Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

7,429 Full-Text Articles 6,865 Authors 5,358,697 Downloads 159 Institutions

All Articles in Science and Technology Law

Faceted Search

7,429 full-text articles. Page 177 of 240.

Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer 2014 Boston University School of Law

Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer

Faculty Scholarship

The Federal Circuit’s expansion of patentable subject matter in the 1990s led to a threefold increase in software patents, many of which contain abstract ideas merely tethered to a general-purpose computer. There is little evidence, however, to suggest this expansion has produced an increase in software innovation. The software industry was highly innovative in the decade immediately prior to this expansion, when the viability of software patentability was unclear and software patents were few. When surveyed, most software developers oppose software patenting, and, in practice, software innovators tend to rely on other tools to capture market share such as first-mover …


Here, There And Everywhere: Mobility Data In The Eu (Help Needed: Where Is Privacy?), Raffaele Zallone 2014 Santa Clara Law

Here, There And Everywhere: Mobility Data In The Eu (Help Needed: Where Is Privacy?), Raffaele Zallone

Santa Clara High Technology Law Journal

European law on data privacy has not clearly developed the concept of mobility data. The evolution of technology has forced the EU to cope with this reality, but so far its legislation lacks a specific focus on this aspect of technology.

A body composed of representatives from the various data protection authorities, the so-called article 29 Working Party (the name stems from section 29 of the European Data Privacy Directive, that calls for the formation and the task of this body) has coped with various aspects of mobile technology, but the documents and analysis it has produced are general and …


Who Is The Witness To An Internet Crime: The Confrontation Clause, Digital Forensics, And Child Pornography, Merritt Baer 2014 Santa Clara Law

Who Is The Witness To An Internet Crime: The Confrontation Clause, Digital Forensics, And Child Pornography, Merritt Baer

Santa Clara High Technology Law Journal

The Sixth Amendment’s Confrontation Clause guarantees the accused the right to confront witnesses against him. In this article I examine child pornography prosecution, in which we must apply this constitutional standard to digital forensic evidence. I ask, “Who is the witness to an Internet crime?”

The Confrontation Clause proscribes the admission of hearsay. In Ohio v. Roberts, the Supreme Court stated that the primary concern was reliability and that hearsay might be admissible if the reliability concerns were assuaged. Twenty-four years later, in Crawford v. Washington, the Supreme Court repositioned the Confrontation Clause of the Sixth Amendment as a procedural …


Facing Real-Time Identification In Mobile Apps & Wearable Computers, Yana Welinder 2014 Santa Clara Law

Facing Real-Time Identification In Mobile Apps & Wearable Computers, Yana Welinder

Santa Clara High Technology Law Journal

The use of face recognition technology in mobile apps and wearable computers challenges individuals’ ability to remain anonymous in public places. These apps can also link individuals’ offline activities to their online profiles, generating a digital paper trail of their every move. The ability to go off the radar allows for quiet reflection and daring experimentation—processes that are essential to a productive and democratic society. Given what we stand to lose, we ought to be cautious with groundbreaking technological progress. It does not mean that we have to move any slower, but we should think about potential consequences of the …


Reining In Remedies In Patent Litigation: Three (Increasingly Immodest) Proposals, Thomas F. Cotter 2014 University of Minnesota Law School

Reining In Remedies In Patent Litigation: Three (Increasingly Immodest) Proposals, Thomas F. Cotter

Santa Clara High Technology Law Journal

This essay, which builds on my recent work on the law and economics of comparative patent remedies, presents three proposals relating to the enforcement of domestic patent rights. The first, which may be close to being adopted in the United States, is for the courts and the International Trade Commission (ITC) to adopt a general presumption, grounded in patent law and policy, that patent owners who have committed to license their standard essential patents (SEPs) on fair, reasonable, and nondiscriminatory terms are not entitled to permanent injunctions or exclusion orders, but rather only to a damages in the form of …


Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind 2014 Northwestern University

Criminal Innovation And The Warrant Requirement: Reconsidering The Rights-Police Efficiency Trade-Off, Tonja Jacobi, Jonah Kind

Tonja Jacobi

It is routinely assumed that there is a trade-off between police efficiency and the warrant requirement. But existing analysis ignores the interaction between police investigative practices and criminal innovation. Narrowing the definition of a search or otherwise limiting the requirement for a warrant gives criminals greater incentive to innovate to avoid detection. With limited police resources to develop countermeasures, police will often be just as effective at capturing criminals when facing higher Fourth Amendment hurdles. We provide a game theoretic model that shows that when police investigation and criminal innovation are considered in a dynamic context, the police efficiency rationale …


Foreseeability Decoded, Meiring de Villiers 2014 University of New South Wales

Foreseeability Decoded, Meiring De Villiers

Meiring de Villiers

The Article reviews the conceptual and doctrinal roles of the foreseeability doctrine in negligence law, and analyzes its application in cases where a new technology or unexplored scientific principle contributed to a plaintiff’s harm. It adopts the common law definition of foreseeability as a systematic relationship between a defendant’s wrongdoing and the plaintiff’s harm, and demonstrates translation of the concept into the language of science so that the common law meaning of the foreseeability doctrine is preserved. An analysis of the foreseeability of HIV/AIDS as a blood-borne risk illustrates application of the concept to contemporary issues in medical science.


Contracting In The Dark: Casting Light On The Shadows Of Second Level Agreements, Abigail R. Simon 2014 William & Mary Law School

Contracting In The Dark: Casting Light On The Shadows Of Second Level Agreements, Abigail R. Simon

William & Mary Business Law Review

In the early days of the Internet, copyright owners concentrated on eliminating infringement threats posed by the new technology. Today, many copyright owners are partnering with major user-generated content platforms in order to participate in and receive compensation for some third-party infringement occurring on the Internet. YouTube pioneered such partnership arrangements in 2006 with a new kind of copyright license now referred to as a “second level agreement.” In 2008, YouTube unveiled Content ID, which streamlined the process for entering into second level agreements with the site. This Note analyzes Content ID and the second level agreements underlying it to …


The Social Media Frontier: Exploring A New Mandate For Competence In The Practice Of Law, Jan Jacobowitz, Danielle Singer 2014 University Of Miami School Of Law

The Social Media Frontier: Exploring A New Mandate For Competence In The Practice Of Law, Jan Jacobowitz, Danielle Singer

Jan L Jacobowitz

Attorney Mark O’Mara’s use of social media as part of the defense strategy in the representation of George Zimmerman, who was prosecuted for the death of Trayvon Martin, highlighted the use of social media in the practice of law, and because of the tremendous media coverage of the trial, facilitated a robust conversation on whether the legal profession’s use of social media is the “new normal.” In fact, lawyers’ increasing use of social media is evidenced by a growing body of case law, ethics opinions, and journal articles discussing the propriety of using social media in areas such as investigation, …


Assisted Reproductive Technology Poses New Estate-Planning Questions, Lindsey Paige Markus, assistance from Evan D. Blewett 2014 DePaul University

Assisted Reproductive Technology Poses New Estate-Planning Questions, Lindsey Paige Markus, Assistance From Evan D. Blewett

Evan Blewett

Due to the deferral of pregnancy, environmental issues and a host of medical factors, infertility rates are on the rise. The Centers for Disease Control estimated that as many as 12 percent of U.S. women and their partners experience infertility, and experts posit that this statistic continues to rise. The increased prevalence and effectiveness of Assisted Reproductive Technology, or ART, creates myriad legal issues for individuals and couples to consider.


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck 2014 University of Maryland Francis King Carey School of Law

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Renée M. Hutchins

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” has stepped …


Metadata: Piecing Together A Privacy Solution, Chris Conley 2014 Boston University School of Law

Metadata: Piecing Together A Privacy Solution, Chris Conley

Faculty Scholarship

Imagine the government is constantly monitoring you — keeping track of every person you call or email, every place you go, everything you buy, and more — all without getting a warrant. And when you challenge them, they claim you have no right to expect this kind of information to be private. Besides, they’re not actually listening to what you say or reading what you write, so what’s the big deal anyhow?

Unfortunately, this scenario is more real than imaginary. Government agencies ranging from the NSA to local police departments have taken advantage of weak or uncertain legal protections for …


Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo 2014 The Free State Foundation

Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo

All Faculty Scholarship

The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?"


The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …


Social Innovation, Peter Lee 2014 University of California, Davis, School of Law

Social Innovation, Peter Lee

Peter Lee

This Article provides the first legal examination of the immensely valuable but underappreciated phenomenon of social innovation. Innovations such as cognitive behavioral therapy, microfinance, and strategies to reduce hospital-based infections greatly enhance social welfare yet operate completely outside of the patent system, the primary legal mechanism for promoting innovation. This Article draws on empirical evidence to elucidate this significant kind of innovation and explore its divergence from the classic model of technological innovation championed by the patent system. In so doing, it illustrates how patent law exhibits a rather crabbed, particularistic conception of innovation. Among other characteristics, innovation in the …


Abusing The Computer Fraud And Abuse Act: Why Broad Interpretations Of The Cfaa Fail, Samantha Jensen 2014 Hamline University School of Law

Abusing The Computer Fraud And Abuse Act: Why Broad Interpretations Of The Cfaa Fail, Samantha Jensen

Hamline Law Review

Abstract


Sharing Public Safety Helicopters, Henry H. Perritt Jr. 2014 Chicago-Kent College of Law

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.


Certainty At Last? : A “New” Framework For Electronic Contracting In Singapore, Eliza Karolina Mik 2014 Singapore Management University

Certainty At Last? : A “New” Framework For Electronic Contracting In Singapore, Eliza Karolina Mik

Eliza Mik

The more one looks at the legal issues, the less awesome most of them appear, and the less radical the measures needed to ensure that the law does not unnecessarily impede e-commerce.


The End Of The Imitation Age?: The Effect Of Apple Inc. V. Samsung, Melissa Barcena 2014 Pepperdine University

The End Of The Imitation Age?: The Effect Of Apple Inc. V. Samsung, Melissa Barcena

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


Lessons From At&T'S Flop: How To Grow In The Technology Industry While Avoiding Section 7 Antitrust Obstacles, John Soma 2014 Pepperdine University

Lessons From At&T'S Flop: How To Grow In The Technology Industry While Avoiding Section 7 Antitrust Obstacles, John Soma

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson 2014 Texas State University

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


Digital Commons powered by bepress