Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Cyber Deterrence, Eric Talbot Jensen Dec 2012

Cyber Deterrence, Eric Talbot Jensen

Faculty Scholarship

Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …


With Religious Liberty For All: A Defense Of The Affordable Care Act's Contraception Coverage Mandate, Frederick Mark Gedicks Oct 2012

With Religious Liberty For All: A Defense Of The Affordable Care Act's Contraception Coverage Mandate, Frederick Mark Gedicks

Faculty Scholarship

The “contraception mandate” of the Patient Protection and Affordable Care Act of 2010 poses a straightforward question for religious liberty jurisprudence: Must government excuse a believer from complying with a religiously burdensome law, when doing so would violate the liberty of others by imposing on them the costs and consequences of religious beliefs that they do not share? To ask this question is to answer it: One's religious liberty does not include the right to interfere with the liberty of others, and thus religious liberty may not be used by a religious employer to force employees to pay the costs …


Consumers: The (Still) Missing Piece In A Piecemeal Approach To Privacy, Clark Asay Aug 2012

Consumers: The (Still) Missing Piece In A Piecemeal Approach To Privacy, Clark Asay

Faculty Scholarship

U.S. consumers have little actual control over how companies collect, use, and disclose their personal information. This paper identifies two specific instances of this lack of control under U.S. law related to third-party disclosures, what I call the Incognito and Onward Transfer Problems. It then identifies the types of privacy harms that result and examines the advantages and possible drawbacks of a model law aimed at addressing these specific problems. The model law is based on a system of consumer notice and choice, the predominant method used in the U.S. to provide consumers with control over their information. Up until …


Transnational Armed Conflict: A “Principled” Approach To The Regulation Of Counter-Terror Combat Operations, Geoffery S. Corn, Eric Talbot Jensen Mar 2012

Transnational Armed Conflict: A “Principled” Approach To The Regulation Of Counter-Terror Combat Operations, Geoffery S. Corn, Eric Talbot Jensen

Faculty Scholarship

Transnational armed conflicts have become a reality. The increasing sophistication of terrorist organizations, their increasingly transnational nature, and their development of military strike capabilities, push and will continue to push States to resort to combat power as a means to defend against this threat. Relying on the factual fiction that the acts of such terrorists must be attributable to the States from which they launch their operations, or on the legal fiction that the use of military combat power to respond to such threats is in reality just extraterritorial law enforcement, fails to acknowledge the essential nature of such operations. …


Direct-To-Consumer Genetic Testing: Learning From The Past And Looking Toward The Future, Stephanie Bair Jan 2012

Direct-To-Consumer Genetic Testing: Learning From The Past And Looking Toward The Future, Stephanie Bair

Faculty Scholarship

A decade after the complete sequencing of the human genome, we have seen a proliferation of genetic testing services marketed directly to the consumer and purporting to use genetic information to generate individualized health information. These tests have been subject to only minimal regulation, despite the fact that scientists and policymakers have serious concerns about both the clinical effectiveness of the tests and the safety of releasing certain types of health information to the public without the supervision of a health care professional. Proponents of minimal regulation argue that the tests allow for patient autonomy and privacy of genetic information, …


When Agencies Go Nuclear: A Game Theoretic Approach To The Biggest Sticks In An Agency's Arsenal, Brigham Daniels Jan 2012

When Agencies Go Nuclear: A Game Theoretic Approach To The Biggest Sticks In An Agency's Arsenal, Brigham Daniels

Faculty Scholarship

A regulatory agency’s arsenal often contains multiple weapons. Occasionally, however, an agency has the power to completely obliterate its regulatory targets or to make major waves in society by using a “regulatory nuke.” A regulatory nuke is a tool with two primary characteristics. First, it packs power sufficient to profoundly impact individual regulatory targets or significantly affect important aspects of society or the economy. Second, from the perspective of the regulatory agency, it is politically unavailable in all but the most extreme situations. They are found in many corners of the federal bureaucracy. This Article illustrates that even when individual …