Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Law

Algorithms And Human Freedom, Richard Warner, Robert Sloan Apr 2019

Algorithms And Human Freedom, Richard Warner, Robert Sloan

All Faculty Scholarship

Predictive analytics such as data mining, machine learning, and artificial intelligence drive algorithmic decision making. Its "all-encompassing scope already reaches the very heart of a functioning society". Unfortunately, the legal system and its various tools developed around human decisionmakers cannot adequately administer accountability mechanisms for computer decision making. Antiquated approaches require modernization to bridge the gap between governing human decision making and new technologies. We divide the bridge-building task into three questions. First, what features of the use of predictive analytics significantly contribute to incorrect, unjustified, or unfair outcomes? Second, how should one regulate those features to make outcomes more …


The Internet Adopts Two-Way Radio, Henry Perritt Apr 2019

The Internet Adopts Two-Way Radio, Henry Perritt

All Faculty Scholarship

The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …


Keeping The Internet Invisible: Television Takes Over, Henry Perritt Jan 2017

Keeping The Internet Invisible: Television Takes Over, Henry Perritt

All Faculty Scholarship

No abstract provided.


Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski Jan 2016

Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski

All Faculty Scholarship

With millions of small drones in private hands, the FAA continues its struggle to develop an effective regulatory regime to comply with Congress’s mandate to integrate them into the national airspace system. Thousands of individuals and small businesses have obtained authorization from the FAA—"section 333 exemptions"—allowing them to fly their drones commercially. Farmers, TV stations, surveyors, construction-site supervisors, real estate agents, people selling their properties, and managers seeking cheaper and safer ways to inspect their facilities, want to hire the exemption holders, but many are holding back until the FAA clarifies the groundrules.The FAA understands that its traditional approach for …


One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr. Oct 2015

One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.

All Faculty Scholarship

The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.

Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Incentivizing The Utilization Of Pharmacogenomics In Drug Development, Valerie Gutmann Koch Jan 2012

Incentivizing The Utilization Of Pharmacogenomics In Drug Development, Valerie Gutmann Koch

All Faculty Scholarship

Pharmacogenomics, the study and development of compounds according to how an individual’s genes affects the body’s response to drugs, holds enormous promise for increasing the safety and efficiency of drug development while decreasing adverse reactions and the trial-and-error nature of drug prescription. However, pharmacogenomics may not be the panacea for all development and prescription problems. This article explores some of the obstacles to pharmacogenomic advancement including industry reluctance to pursue research because of potentially prohibitive costs associated with developing products and legal liability concerns. The implications pharmacogenomics has for drug research and development as well as various areas of law …


Pgtandme: Social Networking-Based Genetic Testing And The Evolving Research Model, Valerie Gutmann Koch Jan 2012

Pgtandme: Social Networking-Based Genetic Testing And The Evolving Research Model, Valerie Gutmann Koch

All Faculty Scholarship

The opportunity to use extensive genetic data, personal information, and family medical history for research purposes may be naturally appealing to the personal genetic testing (PGT) industry, which is already coupling its direct-to-consumer (DTC) products with social networking technologies, as well as to potential industry or institutional partners. This article evaluates the transformation in research that the hybrid of PGT and social networking will bring about, and – highlighting the challenges associated with a new paradigm of “patient-driven” genomic research – focuses on the consequences of shifting the structure, locus, timing, and scope of research through genetic crowd-sourcing. This article …


Digital Originality, Edward Lee Jan 2012

Digital Originality, Edward Lee

All Faculty Scholarship

This Article examines the doctrine of originality in U.S. copyright law and proposes a reconfigured, three-part test that can better analyze issues of first impression involving works created with new digital technologies. The proposed test, encapsulated by the concept of digital originality, provides much needed guidance to courts to address the increasing complexities of digital creations in the twenty-first century.


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan Jan 2012

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan

All Faculty Scholarship

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …


Copyright, Death, And Taxes, Edward Lee Jan 2011

Copyright, Death, And Taxes, Edward Lee

All Faculty Scholarship

The Copyright Act of 1976 is due for a major revision in the 21st century, in order to keep pace with the advances in digital technologies. This Article offers a new alternative for copyright reform: tax law. Using the tax system as a way to modernize our copyright system offers several advantages. Most important, tax law can fix problems in our copyright system without violating the Berne Convention or TRIPS Agreement, and without requiring amendment to either treaty. Tax law can also be used to incentivize the copyright industries to adopt new, innovative approaches to copyright in ways that voluntary …


Cyberclinics: Law Schools, Technology And Justice, Ronald W. Staudt Jan 2011

Cyberclinics: Law Schools, Technology And Justice, Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Technological Fair Use, Edward Lee Jan 2010

Technological Fair Use, Edward Lee

All Faculty Scholarship

The Article proposes a framework tailoring fair use specifically for technology cases. At the inception of the twenty-first century, information technologies have become increasingly central to the U.S. economy. Not surprisingly, complex copyright cases involving speech technologies, such as DVRs, mp3 devices, Google Book Search, and YouTube, have increased as well. Yet existing copyright law, developed long before digital technologies, is ill-prepared to handle the complexities these technology cases pose. The key question often turns, not on prima facie infringement, but on the defense of fair use, which courts have too often relegated to extremely fact-specific decisions. The downside to …


White Paper, The Emergence Of Knowledge Analysis: Change And Knowledge Management In Large Law Firms, Ronald W. Staudt Jan 2010

White Paper, The Emergence Of Knowledge Analysis: Change And Knowledge Management In Large Law Firms, Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


All The Wild Possibilities: Technology That Attacks Barriers To Access To Justice, Ronald W. Staudt Jul 2009

All The Wild Possibilities: Technology That Attacks Barriers To Access To Justice, Ronald W. Staudt

All Faculty Scholarship

Predicting how technology will affect the future of the legal profession is difficult and unreliable work. I have made my share of such predictions in the past thirty years, including foretelling the death of the paper casebook in law schools and vast improvements in law practice that would be triggered by computers and document assembly software. Neither of these two prophesies has yet been fulfilled. Yet a real success story has emerged based in part on my persistent optimism that technology can improve the delivery of legal services. A2J Author, a modest software tool that allows lawyers to build guided …


Conflicts Of Interest In Clinical Trial Recruitment & Enrollment: A Call For Increased Oversight, Valerie Gutmann Koch Jan 2009

Conflicts Of Interest In Clinical Trial Recruitment & Enrollment: A Call For Increased Oversight, Valerie Gutmann Koch

All Faculty Scholarship

This White Paper makes several policy recommendations to eliminate or manage the conflicts of interest that arise pursuant to the compensation arrangements between investigators and their institutions with drug and medical device manufacturers as they affect the recruitment and enrollment of human research subjects in clinical trials. The paper seeks to accomplish overall financial neutrality as between treatment and research, so that physicians' decisions regarding inclusion of patients in clinical trials is unaffected by their own financial interests.


Decoding The Dmca Safe Harbors, Edward Lee Jan 2009

Decoding The Dmca Safe Harbors, Edward Lee

All Faculty Scholarship

The DMCA is a decade old, which, in Internet time, may well be closer to a century. Although the DMCA safe harbors have helped to foster tremendous growth in web applications in our Web 2.0 world, several very basic aspects of the DMCA safe harbors remain uncertain. These uncertainties, along with the relative lack of litigation over the DMCA in the past ten years, have threatened to undermine the whole purpose of the DMCA safe harbors by failing to inform the public and technology companies of what steps they need to undertake to fall within the safe harbors. In several …


Tales From The Crypt: Scientific, Ethical, And Legal Considerations For Biohistorical Analysis Of Deceased Historical Figures, Lori B. Andrews, Jordan K. Paradise Jan 2008

Tales From The Crypt: Scientific, Ethical, And Legal Considerations For Biohistorical Analysis Of Deceased Historical Figures, Lori B. Andrews, Jordan K. Paradise

All Faculty Scholarship

Biohistorical analysis involves using historic specimens of human remains or human material extracted or derived from historical artifacts to gather evidence about specimens that are identifiable or at least attributed to a historic figure at the time of the research. Biohistorical studies are being undertaken for myriad reasons, such as identification and authentication of remains, investigation into alleged criminal behavior, investigation into medical or psychological conditions, and even for purposes of commercialization. This article analyzes federal statutes, case law, and codes and guidelines from twenty-six professional organizations and societies informative to the field of biohistory. We surveyed the field, identified …


Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner Jan 2008

Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner

All Faculty Scholarship

Is the Internet turning contract law on its head? Many commentators contend it is. Precisely this issue arises in current controversies over end user license agreements (EULAs) and Terms of Use agreements (TOUs, the agreements governing our use of web sites). Commentators complain that, in both cases, the formation process unduly restricts buyers’ freedom; and, that sellers and web site owners exploit the process to impose terms that deprive consumers of important intellectual property and privacy rights. The courts ignore the criticisms and routinely enforce EULAs and TOUs. There is truth on both sides of this court/commentator divide. EULAs and …


Patents On Human Genes: An Analysis Of Scope And Claims, Lori B. Andrews, Jordan K. Paradise, Timothy R. Holbrooke Apr 2006

Patents On Human Genes: An Analysis Of Scope And Claims, Lori B. Andrews, Jordan K. Paradise, Timothy R. Holbrooke

All Faculty Scholarship

There is significant domestic and international opposition to gene patents based on the fact that gene patents deter medical research and health care, as well as the policy position that genes are an inherent product of nature. Yet, equally troubling is the fact that gene patents have been issued by the U.S. Patent & Trademark Office that are problematic with respect to existing federal patent law. The authors of this Policy Forum describe their study, which examined issued gene patents covering a variety of genetic diseases and described ways in which many claims fell short of USPTO patentability requirements.


Technology For Justice Customers: Bridging The Digital Divide Facing Self-Represented Litigants, Ronald W. Staudt Mar 2005

Technology For Justice Customers: Bridging The Digital Divide Facing Self-Represented Litigants, Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner Mar 2005

Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner

All Faculty Scholarship

No abstract provided.


Access To Justice For The Self-Represented Litigant: An Interdisciplinary Investigation By Designers And Lawyers (With P. Hannaford), Ronald W. Staudt Mar 2002

Access To Justice For The Self-Represented Litigant: An Interdisciplinary Investigation By Designers And Lawyers (With P. Hannaford), Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


Border Disputes: Trespass To Chattels On The Internet, Richard Warner Mar 2002

Border Disputes: Trespass To Chattels On The Internet, Richard Warner

All Faculty Scholarship

No abstract provided.


American Society For Reproductive Medicine Addresses Preconception Gender Selection, Valerie Gutmann Koch Jul 2001

American Society For Reproductive Medicine Addresses Preconception Gender Selection, Valerie Gutmann Koch

All Faculty Scholarship

No abstract provided.


Nord Issues Gene Patenting Statement, Valerie Gutmann Koch Jul 2001

Nord Issues Gene Patenting Statement, Valerie Gutmann Koch

All Faculty Scholarship

No abstract provided.