Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 30

Full-Text Articles in Law

Virtual Parentalism, Joshua A.T. Fairfield Dec 2012

Virtual Parentalism, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.


Ids Practice After Therasense And The Aia: Decoupling The Link Between Information Disclosure And Inequitable Conduct, Arpita Bhattacharyya, Michael R. Mcgurk Oct 2012

Ids Practice After Therasense And The Aia: Decoupling The Link Between Information Disclosure And Inequitable Conduct, Arpita Bhattacharyya, Michael R. Mcgurk

Arpita Bhattacharyya

An essential element of filing and prosecuting a patent application in the United States is the duty to disclose material information to the United States Patent and Trademark Office (“Patent Office”) under 37 C.F.R. § 1.56 (Rule 56). The failure to disclose information can result in a later ruling of inequitable conduct and unenforceability of the patent. The Federal Circuit’s en banc decision in Therasense heightened the “materiality” and “intent” standards for finding inequitable conduct, but there has been much uncertainty in the patent community regarding the future of the duty of disclosure under Rule 56. The majority in Therasense …


Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller Oct 2012

Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller

Jeffrey T Biller

Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …


Broadcasting Licenses: Ownership Rights And The Spectrum Rationalization Challenge, J. Armand Musey Cfa Sep 2012

Broadcasting Licenses: Ownership Rights And The Spectrum Rationalization Challenge, J. Armand Musey Cfa

J. Armand Musey, CFA

This Article examines the showdown between television broadcast- ers and the government in light of the FCC’s plan to reallocate cur- rently licensed broadcast spectrum to signifcantly higher value mobile broadband use. The government seeks to do so in an economically, socially and legally effcient manner, and has indicated that it seeks a reallocation process that is voluntary for broadcasters. Nonetheless, any spectrum reallocation proceeding raises the question of whether, and to what extent, television broadcasters ultimately possess rights to licensed spectrum, and what type of compensation, if any, they would be owed if the FCC takes their spectrum licenses …


The Drones Are Coming! Will The Fourth Amendment Stop The Threat To Our Privacy., Robert Molko Sep 2012

The Drones Are Coming! Will The Fourth Amendment Stop The Threat To Our Privacy., Robert Molko

Robert Molko

The Drones are coming!

Will the Fourth Amendment Stop their Threat to our Privacy?

Local police have begun to use drones and are planning to expand their use of to survey communities for criminal activity.

On February 14, 2012, President Obama signed the “FAA Modernization and Reform Act of 2012″ into law; it requires the FAA to expedite the process to authorize both public and private use of drones in the national navigable airspace.

The Fourth Amendment of the U.S. Constitution protects our privacy from unreasonable intrusions by the government and we have come to depend on that.

Today, in …


Humans And Humans+: Technological Enhancement And Criminal Responsibility, Susan W. Brenner Aug 2012

Humans And Humans+: Technological Enhancement And Criminal Responsibility, Susan W. Brenner

Susan Brenner

This article examines the implications our use of technological enhancements to improve our physical and/or cognitive abilities will necessarily have on the processes of imposing criminal responsibility on those who victimize others. It explains that while our use of such enhancements is still in its infancy, it is more than likely that their use will dramatically accelerate over the next century or less. The articles examines how law has historically approached the concept of a “legal person,” with reference to “normal” humans, “abnormal” humans, animals, objects, supernatural beings and juristic persons. It also reviews how two other authors have analyzed …


The Large Immortal Machine And The Ticking Time Bomb, Susan Landau Aug 2012

The Large Immortal Machine And The Ticking Time Bomb, Susan Landau

Susan Landau

The 1994 Communications Assistance for Law Enforcement Act (CALEA) requires that digitally switched communications networks carrying voice be designed to accommodate (legally authorized) wiretaps. Since the law's passage, there have been a number of breaches in networks with CALEA-type switches. Despite the fact that CALEA is an "architected security breach," the Federal Communications Commission, whose role it is to promulgate CALEA requirements, the agency does not require any type of security testing or threat modeling for the switches. In this paper, I discuss the implications of the law to switch design, the breaches that have occurred, and what changes the …


Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel Aug 2012

Federal Common Law And The Courts’ Regulation Of Pre-Litigation Preservation, Joshua Koppel

Joshua M. Koppel

With the proliferation in recent years of electronically stored information and the skyrocketing cost of retaining large amounts of data, issues of preservation have played an increasing role in litigation. Companies and individuals that anticipate that they will be involved in litigation in the future may be obligated to preserve relevant evidence even before litigation is initiated. Because litigation has not yet commenced, they cannot seek clarification regarding their obligations from a court or negotiate them with an adverse party. Statutory or common law preservation duties play a large role in guiding potential litigants in this area.

The federal courts …


Copyright Lawmaking And The Public Choice: From Legislative Battles To Private Ordering, Yafit Lev-Aretz Aug 2012

Copyright Lawmaking And The Public Choice: From Legislative Battles To Private Ordering, Yafit Lev-Aretz

Yafit Lev-Aretz

On January 18th, 2012, the Web went dark in the largest online protest in history. Two anti-piracy Bills – The Stop Online Piracy Act (SOPA) and The Protect IP Act (PIPA) – attracted waves of opposition from the Internet community, which culminated on January 18th into an unprecedented 24-hour Web strike, followed by a decision to shelve the Bills indefinitely. This Article argues that the SOPA/PIPA protest created a new political reality in copyright lawmaking, with the tech industry becoming a very influential actor on the one hand, and social networks lowering mobilization costs of individual users on the other …


Crowdsourcing A Trademark: What The Public Giveth, The Courts May Taketh Away, Llewellyn Joseph Gibbons Aug 2012

Crowdsourcing A Trademark: What The Public Giveth, The Courts May Taketh Away, Llewellyn Joseph Gibbons

Llewellyn Joseph Gibbons

There is a long tradition of trademark holders relying on the public to create designations that they then adopt as trademark. Historically, this has been a long slow process. From the individual’s use of the term, to the acquisition of secondary meaning could take years. Web 2.0 social media has the potential to speed up this process. Frequently, these are nicknames for well-known brands, so they are potentially quite valuable. Trademark law is ambiguous regarding who owns a designation created by the public, if the individual claiming the mark have not appropriated the mark by actually using it in commerce. …


Substantive Rights In A Constitutional Technocracy, Abigail Moncrieff Aug 2012

Substantive Rights In A Constitutional Technocracy, Abigail Moncrieff

Abigail R. Moncrieff

There are two deep puzzles in American constitutional law, particularly related to individual substantive rights, that have persisted across generations: First, why do courts apply a double standard of judicial review, giving strict scrutiny to noneconomic liberties but mere rational basis review to economic ones? Second, why does American constitutional law take the common law baseline as the free and natural state that needs to be protected? This Article proposes a technocratic vision of substantive rights to explain and justify both of these puzzles. The central idea is that modern substantive rights—the rights to speech, religion, association, reproduction, and parenting—protect …


Consumers: The (Still) Missing Piece In A Piecemeal Approach To Privacy, Clark Asay Aug 2012

Consumers: The (Still) Missing Piece In A Piecemeal Approach To Privacy, Clark Asay

Clark Asay

U.S. consumers have little actual control over how companies collect, use, and disclose their personal information. This paper identifies two specific instances of this lack of control under U.S. law related to third-party disclosures, what I call the Incognito and Onward Transfer Problems. It then identifies the types of privacy harms that result and examines the advantages and possible drawbacks of a model law aimed at addressing these specific problems. The model law is based on a system of consumer notice and choice, the predominant method used in the U.S. to provide consumers with control over their information. Up until …


A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz Jun 2012

A Treaty Of Versailles - How Microsoft Wants To, And How They Could, End The Patent War, Andrew Pierz

Andrew Pierz

Android began as a project by Andy Rubin after developing the Sidekick. The project was soon acquired by Google and licensed as open-source technology for third parties, like Samsung and HTC, to use in their phones. After Microsoft fell in mobile market share, they began to pursue aggressive litigation and licensing deals. Google, after pledging to defend their manufacturing partners, announced they would acquire Motorola Mobility for their patent portfolio. The paper will explore the history of Android and Windows Mobile, the extent of Microsoft’s mobile patent portfolio, the structure of Microsoft’s various deals, the planned acquisition of Motorola Mobility …


Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo Apr 2012

Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo

Tony Guo

As the Egyptian government took the country offline—in an effort to squelch public dissent—the U.S. Senate considers a bill that would give the President the same emergency powers to shut off “critical” Internet infrastructure in the event of a “cyber emergency.” This bill, along with others like it, has been introduced in light of recent political rhetoric on “cyber war.” The proponents of “cyber war” evoke images of large explosions, poison gas clouds, and a high degree of mortality. In reality, cyber warfare is a misleading metaphor, and has long been confused with crime and espionage. "Cyber war" is not …


Can A Computer Intercept Your Email?, Bruce E. Boyden Mar 2012

Can A Computer Intercept Your Email?, Bruce E. Boyden

Bruce E. Boyden

In recent years it has become feasible for computers to rapidly scan the contents of large amounts of communications traffic to identify certain characteristics of those messages: that they are spam, contain malware, discuss various products or services, are written in a particular dialect, contain copyright-infringing files, or discuss symptoms of particular diseases. There is a wide variety of potential uses for this technology, such as research, filtering, or advertising. But the legal status of automated processing, if it is done without advance consent, is unclear. Where it results in the disclosure of the contents of a message to others, …


Autonomous Weapon Systems: A Coming Legal Singularity?, Benjamin N. Kastan Mar 2012

Autonomous Weapon Systems: A Coming Legal Singularity?, Benjamin N. Kastan

Benjamin N Kastan

Military robotics has long captured the popular imagination in movies, books and magazines. In recent years, this technology has moved from the realm of science fiction to reality. The precursors to truly autonomous weapons, the so-called “drones”, have generated a great deal of discussion. Few authors, however, have applied current law to the developing technology of autonomous military robots, or “autonomous weapon systems”. The treatment of such subjects in the ethics, robotics, and popular literature has generally assumed that autonomous systems either fit perfectly into existing legal regimes or threaten long-standing paradigms. This article demonstrates that neither assumption is correct. …


Embryo Disposition Agreements: The Effect Of Personal Autonomy, Constitutional Rights, And Public Policy On Enforceability, Damages, And Remedies, Nicholas Seger Mar 2012

Embryo Disposition Agreements: The Effect Of Personal Autonomy, Constitutional Rights, And Public Policy On Enforceability, Damages, And Remedies, Nicholas Seger

Nicholas D. Seger

No abstract provided.


Patent Chokepoints In The Influenza-Related Medicines Industry: Can Patent Pools Provide Balanced Access?, Dana Beldiman Mar 2012

Patent Chokepoints In The Influenza-Related Medicines Industry: Can Patent Pools Provide Balanced Access?, Dana Beldiman

Dana Beldiman

This paper illustrates the fact that when biological materials are used for development of pharmaceuticals, the patent system may function sub-optimally and may give rise to patent “thickets” and “anti-commons” which prevent commercialization of adequate amounts of product. These circumstances include inventions based on the same biological resource, patenting of largely similar functionalities, gene patents and patents that are narrow and fragmented. As a result, in order to obtain freedom to operate, drug developers must license-in multiple patents, often from competitors. This situation gives rise to uncertainty and is prone to hold-outs. The number of players actually developing drugs is …


Writing Rights: Copyright’S Visual Bias And African American Music, Olufunmilayo B. Arewa Feb 2012

Writing Rights: Copyright’S Visual Bias And African American Music, Olufunmilayo B. Arewa

Olufunmilayo B. Arewa

Copyright was first applied to words and was initially visual in orientation. Since the earliest copyright laws, copyright subject matter has progressively expanded from granting rights to protect written expression to other artistic arenas. Copyright law has, however, consistently undervalued the art of performance while favoring the written expression of music, which has had a profound impact on African American based musical forms, now a dominant basis for popular music. This paper examines the privilege of sight in copyright and the numerous ways in which copyright law systematically disfavors performance and suggests two possible explanations. First, copyright law seems to …


Down-Sizing The Little Guy Myth In Legal Definitions, Mirit Eyal-Cohen Feb 2012

Down-Sizing The Little Guy Myth In Legal Definitions, Mirit Eyal-Cohen

Mirit Eyal-Cohen

What is “small” in the eyes of the law? In fact, there is not one standard definition. Current lax legal definitions of firm’s size are inconsistent and overinclusive. They result in data distortion that reinforces favoritism toward small entities as studies on the contribution of small business to the economy are greatly dependent on those studies’ delineation of the term “small.” Therefore, I argue that the current focus on size in legal definitions is a waste of time and money. In this time of huge deficits and rise in economic inequality, a lot of money is being spent based on …


Transcending The Tacit Dimension: Patents, Relationships, And The Industrial Organization Of Technology Transfer, Peter Lee Feb 2012

Transcending The Tacit Dimension: Patents, Relationships, And The Industrial Organization Of Technology Transfer, Peter Lee

Peter Lee

As a key driver of innovation and economic growth, university-industry technology transfer has attracted significant attention. Formal technology transfer, which encompasses patenting and licensing university inventions, is often characterized as proceeding according to market principles. According to this dominant conception, patents help commodify academic inventions, which universities then advertise and transfer to private firms in licensing markets.

This Article challenges and refines this market-oriented view of technology transfer. Drawing from empirical studies, it shows that effective technology transfer often involves long-term personal relationships rather than discrete market exchanges. In particular, it explores the significant role of tacit, uncodified knowledge in …


Renewing The Bayh-Dole Act As A Default Rule In The Wake Of Stanford V. Roche, Parker Tresemer Dec 2011

Renewing The Bayh-Dole Act As A Default Rule In The Wake Of Stanford V. Roche, Parker Tresemer

Parker Tresemer

Since its enactment in 1980, the Bayh-Dole Act has incentivized university and private industry investment in new technologies by granting them exclusive patent rights to their inventors’ federally funded technologies. The Supreme Court’s holding in Stanford v. Roche, however, threatens to stall American innovation by undermining the Act’s intended structure for disposition of intellectual property rights. Congress enacted the Bayh-Dole Act to solve a specific problem: stagnating technological innovation in the decades after World War II. Universities and private companies are unwilling to commercialize basic federally funded technologies without exclusive rights to those technologies. The Congressional record surrounding the Bayh-Dole …


Best Practices For Drafting University Technology Assignment Agreements After Filmtec, Stanford V. Roche, And Patent Reform, Parker Tresemer Dec 2011

Best Practices For Drafting University Technology Assignment Agreements After Filmtec, Stanford V. Roche, And Patent Reform, Parker Tresemer

Parker Tresemer

Since the end of World War II, federally funded universities and private companies have been an integral part of continued American innovation and technological production. However, like most rational economic actors, universities and private companies are only willing to invest in federally funded technologies if they are guaranteed some sort of exclusive return on their investment. By granting federal contractors exclusive patent rights to their employee’s federally funded inventions, the Bayh-Dole Act provided the necessary incentives for private sector investment in federally funded technologies. However, case law subsequent to Bayh-Dole’s enactment has significantly undermined the system of incentives Congress intended …


Interests In The Balance: Fda Regulations Under The Biologics Price Competition And Innovation Act, Parker Tresemer Dec 2011

Interests In The Balance: Fda Regulations Under The Biologics Price Competition And Innovation Act, Parker Tresemer

Parker Tresemer

Recent biotechnology advances are yielding potentially life-saving therapies, but without FDA regulations designed to minimize product costs, patients will continue to be unable to afford these expensive biologic products. Many believe that these prohibitive costs stem from weak competition from generic biologic products, also known as follow-on biologics. To correct this deficiency, and to address the often conflicting regulatory and policy concerns associated with biologic products, Congress enacted the Biologics Price Competition and Innovation Act. The Act created an abbreviated approval pathway for biologic products and, if effective, could increase competition while driving down product costs. But legislation alone is …


Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague Dec 2011

Facebook Meets The Nlrb: Employee Online Communications And Unfair Labor Practices, Robert Sprague

Robert Sprague

In the past eighteen months, the National Labor Relations Board (“NLRB”) has received approximately one hundred charges from employees that were disciplined or fired as a result of their work-related online communications, principally through Facebook. These and other charges have resulted in twenty-one NLRB Office of the General Counsel Advice Memoranda, ten General Counsel reviews, four Administrative Law Judge (“ALJ”) decisions, and one Board decision, all addressing employee use of social media. This Article is the first to examine in detail those employee charges and the thirty-six incidents addressed by the Office of the General Counsel, the ALJs, and the …


Note: Guiding The Modern Lawyer Through A Global Economy: An Analysis On Outsourcing And The Aba's 2012 Proposed Changes To The Model Rules, Patrick Poole Dec 2011

Note: Guiding The Modern Lawyer Through A Global Economy: An Analysis On Outsourcing And The Aba's 2012 Proposed Changes To The Model Rules, Patrick Poole

Patrick Poole

Over the last few decades, the dramatic changes that have occurred in the global economy have similarly altered the landscape for outsourced work both domestically and internationally. One study estimates that as many as 3.3 million white-collar jobs could be shipped abroad by 2015. This growing trend has also substantially affected the unique nature of the legal field. For the past year and a half, the American Bar Association (ABA) Ethics 20/20 Commission has been considering changes to the Model Rules of Professional Conduct as they relate to domestic and international outsourcing. The revision process has included soliciting input from …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan Dec 2011

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan

Richard Warner

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …


Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Co-Authored With Robert Sloan, Richard Warner, Robert H. Sloan Dec 2011

Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Co-Authored With Robert Sloan, Richard Warner, Robert H. Sloan

Richard Warner

No abstract provided.


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …


Like Deck Chairs On The Titanic: Why Spectrum Reallocation Won’T Avert The Coming Data Crunch But Technology Might Keep The Wireless Industry Afloat, Brian J. Love, David J. Love, James V. Krogmeier Dec 2011

Like Deck Chairs On The Titanic: Why Spectrum Reallocation Won’T Avert The Coming Data Crunch But Technology Might Keep The Wireless Industry Afloat, Brian J. Love, David J. Love, James V. Krogmeier

Brian J. Love

Skyrocketing mobile data demands caused by increasing adoption of smartphones, tablet computers, and broadband-equipped laptops will soon swamp the capacity of our nation’s wireless networks, a fact that promises to stagnate a $1 trillion slice on the nation’s economy. Among scholars and policymakers studying this looming “spectrum crisis,” consensus is developing that regulators must swiftly reclaim spectrum licensed to other industries and reallocate those rights to wireless providers. In this interdisciplinary piece, we explain in succinct terms why this consensus is wrong. With data demands increasing at an exponential rate, spectrum reallocation plans that promise only linear growth are destined …