Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Law

Regulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks, Drew Simshaw, Nicolas Terry, Kris Hauser, M.L. Cummings Jan 2016

Regulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks, Drew Simshaw, Nicolas Terry, Kris Hauser, M.L. Cummings

Richmond Journal of Law & Technology

Some of the most dynamic areas of robotics research and development today are healthcare applications. Robot-assisted surgery, robotic nurses, in-home rehabilitation, and eldercare robots' are all demonstrating rapidly iterating innovation. Rising healthcare labor costs and an aging population will increase demand for these human surrogates and enhancements. However, like many emerging technologies, robots are difficult to place within existing regulatory frameworks. For example, the federal Food, Drug, and Cosmetic Act (FD&C Act) seeks to ensure that medical devices (few of which are consumer devices) are safe, the HIPAA Privacy and Security Rules apply to data collected by health care providers …


A Litigator's Guide To The Internet Of Things, Antigone Peyton Jan 2016

A Litigator's Guide To The Internet Of Things, Antigone Peyton

Richmond Journal of Law & Technology

Maybe you've heard about the Internet of Things (loT). It's the network of physical objects (or "things") that connect to the Internet and each other and have the ability to collect and exchange data. It includes a variety of devices with sensors, vehicles, buildings, and other items that contain electronics, software, and sensors. Some loT objects have "embedded intelligence," which allows them to detect and react to changes in their physical state. Though there is no specific definition of loT, the concept focuses on how computers, sensors, and objects interact with each other and collect information relating to their surroundings.


Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick Jan 2016

Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick

Richmond Journal of Law & Technology

Our prior scholarship examined the legal and technical challenges involved in modern Merger & Acquisition ("M&A") due diligence practices associated with transactions ("Deals"), given recent but steady advances in technology and related increases in sophistication seen in Deal participants-primarily the organizations or assets targeted (the "Targets") as part of the Deal, and the organizations that pursued and/or resulted from the Deal (the "Acquirers"). We then proposed a framework addressing five particular verticals of interest and concern: data privacy ("DP"), information security ("IS"), e-Discovery, information governance ("IG"), and the due diligence and record keeping associated with the Deal itself ("Deal Information") …


Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey Jan 2015

Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey

Richmond Journal of Law & Technology

Lawyers and technology have an uneasy relationship. Although some lawyers are early adapters, others take pride in ignoring technology because they believe it is alien to the practice of law. As Jody R. Westby observed, lawyers confronted with technology and security issues tend to have their “eyes glaze over” and “want to call in their ‘IT guy’ and go back to work.” But this technophobic attitude may no longer just be harmless conservatism. In the world of growing security risks, ignorance of technology may lead to violations of lawyers’ fundamental ethical duties of competence and confidentiality.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Jan 2015

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Richmond Journal of Law & Technology

The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.


Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles Jan 2015

Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks And Legal Complexities Associated With International ‘Bring Your Own Device’ Programs, Melinda L. Mclellan, James A. Sherer, Emily R. Fedeles

Richmond Journal of Law & Technology

The cross-use of mobile devices for personal and professional purposes—commonly referred to as “Bring Your Own Device” or “BYOD” for short—has created a new backdrop for doing business that was scarcely imaginable even ten years ago.


The Compliance Case For Information Governance, Peter Sloan Jan 2014

The Compliance Case For Information Governance, Peter Sloan

Richmond Journal of Law & Technology

In an increasingly convoluted information environment, organizations strive to manage information-related risks and exposures, minimize information-related costs, and maximize information value. The inadequacy of traditional strategies for addressing information compliance, risk, and value is becoming clear, and so too is the need for a better, more holistic approach to governing the organization’s information.


The Reasonable Information Security Program, Peter Sloan Jan 2014

The Reasonable Information Security Program, Peter Sloan

Richmond Journal of Law & Technology

Our information inhabits a perilous world. Cyber theft, cyber extortion, mobile device loss, misappropriation of confidential business information, and unauthorized disclosures of protected information are real and present dangers for organizations of all sizes and across all industries.


The Tangled Web: A Case Against New Generic Top-Level Domains, Joseph P. Smith Iii Jan 2014

The Tangled Web: A Case Against New Generic Top-Level Domains, Joseph P. Smith Iii

Richmond Journal of Law & Technology

If we had a reliable way to label our toys good and bad, it would be easy to regulate technology wisely. But we can rarely see far enough ahead to know which road leads to damnation.


An Expected Harm Approached To Compensating Consumers For Unauthorized Information Disclosures, Rachel Yoo Jan 2012

An Expected Harm Approached To Compensating Consumers For Unauthorized Information Disclosures, Rachel Yoo

Richmond Journal of Law & Technology

On May 22, 2007, the Executive Office of the President of the United States issued a memorandum concerned with safeguarding personal information, which first defined the term “personally identifiable information” as follows:

[I]nformation which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.


A Vaccine Approach To The Reverse Payment Illness, Scott Bergeson Jan 2012

A Vaccine Approach To The Reverse Payment Illness, Scott Bergeson

Richmond Journal of Law & Technology

Big Brand Name develops and files a patent for a drug that kills bacteria in an innovative way. The drug is groundbreaking and potentially marketable, so Big Brand Name incurs the enormous cost (estimated at $868 million) and time of drug discovery research and safety determinations of clinical trials to bring the drug to market. Small Generic Company wants to sell the same drug but must wait until Big Brand Name’s patent expires or, in the alternative, Small Generic Company can file an Abbreviated New Drug Application (“ANDA”) with the FDA and allege Big Brand Name’s patent is invalid or …


Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm Jan 2011

Current And Emerging Transportation Technology: Final Nails In The Coffin Of The Dying Right Of Privacy?, James D. Phillips, Katharine E. Kohm

Richmond Journal of Law & Technology

Transportation networks constitute “the circulatory system of our economy.” The distinct modes that constitute the American transportation system—air, rail, transit, highways, and waterways—impact the entire range of our daily activities. Just as the human body depends on its circulatory system for life and well being, the United States’ vitality would grind to a halting stop without a vibrant transportation system.


Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer Jan 2011

Better Late Than Never: How The Online Advertising Industry’S Response To Proposed Privacy Legislation Eliminates The Need For Regulation, Catherine Schmierer

Richmond Journal of Law & Technology

Although Julie Matlin liked the shoes she saw on Zappos.com, she ultimately left the site without purchasing them. However, it was not the last time she would see that pair of shoes. For the next several days, the shoes followed Ms. Matlin to numerous other websites. “It was as if Zappos had unleashed a persistent salesmen who wouldn’t take no for an answer.” Understandably, Ms. Matlin found this “online stalking” disturbing, but she was more troubled when ads for her online dieting service started following her as well. She stated, “They are still following me around, and it makes me …


Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor Jan 2011

Busting Blocks: Revisiting 47 U.S.C. § 230 To Address The Lack Of Effective Legal Recourse For Wrongful Inclusion In Spam Filters, Jonathan I. Ezor

Richmond Journal of Law & Technology

Consider a company that uses e-mail to conduct a majority of its business, including customer and vendor communication, marketing, and filing official documents. After conducting business in this manner for several years, one day the company discovers that its most recent e-mails were not delivered to recipients using a major Internet Service Provider (“ISP”) because the company was recently listed on an automated block list as a sender of unwanted bulk commercial e-mail (“spam”).


Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin Jan 2009

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin

Richmond Journal of Law & Technology

Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.


“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves Jan 2009

“Medical” Monitoring For Non-Medical Harms: Evaluating The Reasonable Necessity Of Measures To Avoid Identity Fraud After A Data Breach, James Graves

Richmond Journal of Law & Technology

In July 2005, “reformed” hacker Albert Gonzalez noticed an insecure wireless network at a Marshalls department store in Miami. After exploiting the vulnerability, Gonzalez and his accomplices installed programs that captured credit card numbers. They stored the credit card numbers on servers in Latvia and Ukraine, created ATM cards using some of the numbers, and used those cards to withdraw hundreds of thousands of dollars in cash. Fifteen months later, Marshalls’ parent company, TJX, announced that forty-five million of its customers’ credit card numbers had been exposed to the thieves.


E-Commerce: Legal Issues Of The Online Retailer In Virginia, Jonathan D. Frieden, Sean Patrick Roche Jan 2006

E-Commerce: Legal Issues Of The Online Retailer In Virginia, Jonathan D. Frieden, Sean Patrick Roche

Richmond Journal of Law & Technology

The popularity and growth of online retailing, now in its tenth year, has shattered experts’ expectations. “Online sales in the United States grew twenty-four percent last year, to about $90 billion, and online retailing now accounts for nearly five percent of all retail sales.”


“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, Tim Searcy Jan 2004

“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, Tim Searcy

Richmond Journal of Law & Technology

Senators, thank you for giving me this opportunity to testify before you today, on a matter of great importance to U.S. consumers, and business alike: the formation of a federal Do Not Call Registry. I am the Executive Director of the American Teleservices Association, which is the largest and only association dedicated exclusively to the interests of the teleservices industry. We are enjoying our twentieth anniversary this year, and represent approximately 650 rms involved in the teleservices industry. Our membership is tremendously diverse, and encompasses all aspects of telemarketing, customer service, market research, political calling, non- profit fundraising and technical …


Unleashing “Instant Messaging” From Regulatory Oversight, Fernando R. Laguarda Jan 2004

Unleashing “Instant Messaging” From Regulatory Oversight, Fernando R. Laguarda

Richmond Journal of Law & Technology

America Online, Inc. (“AOL”) and Time Warner Inc. announced their intention to merge on January 10, 2000. At that time, there was a great deal of excitement about combining these two companies and harnessing the power of an increasingly broadband Internet. In addition to the Federal Trade Commission (“FTC”) and Federal Communications Commission (“FCC”), more than one thousand local communities conducted their own reviews of the merger. The FTC identified “open access” to the Time Warner Cable platform as an issue meriting specific relief.


“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, Lee Hammond Jan 2004

“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, Lee Hammond

Richmond Journal of Law & Technology

My name is Lee Hammond and I am a member of AARP’s Board of Directors. On behalf of AARP and its thirty- ve million members, thank you for inviting us here this morning to discuss the importance of implementing and enforcing the Federal Trade Commission’s (FTC) national Do Not Call registry. AARP’s members have been among the millions of Americans who have taken the initiative to place their phone numbers into the Registry in an effort to reduce the amount of unwanted telemarketing calls. We share your indignation over recent court decisions to stymie this effort and we are here …


“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, Gerald Cerasale Jan 2004

“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, Gerald Cerasale

Richmond Journal of Law & Technology

Good morning, Mr. Chairman and members of the Committee. I thank you for the opportunity to appear before your Committee as it examines the issues surrounding the national Do-Not-Call Registry. I am Jerry Cerasale, Senior Vice President for The Direct Marketing Association, Inc. (“The DMA”).


Do Not Call: Abdicating And Ignoring Responsibility, Tim Searcy Jan 2004

Do Not Call: Abdicating And Ignoring Responsibility, Tim Searcy

Richmond Journal of Law & Technology

I am not a lawyer, but for nearly a decade and a half, I have dealt with the issues that gave rise to the Federal Do Not Call Registry. Regardless of what you have read or seen, this issue did not just appear on the scene with the updating of the FTC’s Telemarketing Sales Rule or the subsequent corollary changes made by the FCC in its rules implementing the Telephone Consumer Protection Act (“TCPA”). As a matter of fact, the original regulatory rulemaking by the FCC to implement the TCPA are over a decade old.


“Do-Not-Call List” Testimony: Before The House Committee On Energy And Commerce, Timothy J. Muris Jan 2004

“Do-Not-Call List” Testimony: Before The House Committee On Energy And Commerce, Timothy J. Muris

Richmond Journal of Law & Technology

Mr. Chairman, I am Timothy J. Muris, Chairman of the Federal Trade Commission.1 I am pleased to appear today, on behalf of the Commission, to provide the Committee with information about our recently-announced amendments to the Telemarketing Sales Rule (“TSR” or “Rule”). In particular, you have asked about our request for authority to collect fees to offset the costs of implementing the “do-not-call” amendments to the TSR. Our testimony provides an overview of the TSR amendment process, discussion of the do-not-call provisions, and an examination of the funding request. The do-not-call registry is an important aspect of the Commission’s ongoing …


Telemarketing Sales Rule Comment For 16 Cfr Part 310 — American Association Of Retired Persons, David Certner Jan 2004

Telemarketing Sales Rule Comment For 16 Cfr Part 310 — American Association Of Retired Persons, David Certner

Richmond Journal of Law & Technology

AARP appreciates this opportunity to comment on the Federal Trade Commission’s (FTC) Notice of Proposed Rulemaking to amend the Telemarketing Sales Rule (the Rule). AARP’s interest in the Telemarketing Sales Rule and concerns about telemarketing abuses are long- standing. Seven years ago we were active participants in the original rulemaking proceeding. Since the adoption of the Rule in 1995, AARP has dedicated signi cant resources to educating consumers about telemarketing fraud and to working with federal, state and local law enforcement agencies to combat it. We have also worked with state legislatures to enact state telemarketing legislation. The existing Rule …


“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, James Guest Jan 2003

“Do-Not-Call-List” Testimony: Before The Senate Committee On Commerce, Science, And Transportation, James Guest

Richmond Journal of Law & Technology

Mr. Chairman, members of the Committee, thank you for the opportunity to be here with you today. My name is Jim Guest, and I am President of Consumers Union, the independent, non- profit publisher of Consumer Reports magazine and ConsumerReports.org, with over ve million subscribers.


Ad Rules Infinitum: The Need For Alternatives To State-Based Ethics Governing Legal Services Marketing, William E. Hornsby Jr. Jan 2002

Ad Rules Infinitum: The Need For Alternatives To State-Based Ethics Governing Legal Services Marketing, William E. Hornsby Jr.

University of Richmond Law Review

For most of the Twentieth Century, lawyer advertising was prohibited. Beginning with the Canons of Ethics ("Canons"), adopted by the American Bar Association (the "ABA" or "Association") in 1908, it was unethical for lawyers to advertise or engage in most forms of marketing. The 1977 United States Supreme Court decision of Bates v. State Bar of Arizona held that, under the First Amendment doctrine of commercial speech, states did not have the right to ban lawyer advertising. The decision, however, gave states the responsibility to regulate this activity. This began an experiment to balance consumer protection with the flow of …


Cyberian Signals, Steven A. Hetcher Jan 2002

Cyberian Signals, Steven A. Hetcher

University of Richmond Law Review

In Law and Social Norms, Eric Posner offers an original and important theory of the emergence of norms. According to Posner, norms are collections of signals. He develops his signaling account in a variety of contexts, including criminal law, family law, political participation, and racial discrimination. This article extends Posner's theory to cyberspace, a domain of social organization not touched on in Posner's book. In particular, I will test Posner's theory by examining how well it explains the emergence of Web site privacy norms. Part One will examine signaling theory. Part Two will explore privacy norms in some detail, and …


Consumer Privacy, James M. Mccauley Jan 2000

Consumer Privacy, James M. Mccauley

Richmond Journal of Law & Technology

Pretty scary. This whole business of technology and privacy. I don't know about you but it makes me think about that John Grimes song where he wanted to blow up the TV, throw away the paper, and move to the country. I think that there are probably some things that we can do and that we cannot do. One of the things that comes to mind in listening to my colleagues talk about the shutdown of the dotcoms, last year Congress overhauled the 65 year prohibition against insurance companies not being permitted to get involved in financial services and banking. …


Market Power And The Ftc, John C. Hilke Jan 2000

Market Power And The Ftc, John C. Hilke

Richmond Journal of Law & Technology

Although the DOJ/FTC Merger Guidelines provide a firm foundation for analyzing changes in prospective market power resulting from a proposed merger, the analysis does not focus on detecting or measuring market power that may already exist in the market. Further, antitrust enforcement is focused on anti-competitive mergers and unfair forms of competition. From an antitrust perspective, a firm that lawfully acquired market power does not commit an antitrust offense merely by exercising that power, unless it engages in unfair methods of competition to protect that power.


Consumer Privacy On The Internet, Andrew Shen Jan 2000

Consumer Privacy On The Internet, Andrew Shen

Richmond Journal of Law & Technology

If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …