Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 63

Full-Text Articles in Law

National Pork Is A Bibb Case, Not A Pike Case, Michael S. Knoll, Ruth Mason Nov 2022

National Pork Is A Bibb Case, Not A Pike Case, Michael S. Knoll, Ruth Mason

All Faculty Scholarship

In October 2022, the U.S. Supreme Court heard oral argument in National Pork Producers Council v. Ross, a Ninth Circuit case out of California, dismissing a challenge to Proposition 12, which, inter alia, bans the sale of wholesome pork (without regard to where it was produced) from the offspring of breeding sows confined in a manner California voters consider “cruel.” National Pork thus puts the Court in the position of choosing between the often-criticized undue-burden strand of the dormant Commerce Clause and California’s request that the Court approve its ban on out-of-state pork not because of the products’ qualities, but …


Brief Of Professors Michael Knoll And Ruth Mason As Amici Curiae Supporting Petitioners In National Pork Producers Council V. Ross, Michael S. Knoll, Ruth Mason Jun 2022

Brief Of Professors Michael Knoll And Ruth Mason As Amici Curiae Supporting Petitioners In National Pork Producers Council V. Ross, Michael S. Knoll, Ruth Mason

All Faculty Scholarship

The district court erred when it concluded that because Proposition 12 applies only to in-state sales, it could not be extraterritorial. On the contrary, because California regulates pork production based on domestic, inbound, and outbound sales, its regulation is internally inconsistent and overbroad. As an obligation of interstate comity, this Court has understood extraterritoriality to require the basis of regulation to be internally consistent. A regulation is internally consistent when, if every state regulated using the same nexus as the challenged state, cross-border commercial activity would not be regulated by more than one state. Proposition 12 cannot meet this basic …


Secured Transactions Law Reform In Japan: Japan Business Credit Project Assessment Of Interviews And Tentative Policy Proposals, Megumi Hara, Kumiko Koens, Charles W. Mooney Jr. Jan 2022

Secured Transactions Law Reform In Japan: Japan Business Credit Project Assessment Of Interviews And Tentative Policy Proposals, Megumi Hara, Kumiko Koens, Charles W. Mooney Jr.

All Faculty Scholarship

This article summarizes key findings from the Japan Business Credit Project (JBCP), which involved more than 30 semi-structured interviews conducted in Japan from 2016 through 2018. It was inspired by important and previously unexplored questions concerning secured financing of movables (business equipment and inventory) and claims (receivables)—“asset-based lending” or “ABL.” Why is the use of ABL in Japan so limited? What are the principal obstacles and disincentives to the use of ABL in Japan? The interviews were primarily with staff of banks, but also included those of government officials and regulators, academics, and law practitioners. The article proposes reforms of …


The Social Cost Of Contract, David A. Hoffman, Cathy Hwang Jan 2021

The Social Cost Of Contract, David A. Hoffman, Cathy Hwang

All Faculty Scholarship

When private parties perform contracts, the public bears some of the costs. But what happens when society confronts unexpected contractual risks? During the COVID-19 pandemic, completing particular contracts—such as following through with weddings, conferences, and other large gatherings—will greatly increase the risk of rapidly spreading disease. A close reading of past cases illustrates that when social hazards sharply increase after formation, courts have sometimes rejected, reformed, and reinterpreted contracts so that parties who breach to reduce external harms are not left holding the bag.

This Essay builds on that observation in making two contributions. Theoretically, it characterizes contracts as bargains …


Did The America Invents Act Change University Technology Transfer?, Cynthia L. Dahl Jan 2021

Did The America Invents Act Change University Technology Transfer?, Cynthia L. Dahl

All Faculty Scholarship

University technology transfer offices (TTOs) are the gatekeepers to groundbreaking innovations sparked in research laboratories around the U.S. With a business model reliant on patenting and licensing out for commercialization, TTOs were positioned for upheaval when the America Invents Act (AIA) transformed U.S. patent law in 2011. Now almost ten years later, this article examines the AIA’s actual effects on this patent-centric industry. It focuses on the five key areas of most interest to TTOs: i) first to file priority; ii) broadening of the universe of prior art; iii) carve-out to the prior commercial use defense; iv) micro-entity fees; and …


When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl Jun 2020

When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl

All Faculty Scholarship

Technology lawyers, intellectual property (IP) lawyers, or even any corporate lawyer with technology clients must understand standard essential patents (SEPs) and how their licensing works to effectively counsel their clients. Whether the client’s technology is adopted into a voluntary standard or not may be the most important factor in determining whether the company succeeds or is left behind in the market. Yet even though understanding SEPs is critical to a technology or IP practice, voluntary standards and specifically SEPs are generally not taught in law school.

This article aims to address this deficiency and create more practice-ready law school graduates. …


Unwritten Rules And The New Contract Paradigm, David A. Skeel Jr. May 2020

Unwritten Rules And The New Contract Paradigm, David A. Skeel Jr.

All Faculty Scholarship

In a recent essay—part of a larger book project-- Douglas Baird contends that the standard accounts of the history of corporate reorganization miss an essential feature: the extent to which both current and prior practice have been governed by unwritten rules (such as full disclosure and the opportunity for each party to participate in the negotiations) that “are well-known to insiders, but largely invisible to those on the outside.” According to Professor Baird, the unwritten rules, not bankruptcy’s distribution provisions or other features of the Bankruptcy Code, are the essence of corporate reorganization.

This essay is a short response to …


Commercial Law Intersections, Giuliano Castellano, Andrea Tosato Apr 2020

Commercial Law Intersections, Giuliano Castellano, Andrea Tosato

All Faculty Scholarship

Commercial law is not a single, monolithic entity. It has grown into a dense thicket of subject-specific branches that govern a broad range of transactions and corporate actions. When one of these events falls concurrently within the purview of two or more of these commercial law branches - such as corporate law, intellectual property law, secured transactions law, conduct and prudential regulation - an overlap materializes. We refer to this legal phenomenon as a commercial law intersection (CLI). Some notable examples of transactions that feature CLIs include bank loans secured by shares, supply chain financing arrangements, patent cross-licensing, and blockchain-based …


Lost In Transplantation: Modern Principles Of Secured Transactions Law As Legal Transplants, Charles W. Mooney Jr. Apr 2020

Lost In Transplantation: Modern Principles Of Secured Transactions Law As Legal Transplants, Charles W. Mooney Jr.

All Faculty Scholarship

This manuscript will appear as a chapter in a forthcoming edited volume published by Hart Publishing, Secured Transactions Law in Asia: Principles, Perspectives and Reform (Louise Gullifer & Dora Neo eds., forthcoming 2020). It focuses on a set of principles (Modern Principles) that secured transactions law for personal property should follow. These Modern Principles are based on UCC Article 9 and its many progeny, including the UNCITRAL Model Law on Secured Transactions. The chapter situates the Modern principles in the context of the transplantation of law from one legal system to another. It draws in particular on Alan Watson’s pathbreaking …


Taxing Bitcoin And Blockchains—What The Irs Told Us (And What It Didn’T), David J. Shakow Jan 2020

Taxing Bitcoin And Blockchains—What The Irs Told Us (And What It Didn’T), David J. Shakow

All Faculty Scholarship

The IRS recently issued its second description of how it will treat Bitcoin and other blockchain assets. Some of its analysis leaves open questions that invite further consideration, and important issues remain unresolved. Moreover, because the popular Bitcoin blockchain uses a "proof of work" consensus procedure, issues relating to the alternative "proof of stake" procedure have been neglected.


Reviewing Inter Partes Review Five Years In: The View From University Technology Transfer Offices, Cynthia L. Dahl Jan 2020

Reviewing Inter Partes Review Five Years In: The View From University Technology Transfer Offices, Cynthia L. Dahl

All Faculty Scholarship

With the implementation of the inter partes review (IPR) proceeding under the America Invents Act in 2012, university technology transfer offices (TTOS) were worried that the value of their patents might be irreparably harmed. With IPR proceedings making patent challenges easy, relatively inexpensive, and a threat extending over the lifetime of a patent, TTOs wondered if IPRs might do nothing short of undermining their licensing business model.

However, although IPRs have irreparably changed the patent infringement landscape outside of the university setting, the effect on university patents has not been nearly as severe. This chapter explores why that might be …


Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman Jan 2020

Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman

All Faculty Scholarship

Deals accomplished through software persistently residing on computer networks—sometimes called smart contracts, but better termed transactional scripts—embody a potentially revolutionary contracting innovation. Ours is the first precise account in the legal literature of how such scripts are created, and when they produce errors of legal significance.

Scripts’ most celebrated use case is for transactions operating exclusively on public, permissionless, blockchains: such exchanges eliminate the need for trusted intermediaries and seem to permit parties to commit ex ante to automated performance. But public transactional scripts are costly both to develop and execute, with significant fees imposed for data storage. Worse, bugs …


What’S In Your Wallet (And What Should The Law Do About It?), Natasha Sarin Jan 2020

What’S In Your Wallet (And What Should The Law Do About It?), Natasha Sarin

All Faculty Scholarship

In traditional markets, firms can charge prices that are significantly elevated relative to their costs only if there is a market failure. However, this is not true in a two-sided market (like Amazon, Uber, and Mastercard), where firms often subsidize one side of the market and generate revenue from the other. This means consideration of one side of the market in isolation is problematic. The Court embraced this view in Ohio v. American Express, requiring that anticompetitive harm on one side of a two-sided market be weighed against benefits on the other side.

Legal scholars denounce this decision, which, …


Christianity And Bankruptcy, David A. Skeel Jr. Dec 2019

Christianity And Bankruptcy, David A. Skeel Jr.

All Faculty Scholarship

Although the term “bankruptcy” is nowhere to be found in the Bible, debt and the consequences of default are a major theme both in the Hebrew Bible and in the New Testament. In Israel, as in the ancient Near East generally, a debtor who defaulted on his obligations was often sold into slavery or servitude. Biblical law moderated the harshness of this system by prohibiting Israelites from charging interest on loans to one another, thus diminishing the risk of default, and by requiring the release of slaves after seven years of service. Jesus alluded to the lending laws at least …


Personal Property Security Law: International Ambitions And Local Realities, Giuliano G. Castellano, Andrea Tosato Dec 2019

Personal Property Security Law: International Ambitions And Local Realities, Giuliano G. Castellano, Andrea Tosato

All Faculty Scholarship

Personal property security law is a key element of “access to credit” and “financial inclusion”. The prevailing view is that a legal framework enabling the effective use of personal property as collateral markedly benefits both lenders and borrowers. Lenders can offer financing at a lower cost thanks to reduced credit risk; borrowers can access funding by leveraging the otherwise unavailable value of the assets integral to their operations.

Over the past century, the priorities of personal property security law have evolved fundamentally. As small and medium-sized enterprises (SMEs) and individual entrepreneurs have become the growth engine of both developed and …


Apple V. Pepper: Rationalizing Antitrust’S Indirect Purchaser Rule, Herbert J. Hovenkamp May 2019

Apple V. Pepper: Rationalizing Antitrust’S Indirect Purchaser Rule, Herbert J. Hovenkamp

All Faculty Scholarship

In Apple v. Pepper the Supreme Court held that consumers who allegedly paid too much for apps sold on Apple’s iStore could sue Apple for antitrust damages because they were “direct purchasers.” The decision reflects some bizarre complexities that have resulted from the Supreme Court’s 1977 decision in Illinois Brick, which held that only direct purchasers could sue for overcharge injuries under the federal antitrust laws. The indirect purchaser rule was problematic from the beginning. First, it was plainly inconsistent with the antitrust damages statute, which gives an action to “any person who shall be injured in his business …


Intermediated Securities Holding Systems Revisited: A View Through The Prism Of Transparency, Thomas Keijser, Charles W. Mooney Jr. Mar 2019

Intermediated Securities Holding Systems Revisited: A View Through The Prism Of Transparency, Thomas Keijser, Charles W. Mooney Jr.

All Faculty Scholarship

This chapter explains several benefits of adopting transparent information technology systems for intermediated securities holding infrastructures. Such transparent systems could ameliorate various prevailing problems that confront existing tiered, intermediated holding systems, including those related to corporate actions (dividends, voting), claims against issuers and upper-tier intermediaries, loss sharing and set-off in insolvency proceedings, money laundering and terrorist financing, and privacy, data protection, and confidentiality. Moreover, transparent systems could improve the functions of intermediated holding systems even without changes in laws or regulations. They also could provide a catalyst for law reform and a roadmap for substantive content of reforms. Among potential …


Global Standards For Securities Holding Infrastructures: A Soft Law/Fintech Model For Reform, Charles W. Mooney Jr. Jan 2019

Global Standards For Securities Holding Infrastructures: A Soft Law/Fintech Model For Reform, Charles W. Mooney Jr.

All Faculty Scholarship

Intermediaries such as stockbrokers and banks are ubiquitous in global securities markets, playing essential roles in markets, including trading, settling trades, and post-settlement holding of securities. This essay focuses in particular on the roles of intermediaries in securities holding systems. It proposes an IOSCO-led “soft-law-to-hard-law” approach to the development of Global Standards for reforms to these holding systems. States would be expected to adopt “hard law” reforms through statutory and regulatory adjustments to securities holding systems. The reforms would embrace not only important standards of a functional and regulatory nature, but also holistic standards relating to the private law, insolvency …


Intellectual Property: Ownership And Protection In A University Setting, Cynthia L. Dahl Jan 2019

Intellectual Property: Ownership And Protection In A University Setting, Cynthia L. Dahl

All Faculty Scholarship

Before an academic entrepreneur may protect or commercialize an invention, they must understand if they own the rights to it. This short chapter helps the inventor to consider the various scenarios that occur in a university setting. It advises the inventor how to seek a waiver from the university if they believe they are the true owner of the invention. If the facts indicate that the invention should be owned by the university, the chapter also discusses how a university decides to formally protect the invention through patent or copyright. Finally, the chapter advises the inventor how to stay involved …


Intellectual Property: Commercializing In A University Setting, Cynthia L. Dahl Jan 2019

Intellectual Property: Commercializing In A University Setting, Cynthia L. Dahl

All Faculty Scholarship

If an academic entrepreneur wants to commercialize their invention, they must first clarify who owns the invention, and then decide on the best commercialization possibility. This short chapter describes the various scenarios that might occur in a university setting. In most cases, a university will own the invention created by its researchers and faculty because of their employment. A university may then either license out the entrepreneur’s invention to a third-party company to further develop and commercialize, or may license the invention back to the entrepreneur so that they may commercialize it themselves through a start-up. Such license agreements will …


Platforms And The Rule Of Reason: The American Express Case, Herbert J. Hovenkamp Jan 2019

Platforms And The Rule Of Reason: The American Express Case, Herbert J. Hovenkamp

All Faculty Scholarship

In Ohio v. American Express Co., the Supreme Court applied antitrust’s rule of reason to a two-sided platform. The challenge was to an “anti-steering” rule, a vertical restraint preventing merchants from shifting customers who offered an AmEx card from to a less costly alternative such as Visa or Mastercard.

A two-sided platform is a business that depends on relationships between two different, noncompeting groups of transaction partners. For example, a printed periodical such as a newspaper earns revenue by selling both advertising and subscriptions to the paper itself. Success depends on a platform’s ability to maintain the appropriate balance …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Insolvency Law As Credit Enhancement And Enforcement Mechanism: A Closer Look At Global Modernization Of Secured Transactions Law, Charles W. Mooney Jr. Jan 2018

Insolvency Law As Credit Enhancement And Enforcement Mechanism: A Closer Look At Global Modernization Of Secured Transactions Law, Charles W. Mooney Jr.

All Faculty Scholarship

This essay revisits earlier work on the relationship between insolvency law and secured credit, the role of secured transactions law reforms, and the benefits of secured credit. These complex relationships require a holistic approach toward reforms of secured transactions law and insolvency law. Merely enacting sensible secured transactions laws and insolvency laws may be insufficient to produce the intended benefits from either set of laws.

The essay is informed by an ongoing qualitative empirical study of business credit in Japan—the Japanese Business Credit Project. The JBCP involves interviews of representatives of Japanese financial institutions and governmental bodies and legal practitioners …


Amending Corporate Charters And Bylaws, Albert H. Choi, Geeyoung Min Aug 2017

Amending Corporate Charters And Bylaws, Albert H. Choi, Geeyoung Min

All Faculty Scholarship

Recently, courts have embraced the contractarian theory that corporate charters and bylaws constitute a “contract” between the shareholders and the corporation and have been more willing to uphold bylaws unilaterally adopted by the directors. This paper examines the contractarian theory by drawing a parallel between amending charters and bylaws, on the one hand, and amending contracts, on the other. In particular, the paper compares the right to unilaterally amend corporate bylaws with the right to unilaterally modify contract terms, and highlights how contract law imposes various limitations on the modifying party’s discretion. More generally, when the relationship of contracting parties …


Immovable-Associated Equipment Under The Draft Mac Protocol: A Sui Generis Challenge For The Cape Town Convention, Benjamin Von Bodungen, Charles W. Mooney Jr. Jan 2017

Immovable-Associated Equipment Under The Draft Mac Protocol: A Sui Generis Challenge For The Cape Town Convention, Benjamin Von Bodungen, Charles W. Mooney Jr.

All Faculty Scholarship

UNIDROIT is in the process of adopting a fourth Protocol under the umbrella of the Cape Town Convention, the MAC Protocol, which will cover mining, agricultural and construction equipment. This article addresses a challenge faced by the MAC Protocol that was not encountered in the development of the previous Protocols - the potential for MAC equipment to be associated with immovable property in ways that result in the holder of an interest in the immovable property acquiring an interest in the associated MAC equipment under the law of the State in which the immovable property is located. The article first …


Choice-Of-Law Rules For Secured Transactions: An Interest-Based And Modern Principles-Based Framework For Assessment, Charles W. Mooney Jr. Jan 2017

Choice-Of-Law Rules For Secured Transactions: An Interest-Based And Modern Principles-Based Framework For Assessment, Charles W. Mooney Jr.

All Faculty Scholarship

This essay examines the law applicable to secured transactions. It addresses in particular the codification of the choice-of-law rules for secured transactions (STCOL rules). These rules address the laws applicable to the creation, perfection, priority, and enforcement of security interests (security rights)—a form of legislative or statutory dépeçage. It draws on the 2016 UNCITRAL Model Law on Secured Transactions (Model Law) as well as relevant North American law (Uniform Commercial Code Article 9 and the Canadian provincial Personal Property Security Acts). The STCOL rules lie at the heart of the emerged and emerging modern principles of secured transactions law …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


The Cape Town Convention’S Improbable-But-Possible Progeny Part Two: Bilateral Investment Treaty-Like Enforcement Mechanism, Charles W. Mooney Jr. Jan 2015

The Cape Town Convention’S Improbable-But-Possible Progeny Part Two: Bilateral Investment Treaty-Like Enforcement Mechanism, Charles W. Mooney Jr.

All Faculty Scholarship

This Essay is Part Two of a two-part essay series that outlines and evaluates two possible future international instruments. Each instrument draws substantial inspiration from the Cape Town Convention and its Aircraft Protocol (together, the “Convention”). The Convention governs the secured financing and leasing of large commercial aircraft, aircraft engines, and helicopters. It entered into force in 2006. It has been adopted by sixty-six Contracting States (fifty-eight of which have adopted the Aircraft Protocol), including the U.S., China, the E.U., India, Ireland, Luxembourg, Russia, and South Africa.

This Part of the Essay explores whether an investor-state dispute settlement (ISDS) feature …


The Cape Town Convention’S Improbable-But-Possible Progeny Part One: An International Secured Transactions Registry Of General Application, Charles W. Mooney Jr. Jan 2014

The Cape Town Convention’S Improbable-But-Possible Progeny Part One: An International Secured Transactions Registry Of General Application, Charles W. Mooney Jr.

All Faculty Scholarship

This essay is Part One of a two-part essay series. It outlines and evaluates two possible future international instruments. Each instrument draws substantial inspiration from the Cape Town Convention and its Aircraft Protocol (together, the “Convention”). The Convention governs the secured financing and leasing of large commercial aircraft, aircraft engines, and helicopters. It entered into force in 2006. It has been adopted by sixty Contracting States (fifty-four of which have adopted the Aircraft Protocol), including the U.S., China, the E.U., India, Ireland, Luxembourg, Russia, and South Africa.

A novel, distinctive, and path-breaking feature of the Convention is the international registry …


When Is A Dog’S Tail Not A Leg?: A Property-Based Methodology For Distinguishing Sales Of Receivables From Security Interests That Secure An Obligation, Steven L. Harris, Charles W. Mooney Jr. Jan 2014

When Is A Dog’S Tail Not A Leg?: A Property-Based Methodology For Distinguishing Sales Of Receivables From Security Interests That Secure An Obligation, Steven L. Harris, Charles W. Mooney Jr.

All Faculty Scholarship

There are two principal ways in which a firm that is owed money payable in the future but needs the money now may use its rights to payment (“receivables”) to obtain the needed financing. It might sell its receivables, or it might borrow and use the receivables as collateral to secure the loan. Different legal consequences follow depending on whether the transaction is a true sale or is a security interest that secures an obligation (a “SISO”).

These legal consequences are particularly salient when the firm enters bankruptcy. If the transaction is a sale, then the buyer can collect the …