Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Diagnostics Need Not Apply, Rebecca S. Eisenberg Sep 2015

Diagnostics Need Not Apply, Rebecca S. Eisenberg

Articles

Diagnostic testing helps caregivers and patients understand a patient's condition, predict future outcomes, select appropriate treatments, and determine whether treatment is working. Improvements in diagnostic testing are essential to bringing about the long-heralded promise of personalized medicine. Yet it seems increasingly clear that most important advances in this type of medical technology lie outside the boundaries of patent-eligible subject matter. The clarity of this conclusion has been obscured by ambiguity in the recent decisions of the Supreme Court concerning patent eligibility. Since its 2010 decision in Bilski v. Kappos, the Court has followed a discipline of limiting judicial exclusions from …


Coming Of Age: Innovation Districts And The Role Of Law Schools, Jennifer S. Fan Jan 2015

Coming Of Age: Innovation Districts And The Role Of Law Schools, Jennifer S. Fan

Articles

New urban models, dubbed “innovation districts” are gaining traction in entrepreneurial-focused areas across the United States. This article begins by defining what innovation districts are. It then examines the potential role that law schools, together with technology transfer offices, can play as innovation cultivators within such districts. Specifically, it looks at three potential models that law schools can consider when contemplating a relationship with the technology transfer office within a university. Integrating a clinic and technology transfer office within an innovation district does not come without its challenges, however. Accordingly, this article will suggest ways for transactional law clinics to …


Campbell At 21/Sony At 31, Jessica D. Litman Jan 2015

Campbell At 21/Sony At 31, Jessica D. Litman

Articles

When copyright lawyers gather to discuss fair use, the most common refrain is its alarming expansion. Their distress about fair use’s enlarged footprint seems completely untethered from any appreciation of the remarkable increase in exclusive copyright rights. In the nearly forty years since Congress enacted the 1976 copyright act, the rights of copyright owners have expanded markedly. Copyright owners’ demands for further expansion continue unabated. Meanwhile, they raise strident objections to proposals to add new privileges and exceptions to the statute to shelter non-infringing uses that might be implicated by their expanded rights. Copyright owners have used the resulting uncertainty …


In Vitro Fertilization And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve P. Calandrillo, Chryssa V. Deliganis Jan 2015

In Vitro Fertilization And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve P. Calandrillo, Chryssa V. Deliganis

Articles

The rise of assisted reproductive technology like in vitro fertilization (“IVF”) as a method of human reproduction represents a remarkable medical achievement. Live births and success rates have increased dramatically in the past decade, so much so that many fertility clinics now “guarantee” a baby to clients who sign up.

But with successes come inevitable downsides. Everyone knows that the price tag is steep, but given the demand, relatively few individuals are deterred. More insidious are the increased birth-defect risks associated with reproductive technologies. For some time it was assumed that these risks were due to the fact that individuals …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo Jan 2015

Self-Defense Against Robots And Drones, A. Michael Froomkin, P. Zak Colangelo

Articles

Robots can pose-or can appear to pose-a threat to life, property, and privacy. May a landowner legally shoot down a trespassing drone? Can she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or Peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This Article addresses all those issues and one more. what rules and standards we could put into place to make the resolution of those questions easier and …


Encouraging Maternal Sacrifice: How Regulations Governing The Consumption Of Pharmaceuticals During Pregnancy Prioritize Fetal Safety Over Maternal Health And Autonomy, Greer Donley Jan 2015

Encouraging Maternal Sacrifice: How Regulations Governing The Consumption Of Pharmaceuticals During Pregnancy Prioritize Fetal Safety Over Maternal Health And Autonomy, Greer Donley

Articles

Pregnant women are routinely faced with the stressful decision of whether to consume needed medications during their pregnancies. Because the risks associated with pharmaceutical drug consumption during pregnancy are largely unknown, pregnant women both inadvertently consume dangerous medications and avoid needed drugs. Both outcomes are harmful to pregnant women and their fetuses. This unparalleled lack of drug safety information is a result of ill-conceived, paternalistic regulations in two areas of the law: regulations governing ethical research in human subjects and regulations that dictate the required labels on drugs. The former categorizes pregnant women as “vulnerable” and thus precludes them from …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Jan 2015

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

Articles

Encroachments on privacy through mass surveillance greatly resemble the pollution crisis in that they can be understood as imposing an externality on the surveilled. This Article argues that this resemblance also suggests a solution: requiring those conducting mass surveillance in and through public spaces to disclose their plans publicly via an updated form of environmental impact statement, thus requiring an impact analysis and triggering a more informed public conversation about privacy. The Article first explains how mass surveillance is polluting public privacy and surveys the limited and inadequate doctrinal tools available to respond to mass surveillance technologies. Then, it provides …


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Derivative Works 2.0: Reconsidering Transformative Use In The Age Of Crowdsourced Creation, Jacqueline D. Lipton, John Tehranian Jan 2015

Derivative Works 2.0: Reconsidering Transformative Use In The Age Of Crowdsourced Creation, Jacqueline D. Lipton, John Tehranian

Articles

Apple invites us to “Rip. Mix. Burn.” while Sony exhorts us to “make.believe.” Digital service providers enable us to create new forms of derivative work — work based substantially on one or more preexisting works. But can we, in a carefree and creative spirit, remix music, movies, and television shows without fear of copyright infringement liability? Despite the exponential growth of remixing technologies, content holders continue to benefit from the vagaries of copyright law. There are no clear principles to determine whether any given remix will infringe one or more copyrights. Thus, rights holders can easily and plausibly threaten infringement …