Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Leave Them Kids Alone: State Constitutional Protections For Gender-Affirming Healthcare, Jessica Matsuda Oct 2022

Leave Them Kids Alone: State Constitutional Protections For Gender-Affirming Healthcare, Jessica Matsuda

Washington and Lee Law Review

State legislatures across the nation are continually targeting the rights of transgender individuals with a variety of laws affecting everything from bathrooms to medical care. One particularly invasive type of legislation, the gender-affirming healthcare ban, seeks to prohibit all forms of healthcare that align a person’s physical traits with their gender identity for individuals under eighteen. Bans like this severely impede the treatment necessary for transgender youth suffering from gender dysphoria, which carries serious physical consequences and sometimes fatal psychological repercussions. As legislative sessions pass, more and more states are introducing and actually enacting these bans

Striking down these bans …


California And The Terrible, Horrible, No Good, Very Bad Statutory Employee Classification Scheme, Richard H. Gilliland Iii Apr 2022

California And The Terrible, Horrible, No Good, Very Bad Statutory Employee Classification Scheme, Richard H. Gilliland Iii

Washington and Lee Law Review

The battle over worker classification between state governments, on the one hand, and gig economy companies, on the other, has raged since at least the first time someone ordered an Uber. Nowhere has this battle played out more prominently in recent years than in California. In 2019, the state legislature passed AB 5, a bill which adopted a stringent independent contractor standard and effectively classified all gig economy workers as employees of the companies whose apps they use to find work. AB 5’s ripple effects were enormous—the significant popularity of gig economy apps among consumers launched what might have been …


The Impact Of Uncertainty Regarding Patent Eligible Subject Matter For Investment In U.S. Medical Diagnostic Technologies, A. Sasha Hoyt Jan 2022

The Impact Of Uncertainty Regarding Patent Eligible Subject Matter For Investment In U.S. Medical Diagnostic Technologies, A. Sasha Hoyt

Washington and Lee Law Review

Historically, 35 U.S.C. § 101, the statute governing patent eligible subject matter, has been construed broadly—with its legislative history indicating that it should cover “anything under the sun that is made by man.” The Supreme Court crafted three exceptions to § 101: (1) abstract ideas, (2) laws of nature, and (3) natural phenomena. In recent years, the Supreme Court’s eligibility jurisprudence has further narrowed § 101 to effectively exclude meritorious medical diagnostic methods. Indeed, since the Court’s decision in Mayo Collaborative Services v. Prometheus Laboratories, Inc., the Federal Circuit has held every single diagnostic method claim brought before it …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …