Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Science and Technology Law

Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye Jan 2001

Two Fallacies About Dna Data Banks For Law Enforcement, David H. Kaye

Journal Articles

This commentary on the article Legal and Policy Issues in Expanding the Scope of Law Enforcement DNA Data Banks, 67 Brook. L. Rev. 127 (2001), by Mark Rothstein and Sandra Carnahan, argues that the case for confining law enforcement DNA databases to noncoding loci and to samples from individuals convicted of violent crimes is quite weak.

It describes alternative approaches, including the possibility of a population-wide database; the privacy implications of the loci now used in forensic identification; the law governing DNA dragnets; and the limits on DNA databases imposed by recent cases on searches and seizures. It notes the …


The Constitutionality Of Dna Sampling On Arrest, David H. Kaye Jan 2001

The Constitutionality Of Dna Sampling On Arrest, David H. Kaye

Journal Articles

Every state now collects DNA from people convicted of certain offenses. Law enforcement authorities promote offender DNA databanking on the theory that it will identify offenders who commit additional crimes while or probation or parole, or after they have finished serving their sentences. Even relatively small databases have yielded such dividends. As these database searches uncover the perpetrators of rapes, murders, and other offenses, the pressure builds to expand the coverage of the databases.

Recent proposals call for extending not merely the scope of crimes for which DNA databanking would be used, but also the point at which the samples …


Criminal Law In Cyberspace, Neal K. Katyal Jan 2001

Criminal Law In Cyberspace, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

Two of the most talked-about crimes of the year, the ILoveYou computer worm and the denial of service attacks on Yahoo, eBay, and ETrade, suggest that a new form of crime is emerging: cybercrime. Thousands of these crimes occur each year, and the results are often catastrophic; in terms of economic damage, the ILoveYou worm may have been the most devastating crime in history, causing more than $11 billion in losses.

This paper asks how cybercrime is best deterred. It identifies five constraints on crime - legal sanctions, monetary perpetration cost, social norms, architecture, and physical risks - and explains …


Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald Dec 2000

Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald

Susan Freiwald

Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.

Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …