Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Copyright (2)
- Acqueiscence (1)
- Bilski v. Kappo (1)
- CLS Bank Int'l v. Alice Corp. Pty. (1)
- Campbell v. Acuff-Rose Music (1)
-
- Compulsory license (1)
- Computer law (1)
- Constitution (1)
- Counterintelligence (1)
- Cyber Risks (1)
- Cyberspace (1)
- Data Insourcing (1)
- Digital Age (1)
- Digital Medicine (1)
- Domain seizures (1)
- E-mail (1)
- Emerging Risk Management Concerns (1)
- FDA (1)
- Fair Use doctrine (1)
- Fan fiction (1)
- Financial Institutions (1)
- First Amendment (1)
- Golan v. Holder (1)
- Gray works (1)
- Implied license (1)
- Implied permission (1)
- Infringement (1)
- Integrated Approach (1)
- Joint works doctrine (1)
- Mayo Collaborative Services v. Prometheus Laboratories Inc. (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss
The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss
Journal of Intellectual Property Law
No abstract provided.
Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker
Journal of Intellectual Property Law
No abstract provided.
Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell
Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell
Journal of Intellectual Property Law
No abstract provided.
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
Occasional Papers Series
Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …
Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown
Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown
Georgia Law Review
Long before revelations of the National Security Agency's data collection programs grabbed headlines, scholars and the press decried the burgeoning harms to privacy that metadata mining and new surveillance technologies present. Through publicly accessible social media sites, web-tracking technologies, private data mining consolidators, and its own databases, the government is just a mouse click away from a wealth of intimate personal information that was virtually inaccessible only a decade ago. At the heart of the conundrum is the government's ability to source an unprecedented amount of personal data from private third parties. This trail of digital information is being insourced …
Digital Medicine, The Fda, And The First Amendment, Adam Candeub
Digital Medicine, The Fda, And The First Amendment, Adam Candeub
Georgia Law Review
Digital medicine might transform healthcare more fundamentally than the introduction of anesthesia or germ basis theory of disease. Already, tens of thousands of "medical apps" are available for smartphones. These computer applications can measure blood pressure, pulse, lung function, oxygenation level, sugar level, breathing rate and body temperature-and can even diagnose skin cancer, analyze urine, and take an echocardiogram. In fall 2013, the Federal Drug Administration (FDA) asserted regulatory authority over mobile medical applications and other digital medical services, threatening to chill, if not, destroy this innovation. This Article argues that the FDA stands on firm legal ground regulating medical …
Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson
Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson
Georgia Law Review
Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange.
Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even …