Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 91 - 120 of 797

Full-Text Articles in Law

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean Jul 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in digital devices no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking exclusively about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty Jul 2014

Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty

Meredith W. Doherty

As the technology of smartphones has progressed, electronic communication has become an integral and portable part of our daily lives. A recent New Jersey case highlighted the issue of holding the sender of a text message liable for injuries resulting from a motor vehicle accident in which the driver at fault was reading a text message from the sender at the time of the accident. This note focuses on the implications of such liability being imposed on senders of text messages as well as the slippery slope that could result, taking all forms of electronic communication, social media and mobile …


Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald Jun 2014

Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald

Susan Freiwald

This article measures the new ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (LEATPR Standards) success by assessing the guidance they provide legislators interested in updating pertinent law regarding one specific type of data. Scholars should not expect the Standards to yield the same conclusions they would have furnished had they been able to draft a set of standards by themselves. The Standards emerged after years of painstaking consensus building and compromise no individual committee member got entirely what he wanted. Nonetheless, not every product of a committee turns out to have been worth the effort, …


Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander Jun 2014

Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander

Rachel Rose Ostrander

As the science of stem cell research progresses it is difficult to tell what implications it will have on our society and for women. I will begin this discussion by examining how science has viewed women in the past, and use this as a basis to conjecture about how they will be viewed and treated in the future. Prevalent gender bias in scientific writing should be a cause for concern as the science of stem cell research and commodification of the female egg becomes more of a reality.

The process of egg donation has stirred much debate in the feminist …


Facts Can Be Stubborn: The Importance Of The Fact Section In Environmental Law, L.A. County Flood Control Dist. V. Natural Res. Def. Council, 133 S. Ct. 710 (2013), Aaron Schaer Jun 2014

Facts Can Be Stubborn: The Importance Of The Fact Section In Environmental Law, L.A. County Flood Control Dist. V. Natural Res. Def. Council, 133 S. Ct. 710 (2013), Aaron Schaer

Aaron Schaer

L.A. County is a perfect example of a difficulty that underlies many environmental cases. The facts are often incredibly complex, and based on science that even the PhDs among us struggle to comprehend. And if this were not enough, the environmental laws that these facts are siphoned through are no walk in the park themselves. Quite the opposite, as should be expected from political compromises over intricate, ever-evolving science. Environmental laws are rife with jargon and compound terms that are best left to acronyms like NAAQS and NPDES. This itself has become food for fodder, as these laws have been …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Jun 2014

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett May 2014

The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett

Jonathan M Barnett

Voluntary forfeiture of intellectual assets—often, exceptionally valuable assets--is surprisingly widespread in information technology markets. A simple economic rationale can account for these practices. By giving away access to core technologies, a platform holder commits against expropriating (and thereby induces) user investments that support platform value. To generate revenues that cover development and maintenance costs, the platform holder must regulate access to other goods and services within the total consumption bundle. The tradeoff between forfeiting access (to induce adoption) and regulating access (to recover costs) anticipates the substantial convergence of open and closed innovation models. Organizational patterns in the software and …


From Patent Thickets To Patent Networks: The Legal Infrastructure Of The Digital Economy, Jonathan M. Barnett May 2014

From Patent Thickets To Patent Networks: The Legal Infrastructure Of The Digital Economy, Jonathan M. Barnett

Jonathan M Barnett

Scholarly and popular commentary often assert that markets characterized by intensive patent issuance and enforcement suffer from “patent thickets” that suppress innovation. This assertion is difficult to reconcile with continuous robust levels of R&D investment, coupled with declining prices, in technology markets that have operated under intensive patent issuance and enforcement for several decades. Using network visualization software, I show that information and communication technology markets rely on patent pools and other cross-licensing structures to mitigate or avoid patent thickets and associated inefficiencies. Based on the composition, structure, terms and pricing of selected leading patent pools in the ICT market, …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


The Transmit Clause Test: A Pragmatic Approach To A Contemporary Understanding Of The Ambiguity In The Copyright Act’S Transmit Clause, Samantha Tilipman Apr 2014

The Transmit Clause Test: A Pragmatic Approach To A Contemporary Understanding Of The Ambiguity In The Copyright Act’S Transmit Clause, Samantha Tilipman

Samantha Tilipman

The 1976 Copyright Act was a response to development of new technology and an attempt to clarify copyright law to promote further investment in the burgeoning sphere of cable systems.[1] In drafting the provisions of the new Act, Congress created the “Transmit Clause,” a key passage nestled into the definition of “to perform or display a work ‘publicly.’”[2]The ambiguity of the Transmit Clause has led the circuits to interpret it differently leading to conflicting caselaw on opposite ends of the nation. The purpose of this note is to provide the Supreme Court of the United States and …


Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler Apr 2014

Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler

Jayme M Reisler

Prior to the mid 20th century, a declaration of death was a relatively definite determination because the functioning of each vital organ was inextricably linked to the other. With the advent of the positive-pressure mechanical ventilator, however, came the loss of integration among these organ systems. The ability to maintain metabolic functioning of a patient as well as the ability to successfully transplant viable organs have given rise to a host of legal issues revolving around the determination of death. The main issue that arises is two fold. On one hand, such medical technology can prolong an individual’s life even …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson Apr 2014

California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson

Jennifer Jackson

In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …


Canceling The Order: How High Frequency Traders Are Disrupting The Derivatives Market, And What The Regulators Can Do To Stop Them, Andrew C. Burr Apr 2014

Canceling The Order: How High Frequency Traders Are Disrupting The Derivatives Market, And What The Regulators Can Do To Stop Them, Andrew C. Burr

Andrew C Burr

High Frequency Trading (“HFT”) is now a part of the modern financial lexicon, and inspires feelings of awe, fear, and ignorance. While millions of investors around the world are still trying to grapple with what exactly HFT is and does, the U.S. regulators who are tasked with investigating and charging manipulators are finding themselves in a quandary of how to prosecute the offenders. Further, while the media has focused its attention on the U.S. Securites Exchange Commission’s (“SEC”) new policies on the subject, few have noticed the progress made by the U.S. Commodity Futures Trading Commission (“CFTC”), and how the …


To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …


The Infringement Continuum, Bernard H. Chao Apr 2014

The Infringement Continuum, Bernard H. Chao

Bernard H Chao

For many years, patent law has struggled with the issue of permissible claim scope. A patent’s specification and its claims often suffer from a surprising disconnect. The specification generally describes an invention in terms of one or more specific implementations; suggesting a relatively narrow invention. But claims are drafted far more broadly. They frequently encompass unforeseen variations and even cover after arising technology.

Although there are numerous existing doctrines that try to prevent claims from straying too far from their specification, these doctrines offer binary outcomes ill-suited for patent law. Under these doctrines, as a claim encompasses subject matter further …


Book Review: Fresh Water In International Law. By Laurence Boisson De Chazournes, ‎Oxford, Oxford University Press (Dec. 2013). ‎, Itzchak Kornfeld Mar 2014

Book Review: Fresh Water In International Law. By Laurence Boisson De Chazournes, ‎Oxford, Oxford University Press (Dec. 2013). ‎, Itzchak Kornfeld

Itzchak E. Kornfeld

This book review of an extremely timely, far-reaching and comprehensive book by Professor Laurence Boisson de Chazournes, titled Fresh Water in International Law, by an expert in the field. Today, in an era of climate change, wide spread droughts across the globe, the fate of fresh water, which is a fixed resource and is the source of life, is an ominous problem in and for international law. Boisson de Chazournes addresses issues related to treaty design and interpretation, case law, UN initiatives, human rights issues and the development of the human right to water. The author also stresses that today …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Consciousness And Futility: A Proposal For A Legal Redefinition Of Death, Christopher Smith Mar 2014

Consciousness And Futility: A Proposal For A Legal Redefinition Of Death, Christopher Smith

Christopher R Smith

Recent controversies in Texas (with the Marlise Muñoz case) and in California (with the Jahi McMath case) have highlighted a lamentable flaw in the current legal conception of human death, and the difficulty of defining when death finally occurs. The unworkable notion of “brain-death” remains the law in every state in the union, yet the philosophical and scientific foundations of this notion remain open to attack. This article posits that death is a fundamentally social construct, and that it is society at large (through its laws, public opinions, religious attitudes, etc.) that actually defines death. This essay then argues that …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania Mar 2014

Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania

Tejas N. Narechania

For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.

Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …


Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner Mar 2014

Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement—based on their forecast of the outcome at trial and associated costs. Lawyers bargaining in the shadow of trial have traditionally relied on their knowledge of precedent, intuition, and previous interactions with the presiding judge and opposing counsel to forecast trial outcomes and litigation costs. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in aggregated litigation data. In this Article, we describe the tools …


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind Feb 2014

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Foreseeability Decoded, Meiring De Villiers Feb 2014

Foreseeability Decoded, Meiring De Villiers

Meiring de Villiers

The Article reviews the conceptual and doctrinal roles of the foreseeability doctrine in negligence law, and analyzes its application in cases where a new technology or unexplored scientific principle contributed to a plaintiff’s harm. It adopts the common law definition of foreseeability as a systematic relationship between a defendant’s wrongdoing and the plaintiff’s harm, and demonstrates translation of the concept into the language of science so that the common law meaning of the foreseeability doctrine is preserved. An analysis of the foreseeability of HIV/AIDS as a blood-borne risk illustrates application of the concept to contemporary issues in medical science.


Social Innovation, Peter Lee Jan 2014

Social Innovation, Peter Lee

Peter Lee

This Article provides the first legal examination of the immensely valuable but underappreciated phenomenon of social innovation. Innovations such as cognitive behavioral therapy, microfinance, and strategies to reduce hospital-based infections greatly enhance social welfare yet operate completely outside of the patent system, the primary legal mechanism for promoting innovation. This Article draws on empirical evidence to elucidate this significant kind of innovation and explore its divergence from the classic model of technological innovation championed by the patent system. In so doing, it illustrates how patent law exhibits a rather crabbed, particularistic conception of innovation. Among other characteristics, innovation in the …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Jan 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.