Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

The Price-Anderson Public Liability Action And Strict Liability, Donald E. Jose, Michael A. Garza Feb 2007

The Price-Anderson Public Liability Action And Strict Liability, Donald E. Jose, Michael A. Garza

ExpressO

Nuclear Power and nuclear weapons plants seem to be an ultrahazardous activity for which strict liability should apply. However, unusual provisions of the Price-Anderson Act serve to shield nuclear power and nuclear weapons plants and associated activities from strict liability unless the federaq agency regulating the activity determins that a special from of strict liability can be applied.


When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry Jan 2007

When Second Comes First: Correcting Patent’S Poor Secondary Incentives Through An Optional Patent Purchase System, Jordan Barry

ExpressO

As research has advanced, technologies have become more closely knit, and the relationships between them—both complementary and competitive—have become increasingly important. Unfortunately, the patent system’s use of monopoly power to reward innovators creates inefficient results by overly encouraging the development of substitute technologies and discouraging the development of complementary technologies. This paper explains how an optional patent purchase system could help ameliorate such problems and discusses the implications of such a system.


Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook Jan 2007

Internationalizing Copyright: How Claims Of International, Extraterritorial Copyright Infringement May Be Brought In U.S. Courts, Elliot Cook

ExpressO

This Comment assesses the use of the Alien Tort Statute (“ATS”) as a jurisdictional basis for claims of international copyright infringement occurring outside of the United States. Under the ATS, aliens may sue in United States district courts for torts that amount to violations of treaties or the law of nations.

Given that copyright infringement is a tort, an alien may only be able to establish ATS jurisdiction in a suit of extraterritorial infringement if the infringement violated a treaty or the law of nations. This comment argues that extraterritorial copyright infringement does indeed amount to a violation of the …


The Need For Software Innovation Policy, Christopher Riley Jan 2007

The Need For Software Innovation Policy, Christopher Riley

ExpressO

This paper examines the current legal treatment of software innovation. It argues that recent judicial standards for the regulation of software innovation do not adequately protect innovation. It presents an original standard for the regulation of software innovation, one intended to guide judicial decisions in contributory copyright liability, in interpretations of the Digital Millennium Copyright Act, and in every courtroom where a developer is on trial for the mere creation and distribution of software. The standard presented in this paper separates the questions of liability and remedy in order to produce an optimal dynamic balance of interests.


Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias Jan 2007

Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias

ExpressO

The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.

Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.

Despite accelerating technological …


Resolving Conflicts Between Multilateral Environmental Agreements: The Case Of The Montreal And Kyoto Protocols, Daniel G. Mccabe Jan 2007

Resolving Conflicts Between Multilateral Environmental Agreements: The Case Of The Montreal And Kyoto Protocols, Daniel G. Mccabe

ExpressO

The Kyoto Protocol to the United Nations Framework Convention on Climate Change and the Montreal Protocol on Substances that Deplete the Ozone Layer are multilateral environmental agreements that regulate the use of chemicals that contribute to climate change and ozone depletion. The Montreal Protocol, however, encourages the replacement of ozone depleting substances with chemicals that contribute to climate change. Likewise, the Kyoto Protocol encourages the production of an ozone depleting substance by allowing companies to profit by destroying the byproduct of its manufacture. This comment attempts to resolve these conflicts through conventional and customary international law. It concludes that the …


Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …