Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Regulating Human Germline Modification In Light Of Crispr, Sarah Ashley Barnett Jan 2017

Regulating Human Germline Modification In Light Of Crispr, Sarah Ashley Barnett

Law Student Publications

This comment evaluates the United States‘ current regulatory scheme as it applies to CRISPR and related gene-modifying technologies and discusses the ethical ramifications of regulating human germline modification versus continuing to allow self-regulation within the scientific community. Part I explains what CRISPR is, how it works, and its impact on genetic engineering technology. Although CRISPR offers "unparalleled potential for modifying [both] human and nonhuman genomes," this comment focuses primarily on the use of CRISPR technology to manipulate the human germline. Part II discusses the social and bioethical implications of altering the human germline, including safety concerns, multigenerational consequences, equity issues, …


Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo Jan 2017

Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo

Law Student Publications

In just the past five years, the United States has suffered numerous hacks into important entities and institutions across the country by ill-intentioned actors. Private companies and government agencies alike have felt the negative impacts of security breaches by hackers infiltrating proprietary and protected systems. Even the United States political landscape has proven vulnerable to bad actors in the realm of cyber security. Furthermore, analysts have attributed some of the most recent highly publicized hacks to state-sponsored groups. As cyber security threats and opportunities for foreign hackers to infiltrate critical systems become more prevalent, it is natural to wonder where …