Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

The Limits Of Regulatory Science In Transnational Governance Of Transgenic Plant Agriculture And Food Systems, Taiwo Oriola Apr 2014

The Limits Of Regulatory Science In Transnational Governance Of Transgenic Plant Agriculture And Food Systems, Taiwo Oriola

Taiwo Oriola

The current national and transnational regulatory and policy framework for transgenic plant agriculture and food is arguably largely defined by science. Notably, transgenic plant agriculture policy deference to science is ostensibly premised on the general perception that science is neutral, objective, reliable, and agnostic. This is exemplified by cases ranging from Alliance for Bio-integrity v Donna Shalala, European Communities: Measures Affecting the Approval and Marketing of Biotech Products, to European Commission v Republic of Poland, in which conscientious, ethical, religious, and cultural oppositional grounds to transgenic plant agriculture and food were trumped by scientific imperatives. However, the lack of unanimity …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola Aug 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola

Taiwo Oriola

Software vulnerabilities are inherent errors or mistakes in software programming and designs, and arguably the weakest link in digital information architecture with high propensity for rendering information systems infrastructure susceptible to compromise and hacking. Given the increasing reliance of the global economy on digital platforms with concomitant imperatives for securing sensitive intelligence, business and personal data, the need for continual corrective patch of perennially recurring critical software bugs is at once urgent and sacrosanct. This has precipitated research and a thriving market in software vulnerabilities, an integral element of the burgeoning multi-million dollars information security industry that epitomizes the externalization …