Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 228

Full-Text Articles in Law

Cftc & Sec: The Wild West Of Cryptocurrency Regulation, Taylor Anne Moffett Mar 2023

Cftc & Sec: The Wild West Of Cryptocurrency Regulation, Taylor Anne Moffett

University of Richmond Law Review

Over the past few years, a turf war has been brewing between the Commodity Futures Trading Commission (“CFTC”) and the Securities and Exchange Commission (“SEC”) over which agency should regulate cryptocurrencies. Both agencies have pursued numerous enforcement actions over the cryptocurrencies they believe to be within their jurisdiction. This turf war has many moving components, but the focus always comes back to one question: which cryptocurrencies are commodities, and which cryptocurrencies are securities? The distinction is important because the CFTC has statutory authority to regulate commodities, whereas the SEC has statutory authority to regulate securities. This Comment rejects the pursuit …


Cftc & Sec: The Wild West Of Cryptocurrency Regulation, Taylor Anne Moffett Jan 2023

Cftc & Sec: The Wild West Of Cryptocurrency Regulation, Taylor Anne Moffett

Law Student Publications

Over the past few years, a turf war has been brewing between the Commodity Futures Trading Commission (“CFTC”) and the Securities and Exchange Commission (“SEC”) over which agency should regulate cryptocurrencies. Both agencies have pursued numerous enforcement actions over the cryptocurrencies they believe to be within their jurisdiction. This turf war has many moving components, but the focus always comes back to one question: which cryptocurrencies are commodities, and which cryptocurrencies are securities? The distinction is important because the CFTC has statutory authority to regulate commodities, whereas the SEC has statutory authority to regulate securities. This Comment rejects the pursuit …


"Cyborg Justice" And The Risk Of Technological-Legal Lock-In, Rebecca Crootof Jan 2019

"Cyborg Justice" And The Risk Of Technological-Legal Lock-In, Rebecca Crootof

Law Faculty Publications

Although Artificial Intelligence (AI) is already of use to litigants and legal practitioners, we must be cautious and deliberate in incorporating AI into the common law judicial process. Human beings and machine systems process information and reach conclusions in fundamentally different ways, with AI being particularly ill-suited for the rule application and value balancing required of human judges. Nor will “cyborg justice”—hybrid human/AI judicial systems that attempt to marry the best of human and machine decisionmaking and minimize the drawbacks of both—be a panacea. While such systems would ideally maximize the strengths of human and machine intelligence, they might also …


Cyberstalking: Holding Perpetrators Accountable And Providing Relief For Victims, Kara Powell Jan 2019

Cyberstalking: Holding Perpetrators Accountable And Providing Relief For Victims, Kara Powell

Law Student Publications

"After deciding to end the relationship, Tina carefully broke all ties with her ex-boyfriend. Then, the first blog post went live. The post was in Tina’s name, discussing her background as a business school graduate who worked in commodities at a bank and then transferred to real estate. The post took a dark turn as it went on to describe Tina as an escort and provided her phone number and address. As more blog posts went live, more people began harassing Tina by looking for an escort. Despite such harassment, Tina was looking for a new job. She received a …


The #Metoo Movement: An Invitation For Feminist Critique Of Rape Crisis Framing, Jamie R. Abrams May 2018

The #Metoo Movement: An Invitation For Feminist Critique Of Rape Crisis Framing, Jamie R. Abrams

University of Richmond Law Review

This article invites feminists to leverage the #MeToo Movement as a critical analytical tool to explore the longevity of the enduring rape crisis framing of victim services. Long before the #MeToo Movement, victim services in communities nationwide were framed around a crisis model. For nearly half a century, victims have visited rape crisis centers, called rape crisis hotlines, and mobilized rape crisis response teams to provide services and support. This enduring political and social framing around rape as a crisis is opaque, has prompted a political backlash, and risks distorting hard-fought feminist legal, social, and political battles. It has yielded …


International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof Jan 2018

International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof

Law Faculty Publications

States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.

This Article draws on tort law and international law principles to construct …


Famous On The Internet: The Spectrum Of Internet Memes And The Legal Challenge Of Evolving Methods Of Communication, Stacey M. Lantagne Jan 2018

Famous On The Internet: The Spectrum Of Internet Memes And The Legal Challenge Of Evolving Methods Of Communication, Stacey M. Lantagne

University of Richmond Law Review

No abstract provided.


The Evolution Of E-Commerce In Virginia Real Property Transactions, Ronald D. Wiley Jr. Nov 2017

The Evolution Of E-Commerce In Virginia Real Property Transactions, Ronald D. Wiley Jr.

University of Richmond Law Review

No abstract provided.


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams Mar 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams

University of Richmond Law Review

No abstract provided.


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini Jan 2017

Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini

Law Student Publications

“‘Yay, you’re here!’ Barbie said eagerly. ‘This is so exciting. What’s your name?’…’I just know we’re going to be great friends.’” With a simple greeting, Hello Barbie has infiltrated your child’s life. Each time your child wishes to engage, they simply press on Barbie’s belt buckle and speak. Unlike other talking toys, the button on Barbie’s belt is not to play one of the pre-recorded statements that are installed in the toy. Instead, the button is used to record and transmit what your child says to an online storage cloud where it will be reviewed and used to create an …


"Connected" Discovery: What The Ubiquity Of Digital Evidence Means For Lawyers And Litigation, Gail Gottehrer Jan 2016

"Connected" Discovery: What The Ubiquity Of Digital Evidence Means For Lawyers And Litigation, Gail Gottehrer

Richmond Journal of Law & Technology

More than ten years ago, the Zubulake case raised awareness of the importance of digital evidence in litigation. At that time, for many lawyers, the discovery process consisted of collecting paper documents, manually reviewing those paper documents, and responding to document requests by producing paper documents. Digital evidence existed, but was more limited in scope and volume than it is today. Back then it was often overlooked or not recognized as a potential source of valuable evidence to be obtained in discovery.


A Litigator's Guide To The Internet Of Things, Antigone Peyton Jan 2016

A Litigator's Guide To The Internet Of Things, Antigone Peyton

Richmond Journal of Law & Technology

Maybe you've heard about the Internet of Things (loT). It's the network of physical objects (or "things") that connect to the Internet and each other and have the ability to collect and exchange data. It includes a variety of devices with sensors, vehicles, buildings, and other items that contain electronics, software, and sensors. Some loT objects have "embedded intelligence," which allows them to detect and react to changes in their physical state. Though there is no specific definition of loT, the concept focuses on how computers, sensors, and objects interact with each other and collect information relating to their surroundings.


Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer Jan 2016

Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer

Richmond Journal of Law & Technology

Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated by these resources are obvious, and have been for years. And because clients expect their counsel to take full advantage, savvy attorneys understand that they must keep up with ever-evolving legal technologies to stay competitive in a crowded marketplace.


A New Class Of Worker For The Sharing Economy, Megan Carboni Jan 2016

A New Class Of Worker For The Sharing Economy, Megan Carboni

Richmond Journal of Law & Technology

Jennifer Guidry begins her workday at four a.m. She begins by vacuuming her personal car, preparing it to "ferry around strangers" for Uber, Lyft, and Sidecar. Uber, Lyft, and Sidecar are "ride services that let people summon drivers on demand via [electronic] apps." Her phone pings just moments after four-thirty a.m.-an Uber customer requesting a ride to the airport. She accepts immediately, makes a round trip to the airport in just over an hour, and pockets twenty-eight dollars. This does not account for the cost of gas or wear and tear on her car.6 She performs the airport loop a …


Addressing Employee Use Of Personal Clouds, Philip Favro Jan 2016

Addressing Employee Use Of Personal Clouds, Philip Favro

Richmond Journal of Law & Technology

Cloud computing is one of the most useful innovations in the digital age. While much of the attention on recent advances has focused on smartphones, tablet computers, and wearable technology, the cloud is perhaps unrivaled in its utility for organizations. From simplified data storage to innovative software platforms, enterprise-grade cloud solutions provide cost-effective alternatives to acquiring expensive computer hardware and software. Enterprise clouds also offer a collaborative work environment for a mobile and widespread work force, enabling businesses to maximize worker productivity.


Cover Letter, Catherine Meade Gray Jan 2015

Cover Letter, Catherine Meade Gray

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its third issue of the Twenty-First Volume, our Annual Survey. This issue is published in conjunction with JOLT’s Symposium, “Who’s Looking At Your Mobile Device? Data Security, Personal Privacy, and Information Governance in the Wireless World.” As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. From the Journal’s inception in 1995, JOLT has strived to be a step ahead of these laws in an effort to help shape the …


An Uneasy Balance: Personal Information And Crowdfunding Under The Jobs Act, Brice Kindred Jan 2015

An Uneasy Balance: Personal Information And Crowdfunding Under The Jobs Act, Brice Kindred

Richmond Journal of Law & Technology

“Crowdfunding” is the raising of small amounts of money from many different sources for a particular purpose. Today, this usually takes place online.2 Crowdfunding has become a popular means of raising funds for a wide variety of projects, causes, and business ventures. Websites like Kickstarter, Indiegogo, and Crowdfunder allow people to create a profile for their project and solicit contributions from the general public in support.


The New Esi Sanctions Framework Under The Proposed Rule 37(E) Amendments, Philip J. Favro Jan 2015

The New Esi Sanctions Framework Under The Proposed Rule 37(E) Amendments, Philip J. Favro

Richmond Journal of Law & Technology

The debate over the necessity, substance, and form of the proposed e-Discovery amendments to the Federal Rules of Civil Procedure (Rules) has been ongoing for over four years. Since the Duke Conference convened in May 2010, the Judicial Conference Advisory Committee on the Civil Rules (Committee) has been working to address many of the perceived shortcomings in the current Rules regime.


Cover Letter, Laura M. Bedson Jan 2015

Cover Letter, Laura M. Bedson

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the Twenty-First Volume. As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. From the Journal’s inception in 1995, JOLT has strived to be a step ahead of these laws in an effort to help shape the emerging legal landscape. Additionally, JOLT recognizes the practical benefit that many of its articles have on legal professionals and we publish articles with this goal in mind. The following articles …


Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey Jan 2015

Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey

Richmond Journal of Law & Technology

Lawyers and technology have an uneasy relationship. Although some lawyers are early adapters, others take pride in ignoring technology because they believe it is alien to the practice of law. As Jody R. Westby observed, lawyers confronted with technology and security issues tend to have their “eyes glaze over” and “want to call in their ‘IT guy’ and go back to work.” But this technophobic attitude may no longer just be harmless conservatism. In the world of growing security risks, ignorance of technology may lead to violations of lawyers’ fundamental ethical duties of competence and confidentiality.


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Jan 2015

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Richmond Journal of Law & Technology

The next great wave of Internet-enabled innovation has arrived, and it is poised to revolutionize the way humans interact with the world around them. This paper highlights some of the opportunities presented by the rise of the so-called Internet of Things (IoT) in general and wearable technology in particular and encourages policymakers to allow these technologies to develop in a relatively unabated fashion.


Cover Letter, Laura M. Bedson Jan 2015

Cover Letter, Laura M. Bedson

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its fourth and final issue of the Twenty-First Volume. At its inception in 1995 JOLT became the first law review to be published exclusively online. From this moment on, the Journal has continued to set trends in the legal scholarship world. As one of the leading publications in the legal technology field, JOLT has the privilege of publishing articles that address topics at the forefront of the law. The articles in this fourth issue are no exception. Each of the following articles present exciting discussions on cutting-edge areas of …


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher Jan 2015

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

Law Student Publications

This comment considers recent cases interpreting the Digital Millennium Copyright Act ("DMCA") and urges Congress to expand the protection of service providers through the DMCA safe harbors. The comment proceeds in six parts. Part I explains contributory and vicarious liability, the applicable sections of the DMCA to this comment, and the fair use doctrine. Part II provides a brief overview of video-sharing websites. It further observes the impact that video-sharing websites have had on digital media, focusing on the impact on the music industry. Part III looks at the recent cases interpreting the DMCA's red flag exception to safe harbor …


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher Jan 2015

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

University of Richmond Law Review

No abstract provided.


Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz Jan 2015

Merger And Acquisition Due Diligence: A Proposed Framework To Incorporate Data Privacy, Information Security, E-Discovery, And Information Governance Into Due Diligence Practices, James A. Sherer, Taylor M. Hoffman, Eugenio E. Ortiz

Richmond Journal of Law & Technology

Merger and Acquisition or “M&A” deals are both figuratively and literally big business, where the stakes for the organization are often the highest. While casual observers might expect that the importance attached to these deals makes each new deal the vanguard for incorporating metrics and practices regarding every efficiency and contingency, existing research demonstrates that this is decidedly not the case.


Cover Letter, Allison F. Rienecker Jan 2014

Cover Letter, Allison F. Rienecker

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its Annual Survey issue of the 2013-2014 academic year. This issue is published in conjunction with JOLT’s Symposium entitled “Information Governance: A Comprehensive Approach to e-Discovery.” Since its founding in 1995, JOLT has strived to publish relevant legal articles at the forefront of the technological field. With this goal in mind, we are excited to expand JOLT’s respected discussion of e-Discovery to the emerging field of Information Governance.


Understanding And Contextualizing Precedents In E-Discovery: The Illusion Of Stare Decisis And Best Practices To Avoid Reliance On Outdated Guidance, Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander Jan 2014

Understanding And Contextualizing Precedents In E-Discovery: The Illusion Of Stare Decisis And Best Practices To Avoid Reliance On Outdated Guidance, Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander

Richmond Journal of Law & Technology

But as precedents survive like the clavicle in the cat, long after the use they once served is at an end, and the reason for them has been forgotten, the result of following them must often be failure and confusion from the merely logical point of view.