Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
Altruism Trumping Privacy Hipaa, Privacy, Big Data Set Benefits, Douglas J. Henderson
Altruism Trumping Privacy Hipaa, Privacy, Big Data Set Benefits, Douglas J. Henderson
DOUGLAS J HENDERSON
The United States Government must administer a publicly held cloud networked Big Data Set of Private Health Information (PHI) in order to utilize Big Data Analytics and allow free data mining of such PHI so that the health care industry can operate most cost effectively while also meeting the health care needs of the aging United States populace with the highest quality of care.
Fugitives In Immigration: A Call For Legislative Guidelines On Disentitlement, Kiran H. Griffith
Fugitives In Immigration: A Call For Legislative Guidelines On Disentitlement, Kiran H. Griffith
Seattle University Law Review
In light of Supreme Court jurisprudence regarding the fugitive disentitlement doctrine, the circuit courts of appeal have readily expanded the doctrine’s use to civil matters, as well as immigration. But the Supreme Court’s nuanced treatment of the rationales underlying this doctrine, specifically in Ortega-Rodriguez v. United States and Degen v. United States, has led to inconsistent application across the circuits. Specifically, a split has arisen among the Second, Fifth, Seventh, and Ninth Circuits as to whether these rationales support invocation of the fugitive disentitlement doctrine to find fugitivity and dismiss an alien’s petition for review when an alien fails to …
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
"Destinations:" A Comparison Of Sex Trafficking In India And The United States, Sarah Montana Hart
"Destinations:" A Comparison Of Sex Trafficking In India And The United States, Sarah Montana Hart
Sarah Montana Hart
This paper finds similarities in the sex trafficking industries in the United States and India, and offers some suggestions for the international community moving forward.
"Because That's Where The Money Is": A Theory Of Corporate Legal Compliance, William Bradford
"Because That's Where The Money Is": A Theory Of Corporate Legal Compliance, William Bradford
william bradford
Upon his capture in 1934, the legendary bank robber Willie Sutton was asked by FBI agents, Why do you rob banks, Willie? Sutton, who believed the question to be rhetorical, replied, dryly, Because that's where the money is. In other words, Sutton understood his interrogator to be inquiring as to why he robbed banks rather than, say, homes, or gas stations, or church offering plates. Had he understood the query as intended - i.e., what was it about Willie Sutton the impelled Willie Sutton to crime when many others, struggling to survive the Great Depression, were not? - Sutton could …
Preventive Detention In The Law Of Armed Conflict: Throwing Away The Key?, Diane Webber
Preventive Detention In The Law Of Armed Conflict: Throwing Away The Key?, Diane Webber
Diane Webber
More than ten years after 9/11, the “clear legal framework for handling alleged terrorists” promised by President Obama in 2009 is still undeveloped and “the country continues to hold suspects indefinitely, with no congressionally approved mechanism for regular judicial review.” Should terrorists be treated as criminals, involving traditional criminal law methods of detection, interrogation, arrest and trial? Or should they be treated as though they were involved in an armed conflict, which would involve detention and trial in accordance with a completely different set of rules and procedures? Neither model is a perfect fit to deal with twenty-first century terrorism. …
Legally Blind: Hyperadversarialism, Brady Violations, And The Prosecutorial Organizational Culture, Hadar Aviram
Legally Blind: Hyperadversarialism, Brady Violations, And The Prosecutorial Organizational Culture, Hadar Aviram
Hadar Aviram
Recently, in Connick v. Thompson (2011), the Supreme Court held that the failure of several prosecutors to disclose to the defense the blood type of the perpetrator, which did not match the defendant’s blood type, was not a systematic defect that required training of staff. According to the Court the prosecutors’ misconduct, and lack of training in Brady discovery duties, did not constitute “deliberate indifference” by the municipality, which would have entitled the exonerated defendant to relief under §1983. This Article criticizes the decision--and Brady policies in general—for their narrowness and excessive reliance on indications of intent or bad faith. …