Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Science and Technology Law

The Defend Trade Secrets Act Of 2015, S. 1890, H.R. 3326, 114th Congress (2015), Joseph K.C. Doukmetzian Dec 2015

The Defend Trade Secrets Act Of 2015, S. 1890, H.R. 3326, 114th Congress (2015), Joseph K.C. Doukmetzian

Catholic University Journal of Law and Technology

No abstract provided.


The Cost Of Confusion: The Paradox Of Trademarked Pharmaceuticals, Hannah Brennan Oct 2015

The Cost Of Confusion: The Paradox Of Trademarked Pharmaceuticals, Hannah Brennan

Michigan Telecommunications & Technology Law Review

The United States spends nearly $1,000 per person annually on drugs—forty percent more than the next highest spender, Canada, and more than twice the amount France and Germany spend. Although myriad factors contribute to high drug spending in the United States, intellectual property law plays a crucial and well-documented role in inhibiting access to cheaper, generic medications. Yet, for the most part, the discussion of the relationship between intellectual property law and drug spending has centered on patent protection. Recently, however, a few researchers have turned their attention to a different avenue of exclusivity—trademark law. New studies suggest that pharmaceutical …


Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon May 2015

Sacrificing Privacy For Convenience: The Need For Stricter Ftc Regulations In An Age Of Smartphone Surveillance, Ashton Mckinnon

Journal of the National Association of Administrative Law Judiciary

This comment aims to focus on the most frequently used connector that consumers treasure not only for convenience but also as a lifelong necessity - the smartphone. The FTC needs to enforce federally mandated guidelines that will allow the consumer to use technology without the technology using the consumer. Part II of this comment focuses on the type of information that can be collected by various companies, service providers, and agencies from an individual's smartphone, and the intentions of these collectors behind use of this information. Part III evaluates how applications (apps) contribute to this scheme, and, specifically, apps' recordkeeping …


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Apr 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Julian Dibbell

When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …


Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta Mar 2015

Hello Barbie: First They Will Monitor You, Then They Will Discriminate Against You. Perfectly, David S. Olson, Irina D. Manta

David S. Olson

This Article argues that the evolution of software — and the looming age of the “Internet of Things” — will allow manufacturers to make use of consumer monitoring technologies and restrictive software licenses to more perfectly price discriminate. First, the increasing communication between software and its producers gives more opportunities to monitor consumer behavior and characteristics. Second, attaching restrictive copyright licenses to software, and to goods containing software, enables producers to restrict use and resale of their products. By combining monitoring and restrictive licensing, producers will have increasingly better ability and opportunities to price discriminate among their consumers.

This Article …


Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters Jan 2015

Selected State Laws Governing The Safeguarding And Disposing Of Personal Information, 31 J. Marshall J. Info. Tech. & Privacy L. 487 (2015), Bruce Radke, Michael Waters

UIC John Marshall Journal of Information Technology & Privacy Law

Numerous states have adopted laws mandating the protection and disposal of personal information. Under those laws, businesses are required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information in order to protect the personal information from unauthorized access, destruction, use, modification, or disclosure. Although the definition of “personal information” varies from state to state, “personal information” is generally defined as an individual’s first name or initial and last name in combination with any one or more of the following data elements, when either the name or the data elements are not encrypted or …


Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015) Jan 2015

Legal Problems In Data Management: Ethics Of Big Data Analytics And The Importance Of Disclosure, 31 J. Marshall J. Info. Tech. & Privacy L. 641 (2015)

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin Jan 2015

Industry Self-Regulation Of Consumer Data Privacy And Security, 32 J. Marshall J. Info. Tech. & Privacy L. 15 (2015), Siona Listokin

UIC John Marshall Journal of Information Technology & Privacy Law

Industry self-regulation of consumer data privacy and security has been proposed as a flexible alternative and compliment to traditional government regulation. This study analyzes whether different types of existing industry-led standards improve online privacy and security. This paper examines which types of firms join voluntary standards and whether there is a difference in outcomes between trade association memberships (like the Digital Advertising Alliance) and certification programs (like TRUSTe). Results suggest that more trafficked websites are more likely to adopt standards, and that trade association member-ship does not have an effect on privacy and security performance. This article highlights the need …


‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer Jan 2015

‘The Greatest Wealth Is Health’: Patient Protected Health Information In The Hands Of Hackers, 31 J. Marshall J. Info. Tech. & Privacy L. 657 (2015), Samantha Singer

UIC John Marshall Journal of Information Technology & Privacy Law

This comment will analyze the specific requirements and stages that EPs/EHs must comply with in order to receive its Medicare and Medicaid incentives, how EHR technologies are being implemented, how EHR technologies are affecting patients' privacy with regard to hacking a patient‟s PHI, and what EHR technology vendors and EPs/EHs should be doing to improve patient privacy and security to prevent hacking and other breaches.

Part I of this comment will address hacking of PHI. Part II will analyze the security measures that EHR vendors must currently incorporate into EHR technology and how the lack of required security measures impacts …


The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser Jan 2015

The Truth Behind Data Collection And Analysis, 32 J. Marshall J. Info. Tech. & Privacy L. 33 (2015), Morgan Hochheiser

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Who Regulates The Robots, Margot Kaminski Jan 2015

Who Regulates The Robots, Margot Kaminski

Publications

No abstract provided.


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …