Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Malpractice Liability Related To Foreign Outsourcing Of Legal Services, Vincent R. Johnson, Stephen C. Loomis
Malpractice Liability Related To Foreign Outsourcing Of Legal Services, Vincent R. Johnson, Stephen C. Loomis
Faculty Articles
The outsourcing of client-related tasks to service providers in other countries is likely to generate malpractice claims against American law firms. This Article discusses the wide range of theories under which an outsourcing American law firm may be liable for its own negligence or for the actions of outsourcing providers. These theories include negligence by the outsourcing law firm, vicarious liability for the conduct of firm principals and employees, vicarious liability for the conduct of independent contractors, and vicarious liability for the conduct of business partners.
The Rule Of Law And Enforcement Of Chinese Tort Law, Vincent R. Johnson
The Rule Of Law And Enforcement Of Chinese Tort Law, Vincent R. Johnson
Faculty Articles
The majority of the work necessary to advance the Rule of Law in China is yet to be done. This is particularly the case as it relates to deterring accidents and compensating injuries. The Rule of Law is concerned with much more than the substantive terms of legal provisions. As such, China must develop the institutional practices that will bring to fruition the promise of the new Tort Law. In part, this will entail the proper selection, retention, and protection of judges. It will also depend on whether persons have access to the justice system, either through competent counsel or …
The Boundary-Line Fuction Of The Economic Loss Rule, Vincent R. Johnson
The Boundary-Line Fuction Of The Economic Loss Rule, Vincent R. Johnson
Faculty Articles
No abstract provided.
Cybersecurity, Identity Theft, And The Limits Of Tort Liability, Vincent R. Johnson
Cybersecurity, Identity Theft, And The Limits Of Tort Liability, Vincent R. Johnson
Faculty Articles
Tort law is the best vehicle for allocating the risks and spreading the costs of database intrusion. It can incentivize database possessors (“possessors”) and data subjects to minimize the harm associated with breaches of database security while also balancing each party’s interests. Life is built upon computerized databases and the information of those databases is subject to hackers and other cyber-threats, which can cause catastrophic damage. It is hard to identify hackers; however, a better object for recovery is likely the possessors who fail to prevent or reveal a security breach.
The law governing database possessors’ liability is far from …