Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (16)
- Intellectual Property Law (7)
- Science and Technology Law (7)
- Computer Law (6)
- Law and Society (5)
-
- Air and Space Law (4)
- Criminal Law (4)
- State and Local Government Law (4)
- Administrative Law (3)
- Courts (3)
- Criminal Procedure (3)
- Legislation (3)
- Commercial Law (2)
- Communications Law (2)
- Contracts (2)
- Entertainment, Arts, and Sports Law (2)
- Environmental Law (2)
- First Amendment (2)
- Jurisdiction (2)
- Labor and Employment Law (2)
- Legal Remedies (2)
- Agriculture Law (1)
- Antitrust and Trade Regulation (1)
- Business Organizations Law (1)
- Civil Law (1)
- Civil Rights and Discrimination (1)
- Constitutional Law (1)
- Energy and Utilities Law (1)
- Family Law (1)
Articles 1 - 21 of 21
Full-Text Articles in Law
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
Laurie B. Serafino
Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …
One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood
One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood
Jonathan R. K. Stroud
Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …
Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart
Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart
Rebecca K Stewart
Ever since the U.S. Patent and Trademark Office began issuing utility patents for plants, the United States has sat squarely on the frontlines of what have come to be known as the “seed wars.” In the last two decades, the majority of battles in the U.S. seed wars have been waged in the form of patent infringement lawsuits. Typically these suits are filed by biotechnology corporations such as Monsanto against farmers accused of saving and planting patented seed that self-replicates to produce progeny embodying—and thus infringing—the biotech corporations’ patented inventions.
Yet in recent years, the seed wars have begun to …
Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller
Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller
Benjamin Miller
Abstract In F.T.C. v. Actavis, Inc. the Supreme Court resolved a circuit split regarding the proper evaluation of reverse payment settlements under federal antitrust law, holding that they must be evaluated under a rule of reason analysis. However, the Court simultaneously created significant uncertainty by declaring that the lower courts were responsible for structuring the analysis. While a few cases are currently in the pre-trial phase, the only decisions relating to reverse payments since Actavis have been rulings on pre-trial motions—there have been no decisions on the merits. Given the intricate intersection between antitrust and intellectual property principles in these …
Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo
Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo
A. Michael Froomkin
This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
Nlrb And Social Media, Robert Sprague
Nlrb And Social Media, Robert Sprague
Robert Sprague
Focus: (1) when do employee social media posts constitute concerted activities protected under Section 7 of the National Labor Relations Act?; and (2) when do employers' social media policies restrict protected concerted activities?
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall
Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall
Adam A Marshall
In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …
Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz
Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz
Yafit Lev-Aretz
Copyright literature has been long familiar with the lack of licensing choices in various creative markets. In the absence of a lawful licensing alternatives, consumers of works as well as secondary creators wishing to use protected elements of preexisting works are often left with no choice but to either infringe on the copyright of the rightholder or refrain from the use. As further creation is regularly impeded, the dearth of licensing greatly conflicts with the utilitarian foundation of copyright and its constitutional goal to promote creative progress. Legal scholarship has submitted various recommendations in response to the licensing failure, homing …
The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss
The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss
Dorit R. Reiss
The California Public Utilities Commission addressed both pricing deregulation and universal service in telecommunications during the last decade. Both decisions had a similar cast of characters, and similarly elaborate processes. In relation to price deregulation, the utilities positions were accepted on every issue addressed; in relation to universal service, consumer organizations’ positions were accepted in about 60% of the issues. This article tells the story of how those decisions were made, and examines the reasons for the difference in impact. The article examines and reject an explanation of capture; accepts in part a focus on the influence of the commissioner …
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
Henry H. Perritt, Jr.
No abstract provided.
California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson
California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson
Jennifer Jackson
In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …
Anticipating The Storm: Predicting And Preventing Global Technology Conflicts, Sabrina Safrin
Anticipating The Storm: Predicting And Preventing Global Technology Conflicts, Sabrina Safrin
Sabrina Safrin
This article helps lay the foundation for a new field of international law — International Law and Technology — and opens novel avenues of inquiry in law and technology and intellectual property more broadly. It analyzes as a starting point why some technologies generate global conflicts while others do not. Technologies that face international resistance can trigger a barrage of international legal responses, ranging from trade bans and WTO disputes to international regulatory regimes and barriers to patenting. Agricultural biotechnology triggered all of these legal flashpoints, while the cellphone, a technology that grew up alongside it, triggered none. Why?
Understanding …
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid
Melanie M. Reid
One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …
No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague
Robert Sprague
This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …
Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner
Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner
Richard Warner
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Richard Warner
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
Discretionary Injunctive Relief For Patent Infringement: Partial Remuneration After Ebay And Its Implications For The Developing World, Richard Li-Dar Wang
Discretionary Injunctive Relief For Patent Infringement: Partial Remuneration After Ebay And Its Implications For The Developing World, Richard Li-Dar Wang
Richard Li-dar Wang
Keeping Up With The Game: The Use Of The Nash Bargaining Solution In The Calculation Of Reasonable Royalty Damages In Patent Infringement Cases, Lance E. Wyatt Jr.
Keeping Up With The Game: The Use Of The Nash Bargaining Solution In The Calculation Of Reasonable Royalty Damages In Patent Infringement Cases, Lance E. Wyatt Jr.
Lance E Wyatt Jr.
Determining damages are an integral stage in the patent litigation process. Since 1970, reasonable royalty damages have been calculated using the factors set forth in the seminal decision, Georgia-Pacific Corp. v. United States Plywood Corp. However, these factors are prone to manipulation and abuse by damages experts. Using a solution to a two-person bargaining situation developed by John Nash, Jr. in 1950, damages experts have utilized the Nash Bargaining Solution as a method to calculate reasonable royalty damages in patent infringement cases. Since its introduction in patent infringement cases, courts have been reluctant to admit the use of the NBS …