inherent tendency of patented seeds to self-replicate has led to fears that farmers might face liability for inadvertent patent infringement. To address the perceived problem, some have proposed severely limiting the availability of effective patent protection for self-replicating technologies. Typical examples include denying patent rights to “second generation” selfreplicating products, and even broadly declaring such technologies ineligible for patent protection. The fact is, lawsuits against inadvertently infringing farmers remain of largely hypothetical concern. However, changes in the market could soon render such lawsuits a reality. In addressing the resulting policy concerns, Congress and the courts have at their disposal …


Anarchy, Status Updates, And Utopia, James Grimmelmann May 2015

Anarchy, Status Updates, And Utopia, James Grimmelmann

Pace Law Review

Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.

Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …


The Relationship Between Foundations And Principles In Ip Law, Robert P. Merges May 2015

The Relationship Between Foundations And Principles In Ip Law, Robert P. Merges

Robert P Merges

The article presents information on basic principles concerning foundations of the field of intellectual property (IP) law. It provides information on the basic principles of IP law which include efficiency, proportionality and dignity. It stresses on the granting of IP rights to make a workable foundation. It rejects utilitarianism for lack of precise data and presents an analysis of the three levels of IP law with the help of new technologies.


Legal Education In Disruption: The Headwinds And Tailwinds Of Technology, Jon M. Garon May 2015

Legal Education In Disruption: The Headwinds And Tailwinds Of Technology, Jon M. Garon

Faculty Scholarship

By harnessing improvements on communications and computational systems, law firms are producing a revolution in the practice of law. Self-help legal manuals have transformed into sophisticated interactive software; predictive coding can empower clients to receive sophisticated legal advice from a machine; socially mediated portals select among potential lawyers and assess the quality of the advice given; and virtual law firms threaten to distintermediate the grand edifices of twentieth century Big Law. These changes may profoundly restructure the legal practice, undermining the business model for many solo and small firm practices.

This paper focuses on the implications of these profound disruptive …


Acknowledgements, D. Paul Holdsworth May 2015

Acknowledgements, D. Paul Holdsworth

University of Richmond Law Review

No abstract provided.


There's No Place Like Work: How Modern Technology Is Changing The Judiciary's Approach To Work-At-Home Arrangements As An Ada Accommodation, Benjamin D. Johnson May 2015

There's No Place Like Work: How Modern Technology Is Changing The Judiciary's Approach To Work-At-Home Arrangements As An Ada Accommodation, Benjamin D. Johnson

University of Richmond Law Review

No abstract provided.


Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone Apr 2015

Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone

Michele R. Pistone

1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …


Expired Patents, Saurabh Vishnubhakat Apr 2015

Expired Patents, Saurabh Vishnubhakat

Catholic University Law Review

This article presents a comprehensive empirical description of the public domain of technologies that have recently passed out of patent protection. From a new dataset of over 300,000 patents that expired during 2008–2012, the study examines technological, geographical, and procedural traits of newly public inventions as a basis for exploring the social value associated with their competitive use. Moreover, comparing these inventions to inventions newly patented during the same period enables more specific discussion of how the balance of innovation in the United States continues to change.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Silent Similarity, Jessica D. Litman Apr 2015

Silent Similarity, Jessica D. Litman

Articles

From 1909 to 1930, U.S. courts grappled with claims by authors of prose works claiming that works in a new art form—silent movies—had infringed their copyrights. These cases laid the groundwork for much of modern copyright law, from their broad expansion of the reproduction right, to their puzzled grappling with the question how to compare works in dissimilar media, to their confusion over what sort of evidence should be relevant to show copyrightability, copying and infringement. Some of those cases—in particular, Nichols v. Universal Pictures—are canonical today. They are not, however, well-understood. In particular, the problem at the heart of …


Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass Apr 2015

Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass

Loyola of Los Angeles Law Review

Autonomous weapons are increasingly used by militaries around the world. Unlike conventional unmanned weapons such as drones, autonomous weapons involve a machine deciding whether to deploy lethal force. Yet, because a machine cannot have the requisite mental state to commit a war crime, the legal scrutiny falls onto the decision to deploy an autonomous weapon. This Article focuses on the dual questions arising from that decision: how to regulate autonomous weapon use and who should be held criminally liable for an autonomous weapon’s actions. Regarding the first issue, this Article concludes that regulations expressly limiting autonomous weapon use to non-human …