Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Law
Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman
Trust: A Model For Disclosure In Patent Law, Ari Ezra Waldman
Indiana Law Journal
How to draw the line between public and private is a foundational, first-principles question of privacy law, but the answer has implications for intellectual property, as well. This project is one in a series of papers about first-person disclosures of information in the privacy and intellectual property law contexts, and it defines the boundary between public and nonpublic information through the lens of social science —namely, principles of trust.
Patent law’s public use bar confronts the question of whether legal protection should extend to information previously disclosed to a small group of people. I present evidence that shows that current …
Did The National Security Agency Destroy The Prospects For Confidentiality And Privilege When Lawyers Store Clients' Files In The Cloud--And What, If Anything, Can Lawyers And Law Firms Realistically Do In Response?, Sarah Jane Hughes
Articles by Maurer Faculty
No abstract provided.
When Clients Do Bad Things: The Lawyer's Response To Corporate Wrongdoing, Craig M. Bradley
When Clients Do Bad Things: The Lawyer's Response To Corporate Wrongdoing, Craig M. Bradley
Articles by Maurer Faculty
The high profile meltdowns of Enron, WorldCom, Tyco, Adelphia, Global Crossing and other well-known companies have focused attention on the responsibilities of corporate gatekeepers, including attorneys, to deter or expose fraudulent conduct by their clients and associated persons. Attorneys have been the subject of investigation and criticism by Congress' and federal regulators for failing to adequately respond to their clients' fraudulent (and, possibly, criminal) conduct. The lawyer who learns that his or her client or persons acting on its behalf are engaged in a course of fraudulent or criminal conduct which threatens economic losses to non-client third parties faces both …
Checks On Participant Conduct In Compulsory Adr: Reconciling The Tension In The Need For Good-Faith Participation, Autonomy, And Confidentiality, Maureen A. Weston
Checks On Participant Conduct In Compulsory Adr: Reconciling The Tension In The Need For Good-Faith Participation, Autonomy, And Confidentiality, Maureen A. Weston
Indiana Law Journal
No abstract provided.
Privacy Vs. Convenience: The Benefits And Drawbacks Of Tax System Modernization, E. Maria Grace
Privacy Vs. Convenience: The Benefits And Drawbacks Of Tax System Modernization, E. Maria Grace
Federal Communications Law Journal
The Internal Revenue Service has launched the Tax System Modernization (TSM) program, a $23 billion plan to modernize its computer and information systems. TSM will be the largest computer upgrade ever undertaken by the federal government. Like any other computer network, TSM will inevitably be threatened by computer viruses, professional eavesdroppers, power outages, natural disasters, and human error. Given the sensitive nature of tax returns, the IRS has the difficult task of modernizing its data collection procedures and telecommunications facilities without risking the privacy of taxpayers and offending the security measures required by the Privacy Act of 1974, Computer Security …