Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2014

Discipline
Keyword
Publication
File Type

Articles 31 - 48 of 48

Full-Text Articles in Science and Technology Law

Canceling The Order: How High Frequency Traders Are Disrupting The Derivatives Market, And What The Regulators Can Do To Stop Them, Andrew C. Burr Apr 2014

Canceling The Order: How High Frequency Traders Are Disrupting The Derivatives Market, And What The Regulators Can Do To Stop Them, Andrew C. Burr

Andrew C Burr

High Frequency Trading (“HFT”) is now a part of the modern financial lexicon, and inspires feelings of awe, fear, and ignorance. While millions of investors around the world are still trying to grapple with what exactly HFT is and does, the U.S. regulators who are tasked with investigating and charging manipulators are finding themselves in a quandary of how to prosecute the offenders. Further, while the media has focused its attention on the U.S. Securites Exchange Commission’s (“SEC”) new policies on the subject, few have noticed the progress made by the U.S. Commodity Futures Trading Commission (“CFTC”), and how the …


To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …


Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo Mar 2014

Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo

Daniel Lyons

The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?" The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …


Panelist, Net Neutrality And The Future Of Internet Access, Daniel Lyons Mar 2014

Panelist, Net Neutrality And The Future Of Internet Access, Daniel Lyons

Daniel Lyons

No abstract provided.


Panelist, A New Fcc And A New Communications Act: Aligning Communications Policy With Marketplace Realitie, Daniel Lyons Mar 2014

Panelist, A New Fcc And A New Communications Act: Aligning Communications Policy With Marketplace Realitie, Daniel Lyons

Daniel Lyons

No abstract provided.


The Social Media Frontier: Exploring A New Mandate For Competence In The Practice Of Law, Jan Jacobowitz, Danielle Singer Feb 2014

The Social Media Frontier: Exploring A New Mandate For Competence In The Practice Of Law, Jan Jacobowitz, Danielle Singer

Jan L Jacobowitz

Attorney Mark O’Mara’s use of social media as part of the defense strategy in the representation of George Zimmerman, who was prosecuted for the death of Trayvon Martin, highlighted the use of social media in the practice of law, and because of the tremendous media coverage of the trial, facilitated a robust conversation on whether the legal profession’s use of social media is the “new normal.” In fact, lawyers’ increasing use of social media is evidenced by a growing body of case law, ethics opinions, and journal articles discussing the propriety of using social media in areas such as investigation, …


Assisted Reproductive Technology Poses New Estate-Planning Questions, Lindsey Paige Markus, Assistance From Evan D. Blewett Feb 2014

Assisted Reproductive Technology Poses New Estate-Planning Questions, Lindsey Paige Markus, Assistance From Evan D. Blewett

Evan Blewett

Due to the deferral of pregnancy, environmental issues and a host of medical factors, infertility rates are on the rise. The Centers for Disease Control estimated that as many as 12 percent of U.S. women and their partners experience infertility, and experts posit that this statistic continues to rise. The increased prevalence and effectiveness of Assisted Reproductive Technology, or ART, creates myriad legal issues for individuals and couples to consider.


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Feb 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Renée M. Hutchins

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …


Social Innovation, Peter Lee Jan 2014

Social Innovation, Peter Lee

Peter Lee

This Article provides the first legal examination of the immensely valuable but underappreciated phenomenon of social innovation. Innovations such as cognitive behavioral therapy, microfinance, and strategies to reduce hospital-based infections greatly enhance social welfare yet operate completely outside of the patent system, the primary legal mechanism for promoting innovation. This Article draws on empirical evidence to elucidate this significant kind of innovation and explore its divergence from the classic model of technological innovation championed by the patent system. In so doing, it illustrates how patent law exhibits a rather crabbed, particularistic conception of innovation. Among other characteristics, innovation in the …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Jan 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.


Certainty At Last? : A “New” Framework For Electronic Contracting In Singapore, Eliza Karolina Mik Jan 2014

Certainty At Last? : A “New” Framework For Electronic Contracting In Singapore, Eliza Karolina Mik

Eliza Mik

The more one looks at the legal issues, the less awesome most of them appear, and the less radical the measures needed to ensure that the law does not unnecessarily impede e-commerce.


A Scientific Approach To Scientific Evidence: A Four-Stage Rule For Admissibility And Scope, Robert Sanger Dec 2013

A Scientific Approach To Scientific Evidence: A Four-Stage Rule For Admissibility And Scope, Robert Sanger

Robert M. Sanger

Scientific or expert testimony is often critical in criminal cases. The Supreme Court has established that the trial judge is the "gatekeeper" who is to determine what evidence is allowed before the jury. The current rules of evidence are not organized in a way that makes this task readily intelligible. This chapter proposes a more direct our-step process to accomplish the gatekeeping function.


Patent Trolling--Why Bio & Pharmaceuticals Are At Risk, Robin C. Feldman, W. Nicholson Price Ii Dec 2013

Patent Trolling--Why Bio & Pharmaceuticals Are At Risk, Robin C. Feldman, W. Nicholson Price Ii

Robin C Feldman

Patent trolls — also known variously as non-practicing entities, patent assertion entities, and patent monetizers — are a top priority on legislative and regulatory reform agendas. In the modern debates, however, the biopharmaceutical industry goes conspicuously unmentioned. Although biopharmaceuticals are paradigmatically centered on patents, conventional wisdom holds that biopharmaceuticals are largely unthreatened by trolls. This article shows that the conventional wisdom is wrong, both theoretically and descriptively. In particular, the article presents a ground-breaking study of the life science holdings of 5 major universities to determine if these might be attractive to monetizers. 

This was deliberately a light, rather than …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Cyber Security Active Defense: Playing With Fire Or Sound Risk Management?, Sean L. Harrington Dec 2013

Cyber Security Active Defense: Playing With Fire Or Sound Risk Management?, Sean L. Harrington

Sean L Harrington

Explores contemporary "active defense" techniques in use by private organizations and the legal, regulatory, practical, and business risks associated with each.


Orwellian Surveillance Of Vehicular Travels, Sam Hanna Dec 2013

Orwellian Surveillance Of Vehicular Travels, Sam Hanna

Sam Hanna

What would someone learn about you if all your automobile travels were ubiquitously tracked beginning today? Creating an indefinite database of a person’s previous automobile travels to formulate deductions on intimate details of people's lives is precisely what law enforcement agencies are currently able to accomplish with automatic license plate recognition (“ALPR”). With the ubiquity of ALPR cameras, continuous government surveillance of automobile travels is no longer a figment of the imagination. Consequently, the judicial and legislative branches of government must embark on balancing the private and public interests implicated by this technology. Failure to set suitable boundaries around the …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson Dec 2013

Our Records Panopticon And The American Bar Association Standards For Criminal Justice, Stephen E. Henderson

Stephen E Henderson

"Secrets are lies. Sharing is caring. Privacy is theft." So concludes the main character in Dave Egger’s novel The Circle, in which a single company that unites Google, Facebook, and Twitter – and on steroids – has the ambition not only to know, but also to share, all of the world's information. It is telling that a current dystopian novel features not the government in the first instance, but instead a private third party that, through no act of overt coercion, knows so much about us. This is indeed the greatest risk to privacy in our day, both the unprecedented …