Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss Dec 2015

The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss

Journal of Intellectual Property Law

No abstract provided.


Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker Dec 2015

Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker

Journal of Intellectual Property Law

No abstract provided.


Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell Dec 2015

Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell

Journal of Intellectual Property Law

No abstract provided.


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown Jan 2015

Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown

Georgia Law Review

Long before revelations of the National Security Agency's data collection programs grabbed headlines, scholars and the press decried the burgeoning harms to privacy that metadata mining and new surveillance technologies present. Through publicly accessible social media sites, web-tracking technologies, private data mining consolidators, and its own databases, the government is just a mouse click away from a wealth of intimate personal information that was virtually inaccessible only a decade ago. At the heart of the conundrum is the government's ability to source an unprecedented amount of personal data from private third parties. This trail of digital information is being insourced …


Digital Medicine, The Fda, And The First Amendment, Adam Candeub Jan 2015

Digital Medicine, The Fda, And The First Amendment, Adam Candeub

Georgia Law Review

Digital medicine might transform healthcare more fundamentally than the introduction of anesthesia or germ basis theory of disease. Already, tens of thousands of "medical apps" are available for smartphones. These computer applications can measure blood pressure, pulse, lung function, oxygenation level, sugar level, breathing rate and body temperature-and can even diagnose skin cancer, analyze urine, and take an echocardiogram. In fall 2013, the Federal Drug Administration (FDA) asserted regulatory authority over mobile medical applications and other digital medical services, threatening to chill, if not, destroy this innovation. This Article argues that the FDA stands on firm legal ground regulating medical …


Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson Jan 2015

Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson

Georgia Law Review

Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange.

Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even …