Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway.

Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello Oct 2014

The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello

Adam Lamparello

Technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world. The original purposes of the First Amendment, which from time immemorial have protected civil liberties and preserved the free, open, and robust exchange of information, support net neutrality. After all, laws or practices that violate cherished freedoms in the physical world also violate those freedoms in the virtual world. The battle over net neutrality is “is absolutely the First Amendment issue of our time,” just as warrantless searches of cell phones were …


‘Point And Click’ Versus Byod: Student Engagement Technologies As An Ethical Imperative For Teaching Law, Elizabeth A. Kirley Oct 2014

‘Point And Click’ Versus Byod: Student Engagement Technologies As An Ethical Imperative For Teaching Law, Elizabeth A. Kirley

Elizabeth A Kirley

What conscientious law professor of first year, large format classes in torts, contracts, or criminal law has not pondered how to better engage students while easing their reluctance to speak out in class? While many students entering law schools are quite adept with student engagement technologies (SETs) from their undergraduate studies, some law faculty seem tied to the passive environment of lectures and PowerPoint presentations and hence reject SET methodologies as so much techno-wizardry. With the entry of web-based programs into the expanding field of SETs, and increasing empirical evidence that interactive learning improves grades, closes gender gaps, and helps …


The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland Sep 2014

The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland

Steven I. Friedland

In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together in judicial decisions, creating a Stickiness Principle. In particular, form and function historically were viewed as an identity, not a dichotomy. For example, containers carried things, watches told time, and telephones were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle.

In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question …


Regulation Of Chemical Risks: Lessons For Tsca Reform From Canada And The European Union, Adam Abelkop, John D. Graham Sep 2014

Regulation Of Chemical Risks: Lessons For Tsca Reform From Canada And The European Union, Adam Abelkop, John D. Graham

Adam Abelkop

The United States Congress is considering reform of the Toxic Substances Control Act (TSCA) of 1976. This Article compares recent reforms in Europe and Canada in order to draw lessons for TSCA reform. In 2006, the European Union enacted the Registration, Evaluation, Authorization, and Restriction of Chemicals (REACH) regulation while Canada used existing authority under the Canadian Environmental Protection Act (CEPA) of 1999 to initiate the 2006 Chemicals Management Plan (CMP). Focusing on the tens of thousands of industrial chemicals now in use in the US, we offer several suggestions for TSCA reform based on the European and Canadian experiences. …


The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden Aug 2014

The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden

Rob Frieden

This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …


The Replicator And The First Amendment, Kyle Langvardt Aug 2014

The Replicator And The First Amendment, Kyle Langvardt

Kyle Langvardt

As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights. This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first law review …


Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean Jul 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in digital devices no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking exclusively about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler Apr 2014

Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler

Jayme M Reisler

Prior to the mid 20th century, a declaration of death was a relatively definite determination because the functioning of each vital organ was inextricably linked to the other. With the advent of the positive-pressure mechanical ventilator, however, came the loss of integration among these organ systems. The ability to maintain metabolic functioning of a patient as well as the ability to successfully transplant viable organs have given rise to a host of legal issues revolving around the determination of death. The main issue that arises is two fold. On one hand, such medical technology can prolong an individual’s life even …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos Apr 2014

Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos

Katharine M. Villalobos

The Digital Age has introduced a new form of expression that totalitarian states are struggling to silence. With social sharing websites like Twitter and Youtube, political dissidents living under oppressive governments can expose governmental abuse to web-users worldwide in a matter of seconds. However, while digital media has proved more difficult to control than traditional, non-electronic media, dictatorships like Cuba and China are resolved to prevent its inhabitants from freely using and expressing themselves on the Internet—even if that means violating their obligations as signatories of the International Covenant on Civil and Political Rights (ICCPR).

Both Cuba and China are …


Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman Mar 2014

Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman

Bill D. Herman

With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao Mar 2014

Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao

Michael A. Alao

School districts rely on information systems to a similar extent as private, business organizations, yet the rules and regulations to ensure that school districts maintain adequate security to prevent data breaches and theft have failed to keep pace with private-sector developments. Advances in the private sector include notice-of-breach laws, consumer protection laws limiting individual liability for fraudulent electronic funds transfers, and auditing and reporting of internal controls. The public sector, including school districts, has also made advances in cyber security rules and regulations, but to a more limited extent than the private sector. Because of the sheer number of public …


Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman Mar 2014

Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman

Timothy A Wiseman

Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.

This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt Feb 2014

C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt

Victor B Flatt

After several decades of improvement, water quality in the United States is getting worse, and the problem is primarily caused by run-off from non-point sources, such as farms and urban development. These non-point sources have never had regulatory mandates in the Clean Water Act, and have proven very difficult to control. With little likelihood of comprehensive statutory changes, the EPA and the states that administer the Clean Water Act have looked to other regulatory means to address this problem. One of the most prominent has been the use of markets in pollution (particularly for nutrient pollution from run-off) to provide …


Foreseeability Decoded, Meiring De Villiers Feb 2014

Foreseeability Decoded, Meiring De Villiers

Meiring de Villiers

The Article reviews the conceptual and doctrinal roles of the foreseeability doctrine in negligence law, and analyzes its application in cases where a new technology or unexplored scientific principle contributed to a plaintiff’s harm. It adopts the common law definition of foreseeability as a systematic relationship between a defendant’s wrongdoing and the plaintiff’s harm, and demonstrates translation of the concept into the language of science so that the common law meaning of the foreseeability doctrine is preserved. An analysis of the foreseeability of HIV/AIDS as a blood-borne risk illustrates application of the concept to contemporary issues in medical science.


Transnationalization On The Technique Of Assisted Human Reproduction, Edna Raquel Hogemann Feb 2014

Transnationalization On The Technique Of Assisted Human Reproduction, Edna Raquel Hogemann

EDNA RAQUEL HOGEMANN

This paper's purpose is to present a reflective analysis about the process of transnationalization in which the technique of assisted human reproduction has been going to the extent that such a procedure has been revealed as a true "fertility tourism", offered through packages for those people who have financial conditions, but cannot through natural means to realize the dream of membership. Through the dialectic method of discourse, promoting the comparison of the thought of many authors who focus on issues such as globalization, commodification of human and technical exacerbation detriment of humans and their interpersonal relations, the authors seek to …


Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr. Jan 2014

Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

The public’s interest in medicine and good health is substantial. However, this interest is harmed when important medical devices or pharmaceuticals, although infringing on valid patents, are suddenly taken off the market after a court grants a permanent injunction. While permanent injunctions were automatically granted by the Federal Circuit before the Supreme Court’s holding in eBay v. MercExchange, courts now have more discretion to deny injunctive relief. Now that courts have this newfound discretion after eBay, the public should no longer expect to be harmed by the sudden removal of medical supplies. Unfortunately, this has not been the course that …