Open Access. Powered by Scholars. Published by Universities.®
- Publication
-
- Giancarlo Francesco Frosio (2)
- Jonathan I. Ezor (2)
- Vincent J Roth Esq (2)
- Adam S Wallwork (1)
- Akiva A Miller (1)
-
- Alexander P Herd (1)
- Amy A. Hinkler (1)
- Andrew J Daddono (1)
- Andrew Selbst (1)
- Cassie L Needels (1)
- Chang Zhou (1)
- Dan Massoglia (1)
- Dru Stevenson (1)
- Hong Lou (1)
- Hyun G Lee (1)
- Jeffrey Li (1)
- John M. Newman (1)
- Jorge L Contreras (1)
- Judge Antoinette Plogstedt (1)
- Kenneth C. Louis (1)
- Lawrence J. Trautman Sr. (1)
- Lily M Strumwasser (1)
- Michael L Rich (1)
- Mirit Eyal-Cohen (1)
- Richard Cameron Gower (1)
- Richard Sanvenero Jr. (1)
- Shaun Spencer (1)
- Sherry Tehrani (1)
- Steven I. Friedland (1)
- Taylor R Robertson (1)
- File Type
Articles 1 - 30 of 34
Full-Text Articles in Law
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler
Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler
Amy A. Hinkler
No abstract provided.
Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland
Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland
Steven I. Friedland
State and federal courts are split over whether cell phone searches incident to a lawful arrest are permissible under the Fourth Amendment. The Supreme Court has the opportunity to create uniformity by accepting a certiorari petition in a cell phone search incident to arrest case, either United States v. Wurie or Riley v. California. The Court should do so to create an analysis that incorporates sensory enhancing technology, not avoids it, as it has done to date.
The split in case law evidences a central contradiction. Fourth Amendment rules need to be predictable and based on clear guidelines for effective …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia
Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia
Dan Massoglia
No abstract provided.
Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner
Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner
Dru Stevenson
Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …
Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani
Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani
Sherry Tehrani
Online sales in the United States have increased by over 250 percent in the last ten years, reaching over 250 billion dollars in 2012.[1] Spearheaded by Amazon.com, Inc. (“Amazon”), online retailers have fed off their competitive advantage of avoiding local sales tax, and have grown to capture roughly 7 percent of the retail market.[2] The juxtaposition of this upsurge of untaxed online sales and our nationwide recession has prompted state governments with crushing deficits to take on the tax loophole.
Local governments across the U.S. have passed legislation to enforce online sales tax collection, referred to as “Amazon …
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
Vincent J Roth Esq
Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
Vincent J Roth Esq
Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …
U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork
U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork
Adam S Wallwork
This Article addresses the question of when, if ever, the Department of the Treasury’s counterterrorism asset freezes against US persons (US citizens, resident aliens, and US-based organizations) violate the Fourth Amendment. It addresses two questions that currently divide the federal courts: (1) whether OFAC blocking orders are seizures subject to the Fourth Amendment and (2) whether the Fourth Amendment’s warrant and probable-cause requirements apply to OFAC counterterrorism blocking orders if these orders are in fact seizures.
My Originalist analysis of OFAC counterterrorism blocking orders draws on evidence of the Framers’ original understanding of “unreasonable . . . seizures,” including the …
Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen
Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen
Mirit Eyal-Cohen
Small businesses are regarded the engine of the economy. But just what is a “small” business? Depending on where one looks in the law, the definitions vary and they differ from one section to another. Unfortunately, what these various size classifications fail to assess, are the policy considerations and the legislative intent for granting regulatory preferences to small concerns to begin with.
In the last century, the U.S. government has been cultivating one such policy of fiscal and economic growth. Consequently, Congress and private institutions have been acting to incentivize, support and reward entrepreneurship through the law in order to …
Reports Of Its Death Are Greatly Exaggerated: Ebay, Bosch, And The Presumption Of Irreparable Harm In Hatch-Waxman Litgation, Kenneth C. Louis
Reports Of Its Death Are Greatly Exaggerated: Ebay, Bosch, And The Presumption Of Irreparable Harm In Hatch-Waxman Litgation, Kenneth C. Louis
Kenneth C. Louis
No abstract provided.
Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson
Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson
Taylor R Robertson
Grab your cellphone, press the record button, and amaze your friends!
No advertisement like this exists in real life, of course, because the action is already universally automatic—it needs no encouragement or instruction. But aim the camera at the police and you could be arrested and face up to fifteen years in prison under some eavesdropping or wiretapping laws simply for recording the police in public speaking at volumes audible to any unassisted ear. While wiretapping laws were originally intended to protect citizens from the snooping detective, some states have effectively turned these laws into government protection from the watchful …
Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou
Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou
Chang Zhou
No abstract provided.
How To Sculpt A Settlement And Notice Program That Will Minimize Scrutiny And Professional Objectors, Cassie L. Needels
How To Sculpt A Settlement And Notice Program That Will Minimize Scrutiny And Professional Objectors, Cassie L. Needels
Cassie L Needels
This article is focused on the importance of developing a settlement and notice program that will minimize scrutiny and professional objections, as well as how to implement a settlement and notice program accordingly. By using readily available resources, avoiding hot button indicators, effectively reaching the class, including all required information in the notice documents, avoiding legalese in all class communications, and allowing adequate time for class members to respond, you should be able to overcome judicial scrutiny and minimize the number of objections. Written by Judicially-recognized legal notification experts and a settlement administration expert with an extensive background as an …
Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li
Jeffrey Li
Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …
R2dford: Autonomous Vehicles And The Legal Implications Of Varying Liability Structures, Alexander P. Herd
R2dford: Autonomous Vehicles And The Legal Implications Of Varying Liability Structures, Alexander P. Herd
Alexander P Herd
The World Health Organization estimates that by 2030, traffic accidents will be the fifth leading cause of death in the world. Thus when Google announced that it had designed an autonomous car which could reduce traffic accidents by as much as ninety percent, there was cause for excitement. Some states have already started legislation to permit the use of autonomous cars in anticipation of the release later this decade. Courts and lawmakers need to consider who will be liable when the car that drives itself crashes. Standards used in aviation and naval cases regarding auto-pilot can be applied to the …
Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.
Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.
Richard Sanvenero Jr.
This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …
Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower
Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower
Richard Cameron Gower
Despite some difficulties, state tort law can be argued to create a unique exception to patent law. Specifically, the prevented rescue doctrine suggests that charities and others can circumvent patents on certain critical medications when such actions are necessary to save individuals from death or serious harm. Although this Article finds that the prevented rescue tort doctrines is preempted by federal patent law, all hope is not lost. A federal substantive due process claim may be brought that uses the common law to demonstrate a fundamental right that has long been protected by our Nation’s legal traditions. Moreover, this Article …
Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio
Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio
Giancarlo Francesco Frosio
For most of human history the essential nature of creativity was understood to be cumulative and collective. This notion has been largely forgotten by modern policies regulating creativity and speech. As hard as it may be to believe, the most valuable components of our immortal culture were created under a fully open regime with regard to access to pre-existing expressions and reuse. From the Platonic mimēsis to the Roman imitatio, from Macrobius’ Saturnalia to the imitatio Vergili, from medieval auctoritas and Chaucer the compilator to Anon the singer and social textuality, from Chrétien’s art of rewriting to Shakespeare’s “borrowed feathers,” …
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
Shaun Spencer
This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …
Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio
Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio
Giancarlo Francesco Frosio
In the last two decades, the industry has endlessly deployed the rhetoric of the “digital threat” in order to demand harsher measures against digital piracy, peer-to-peer file sharing and the like. In fact, the uneasiness in sharing the view that harsher measures are an adequate response to copyright infringement in the digital environment comes from the uncertain grounds on which the heavy-handed reaction against digital piracy has been based. Two related arguments might run against this heavy-handed approach. First, market conditions might incentivize piracy. Additionally, there are raising doubts over the argument that piracy is a threat to creativity, especially …
Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras
Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras
Jorge L Contreras
Technical interoperability standards are critical elements of mobile telephones, laptop computers, digital files, and thousands of other products in the modern networked economy. Most such standards are developed in so-called voluntary standards-development organizations (SDOs) that require participants to license patents essential to the standard on terms that are “fair, reasonable and non-discriminatory” (FRAND). FRAND commitments are thought to avoid the problem of patent hold-up: the imposition of excessive royalty demands after a standard has been widely adopted in the market. While, at first blush, FRAND commitments seem to assure product vendors that patents will not obstruct the manufacture and sale …
Limits On The Perfect Preventive State, Michael L. Rich
Limits On The Perfect Preventive State, Michael L. Rich
Michael L Rich
Traditional methods of crime prevention—the punishment of the culpable and the preventive restraint of the dangerous—are slowly being supplemented and supplanted by technologies that seek to perfectly prevent crime by making criminal conduct practically impossible. For instance, the federal government is developing in-car technology that would prevent vehicle operation when a driver has a blood alcohol level in excess of the legal limit. Less directly, the anti-circumvention provisions of the Digital Millennium Copyright Act of 2000 try to prevent copyright infringement by eliminating technologies that enable such infringement. Such structural regulation of private conduct is not new, but few scholars …
Desktop Piracy Factories: Will Existing Law Be Enough?, Andrew J. Daddono
Desktop Piracy Factories: Will Existing Law Be Enough?, Andrew J. Daddono
Andrew J Daddono
A brief essay on how the disruptive technology found in 3D printing will affect the future of our existing legal regimes for intellectual property, what foreseeable problems there are, and possible ways that we may address them.
What May Lead Behind Odr Rapid Step ? (Indonesia’S Information Technology Law Perspective Study), Patricia Ruslijanto
What May Lead Behind Odr Rapid Step ? (Indonesia’S Information Technology Law Perspective Study), Patricia Ruslijanto
patricia ruslijanto
No abstract provided.
Contextual Expectations Of Privacy, Andrew Selbst
Contextual Expectations Of Privacy, Andrew Selbst
Andrew Selbst
Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …
Copyright Freeconomics, John M. Newman
Copyright Freeconomics, John M. Newman
John M. Newman
Innovation has wreaked creative destruction on traditional content platforms. During the decade following Napster’s rise and fall, industry organizations launched litigation campaigns to combat the dramatic downward pricing pressure created by the advent of zero-price, copyright-infringing content. These campaigns attracted a torrent of debate, still ongoing, among scholars and stakeholders—but this debate has missed the forest for the trees. Industry organizations have abandoned litigation efforts, and many copyright owners now compete directly with infringing products by offering licit content at a price of $0.
This sea change has ushered in an era of “copyright freeconomics.” Drawing on an emerging body …
Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou
Comparative Studies On Isps' Secondary Copyright Liability In China And The Us, Hong Lou
Hong Lou
In China, the amount of copyright infringement disputes cases related to ISPs is rapid increasing, and current legislation seems to be insufficient to regulate these problems. Moreover, there is a chaos in different courts around China using different approaches and standards on search engines' secondary liability.Therefore, how to improved Chinese copyright legislation and unite relevant judgments with reasonable approaches has become an urgent task. The purpose of this essay is to compare legislation and legal practice in China and the US, to point out the tendency of ISPs' secondary copyright liability in these two countries, and to make useful suggestions …