Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Rethinking The Process Of Service Of Process, Mary K. Bonilla Feb 2022

Rethinking The Process Of Service Of Process, Mary K. Bonilla

St. Mary's Law Journal

Even as technology evolves, the Federal Rules of Civil Procedure, specifically Federal Rule 4, remains stagnate without a mechanism directly providing for electronic service of process in federal courts. Rule 4(e)(1) allows service through the use of state law—consequently permitting any state-approved electronic service methods—so long as the federal court where proceedings will occur, or the place where service is made, is located within the state supplying the law. Accordingly, this Comment explains that Rule 4 indirectly permits electronic service of process in some states, but not others, despite all 50 states utilizing the same federal court system. With states …


Reconstruction Of The Reasonable Person Standard Under Chinese Patent Law, Weihong Yao, Robert H. Hu Jan 2022

Reconstruction Of The Reasonable Person Standard Under Chinese Patent Law, Weihong Yao, Robert H. Hu

Faculty Articles

The standard of a Reasonable Person is the common basis for determining the duty of care of a patent infringer. Under the Chinese patent law, the standards for Reasonable Manufacturer and Reasonable Importer are among the highest standards in the world; such high Chinese standards impose an excessive duty of care for Chinese manufacturing enterprises, importers, and distributors, which hinder the development of those enterprises. We should reconstruct the Chinese patent law's Reasonable Person standard based on the characteristics of the patent system and the status quo of China's economic production. A Reasonable Manufacturer should be defined as an ordinary …


If You Don't Care, Who Will?, Chad J. Pomeroy Jan 2021

If You Don't Care, Who Will?, Chad J. Pomeroy

Faculty Articles

As a property law professor, I have lately found myself thinking a lot about privacy rights. Initially, the two topics (property and privacy) perhaps do not seem closely related, but I think they are—or, at least, I think the tie between the two is becoming much more pronounced and important, as modern life becomes ever more techno-centric. specifically, I think that privacy rights are, at this point, essentially an outgrowth of property rights. That is, one's right to privacy is dependent on what we traditionally view as one's property rights. At least, I think this is the current state of …


Should Judges Have A Duty Of Tech Competence?, John G. Browning Jul 2020

Should Judges Have A Duty Of Tech Competence?, John G. Browning

St. Mary's Journal on Legal Malpractice & Ethics

In an era in which lawyers are increasingly held to a higher standard of “tech competence” in their representation of clients, shouldn’t we similarly require judges to be conversant in relevant technology? Using real world examples of judicial missteps with or refusal to use technology, and drawn from actual cases and judicial disciplinary proceedings, this Article argues that in today’s Digital Age, judicial technological competence is necessary. At a time when courts themselves have proven vulnerable to cyberattacks, and when courts routinely tackle technology related issues like data privacy and the admissibility of digital evidence, Luddite judges are relics that …


Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone Jan 2020

Saving America’S Privacy Rights: Why Carpenter V. United States Was Wrongly Decided And Why Courts Should Be Promoting Legislative Reform Rather Than Extending Existing Privacy Jurisprudence, David Stone

St. Mary's Law Journal

Privacy rights are under assault, but the Supreme Court’s judicial intervention into the issue, starting with Katz v. United States and leading to the Carpenter v. United States decision has created an inconsistent, piecemeal common law of privacy that forestalls a systematic public policy resolution by Congress and the states. In order to reach a satisfactory and longlasting resolution of the problem consistent with separation of powers principles, the states should consider a constitutional amendment that reduces the danger of pervasive technologyaided surveillance and monitoring, together with a series of statutes addressing each new issue posed by technological change as …


In Code(Rs) We Trust: Software Developers As Fiduciaries In Public Blockchains, Angela Walch Jan 2019

In Code(Rs) We Trust: Software Developers As Fiduciaries In Public Blockchains, Angela Walch

Faculty Articles

A decade into Bitcoin's existence, governance questions around it and other public blockchains abound. Do these 'decentralized' structures even have governance? If so, what does it look like? Who has power, and how is it channeled or constrained? Are power structures implicit or explicit? How can we improve upon the ad hoc governance structures of early blockchains? ls ‘on-chain governance,’ like that proposed by Tezos and others, the path forward?

In August 2016, in the aftermath of the DAO theft and resulting Ethereum hard fork, I argued in American Banker that the core developers and significant miners of public blockchains …


Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey Jun 2018

Constitutional Shapeshifting: Giving The Fourth Amendment Substance In The Technology Driven World Of Criminal Investigation, Gerald S. Reamey

Faculty Articles

For the first hundred years of the Fourth Amendment's life, gains in the technology of surveillance were modest. With the advent of miniaturization and ever-increasing sophistication and capability of surveillance and detection devices, the Supreme Court has struggled to adapt its understanding of "search" to the constantly evolving devices and methods that challenge contemporary understanding of privacy. In response to surveillance innovations, the Court has taken varying positions, focusing first on property-based intrusions by government, then shifting to privacy expectations, and, more recently, resurrecting the view that a trespass to property can define search.

This article surveys this constitutional odyssey, …


Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen Jun 2018

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


The Path Of The Blockchain Lexicon (And The Law), Angela Walch Apr 2017

The Path Of The Blockchain Lexicon (And The Law), Angela Walch

Faculty Articles

The terminology around blockchain technology is notoriously confusing, with disputes over whether a blockchain is the same as a distributed ledger or whether an appcoin is the same as a protocol token. In this article, I examine the difficulties the rapidly shifting, contested vocabulary poses for regulators seeking to understand, govern, and potentially use blockchain technology, and I offer suggestions for how to fight through the haze of unclear language.

I provide examples of the fluctuating, contested language in the blockchain technology space and describe the forces at play in shaping the language. I then lay out the problems the …


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …


The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera Dec 2016

The Impact Of Technological Developments On The Rules Of Attorney Ethics Regarding Attorney–Client Privilege, Confidentiality, And Social Media, Pamela A. Bresnahan, Lucian T. Pera

St. Mary's Journal on Legal Malpractice & Ethics

This article focuses on the development of the law of ethics and technology. Emphasis is placed on how technological developments have affected the rules and means by which lawyers practice law and certain ethical pitfalls that have developed hand-in-hand with technological advancements. Topics examined include: (1) the ways by which electronic communication has increased the potential for the attorney–client privilege to be waived and the resulting impact on the present-day practice of law; (2) the effect of social media on lawyers’ ethical obligations, including counseling clients regarding the client’s use of social media and the lawyer’s own use of social …


Gradually Exploded: Confrontation Vs. The Former Testimony Rule., Tim Donaldson Jan 2015

Gradually Exploded: Confrontation Vs. The Former Testimony Rule., Tim Donaldson

St. Mary's Law Journal

Observing live court testimony allows a jury to determine witness credibility. This is called demeanor evidence. Allowing the introduction of transcripts of prior testimony by a witness offends a defendant's right to confrontation guaranteed by the Sixth Amendment of the United States Constitution. Loss of demeanor evidence can heighten sensitivity surrounding the constitutional demands of unavailability and an opportunity for cross-examination. But the loss of this evidence is discounted when dealing with the admissibility of prior testimony as long as a defendant was formerly afforded an opportunity to cross-examine. Demeanor evidence, however, is still treated as a non-essential component of …


The Bitcoin Blockchain As Financial Market Infrastructure: A Consideration Of Operational Risk, Angela Walch Jan 2015

The Bitcoin Blockchain As Financial Market Infrastructure: A Consideration Of Operational Risk, Angela Walch

Faculty Articles

“Blockchain” is the word on the street these days, with every significant financial institution experimenting with this new technology. Many say that this remarkable innovation could radically transform our financial system, eliminating the costs and inefficiencies that plague our existing financial infrastructures. Venture capital investments are pouring into blockchain startups, which are scrambling to disrupt the “quadrillion” dollar markets represented by existing financial market infrastructures. A debate rages over whether public, “permissionless” blockchains (like Bitcoin’s) or private, “permissioned” blockchains are more desirable.

Amidst this flurry of innovation and investment, this paper inquires into the suitability of the Bitcoin blockchain to …


Online Legal Advice: Ethics In The Digital Age, Paige A. Thomas Jan 2014

Online Legal Advice: Ethics In The Digital Age, Paige A. Thomas

St. Mary's Journal on Legal Malpractice & Ethics

The rise of the Internet changed the way initial interactions between lawyers and prospective clients happen. Unfortunately, a host of problems concerning privacy rights and consumer usage have emerged. In this digital age, where immediacy and response time are driving factors in an attorney’s online presence, the approach to establish an attorney-client relationship is far more informal. Due to the quick rise of the Internet and social media, the Model Rules of Professional Conduct do not offer a clear answer for attorneys using social media. An inherent danger lies in off-the-cuff remarks, made on the Internet—a platform generally associated with …


The Qualified Privilege Of Texas Lawyers To Defend Their Reputations., Clement J. Hayes Jan 2014

The Qualified Privilege Of Texas Lawyers To Defend Their Reputations., Clement J. Hayes

St. Mary's Journal on Legal Malpractice & Ethics

The technology-based society of the twenty-first century offers vast Internet resources that afford individuals easy access to information and means of communication. As a result, people spend substantial time online. Some Internet sites, such as Facebook, Twitter, Yelp, Angie's List and Google, provide consumers an online forum for sharing experiences and opinions. This development, while in many respects beneficial, is not without its drawbacks.


The Underrespresentation Of Hispanic Women In The Science, Technology, Engineering, And Mathematics Fields: What Can Be Done To Curie The Problem., Elky Almaraz Jan 2013

The Underrespresentation Of Hispanic Women In The Science, Technology, Engineering, And Mathematics Fields: What Can Be Done To Curie The Problem., Elky Almaraz

The Scholar: St. Mary's Law Review on Race and Social Justice

Hispanic women comprise approximately eight percent of the United States’ population and represent the largest group of minority women. However, Hispanic women only make up approximately two percent of the science and engineering workforce. In contrast, Caucasian women form approximately one-third of the United States’ population and eighteen percent of the science, technology, engineering, or mathematics (STEM) workforce. Hispanic women begin a post-secondary education in STEM fields with a proportional interest to other gender or racial groups. However, they are far less likely to continue the coursework and ultimately earn a degree than their non-minority classmates. Schools and education officials …


Keep Your “Friends” Close And Your Enemies Closer: Walking The Ethical Tightrope In The Use Of Social Media., John G. Browning Jan 2013

Keep Your “Friends” Close And Your Enemies Closer: Walking The Ethical Tightrope In The Use Of Social Media., John G. Browning

St. Mary's Journal on Legal Malpractice & Ethics

This Article will examine the ethical issues posed by lawyers’ use of social media platforms in light of the ABA Ethics Commission 20/20 changes to the Model Rules of Professional Conduct. Social networking has had a transformative effect both on the way society shares information and on the legal profession. Much of the discussion to date focuses on the discovery and use of evidence from social media sites in criminal cases and civil litigation, but attention must also be directed to the ethical quandaries posed by the legal profession’s use of social media. This Article will consider issues such as …


Data Security And Tort Liability, Vincent R. Johnson Jan 2008

Data Security And Tort Liability, Vincent R. Johnson

Faculty Articles

Established tort principles carefully applied to the contemporary problems of cybersecurity and identity theft can perform a key role in protecting the economic foundations of modern life. Tort law offers an appropriate legal regime for allocating the risks and spreading the costs of database intrusion-related losses. It can also create incentives, on the part of both database possessors and data subjects, to minimize the harm associated with breaches of database security.

In considering this field of tort law, it is useful to differentiate three questions. The first issue is whether database possessors have a legal duty to safeguard data subjects’ …


The Protect America Act Of 2007: A Framework For Improving Intelligence Collection In The War On Terror, Jeffrey F. Addicott, Michael T. Mccaul Jan 2008

The Protect America Act Of 2007: A Framework For Improving Intelligence Collection In The War On Terror, Jeffrey F. Addicott, Michael T. Mccaul

Faculty Articles

The most important weapon in the War on Terror is intelligence. The Protect America Act of 2007, a modification of the Foreign Intelligence Surveillance Act (FISA), was favored by Congress for providing a positive framework for ensuring the proper rule of law kept pace with changes in technology. FISA closed the intelligence gaps that had arisen because of the application of the Act to foreign persons in foreign countries.

FISA codifies in federal law the procedures associated with how electronic surveillance and searches of acquisition of foreign intelligence is conducted. In order to conduct electronic surveillance, a court order must …


Fattening Foods: Under Products Liability Litigation Is The Big Mac Defective?, Charles E. Cantú Jan 2005

Fattening Foods: Under Products Liability Litigation Is The Big Mac Defective?, Charles E. Cantú

Faculty Articles

Excessive consumption of fast food may produce negative results, but it does not render fast food products, like the McDonald’s Big Mac, defective. While no product is technologically perfect, and any product can cause injury, American jurisprudence has always held purveyors of defective food liable. The question is whether fattening foods, such as the Big Mac, are defective under a strict products liability theory.

The cornerstone of this cause of action requires a product to be defective, which may stem from: (1) mis-manufacturing, where the product enters the stream of commerce in an unintended condition; (2) mis-marketing, where the risks …


Tangible Or Intangible - Is That The Question - Conflict In The Texas Tax Classification System Of Computer Software Comment., Christine E. Reinhard Jan 1998

Tangible Or Intangible - Is That The Question - Conflict In The Texas Tax Classification System Of Computer Software Comment., Christine E. Reinhard

St. Mary's Law Journal

This Comment evaluates tax classification of computer software in Texas under recent statutory provisions and case law. The author focuses on whether computer software constitutes tangible or intangible property and whether computer software should be taxable or not. Determining property classification is not easy—the term “computer software” is difficult to define, and the multitude of different types of computer software further obscures the formation of a uniform definition. The Texas legislature’s ability to tax both tangible and intangible property makes classifying computer software as either type unnecessary. Texas can resolve the conflict in its tax classification system, wherein computer software …