Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Vanderbilt Law Review

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


The Computer Fraud And Abuse Act Of 1986: A Measured Response To A Growing Problem, Dodd S. Griffith Mar 1990

The Computer Fraud And Abuse Act Of 1986: A Measured Response To A Growing Problem, Dodd S. Griffith

Vanderbilt Law Review

Before the invention of the computer, the amount of property an individual could steal or destroy was, to some extent, determined by physical limitations. Criminals could take only as much property as they could carry or arrange to transport. For example, the average amount of money taken in a bank robbery has been estimated to be about ten thousand dollars. Crime has, however, changed with the times. A criminal can use modern technology to transfer extremely large sums of money that formerly would have been impossible to remove without detection. A 1984 study conducted by the American Bar Association Task …


The Policy Implications Of Granting Patent Protection To Computer Software: An Economic Analysis, Jeffrey S. Goodman Jan 1984

The Policy Implications Of Granting Patent Protection To Computer Software: An Economic Analysis, Jeffrey S. Goodman

Vanderbilt Law Review

This Note analyzes the propriety of granting patent law protection to computer software by viewing this problem from economic, legal, public and technological policy perspectives. Part II explains the relationship between computer hardware and software, discusses the role of algorithms in software development,and traces the development of the computer software industry.Part III analyzes the economic policies underlying the patent system. Part IV identifies the patent law principles that are relevant to the software patentability issue and discusses their underlying policy foundations. Part V examines the Supreme Court's application of these principles in the leading software patent cases and concludes that …


Legal Research--Computer Retrieval Of Statutory Law And Decisional Law, David T. Moody Jun 1966

Legal Research--Computer Retrieval Of Statutory Law And Decisional Law, David T. Moody

Vanderbilt Law Review

Legal research presently involves a considerable amount of any lawyer's time and efforts largely because it is a slow and tedious process. Searching for a pertinent legal point can prove to be time-consuming and often fruitless. Moreover, it is here that chance plays one of its largest roles in the law.' An important legal point may exist,yet the researcher may fail to find it although he exercises a great degree of diligence. All lawyers must recognize this problem and the fact that it is becoming more acute with the passage of time. Something needs to be done to facilitate legal …