Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (5)
- Computer Law (4)
- Banking and Finance Law (2)
- Evidence (2)
- Administrative Law (1)
-
- Antitrust and Trade Regulation (1)
- Business Organizations Law (1)
- Communications Law (1)
- Consumer Protection Law (1)
- Health Law and Policy (1)
- Indigenous, Indian, and Aboriginal Law (1)
- Intellectual Property Law (1)
- International Law (1)
- International Trade Law (1)
- Labor and Employment Law (1)
- Legal Ethics and Professional Responsibility (1)
- Litigation (1)
- Science and Technology Law (1)
- Transportation Law (1)
- Keyword
-
- FTC (3)
- Federal Trade Commission (2)
- HIPAA (2)
- Zubulake (2)
- 3G (1)
-
- 4G (1)
- ABA (1)
- ALPR (1)
- AMC Technology LLC v. Cisco Systems (1)
- Alter v. Rocky Point Sch. Dist (1)
- Amazonia (1)
- American Bar Association (1)
- Apple Inc. v. Samsung Electronics Co. (1)
- Arps (1)
- Automatic License Plate Readers (1)
- Ayahuasca (1)
- BYOC (1)
- Blue Sky Travel & Tours LLC v. Al Tayyar (1)
- Borello (1)
- Box (1)
- Brand (1)
- Breach (1)
- Bring your own cloud (1)
- Brown v. Tellermate Holdings Ltd. (1)
- Clear-View Technologies Inc. v. Rasnick (1)
- Commonwealth v. Zimmerman (1)
- Communities (1)
- Concerns (1)
- DP (1)
- DaaS (1)
Articles 1 - 11 of 11
Full-Text Articles in Law
The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan
The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan
Richmond Journal of Law & Technology
After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of 2012 as “The Summer of the Data Breach.” Four years later, businesses across multiple industries have suffered brand-image damage and paid millions of dollars in remedial expenses; we are living in the era of the mega breach. In 2014, companies such as Target, Home Depot, JP Morgan Chase, Anthem, Sony, UPS, Jimmy John’s, Kmart, Neiman Marcus, Community Health Systems, and the White House suffered data breaches. The Home Depot breach alone resulted in the loss of “56 million credit card accounts,” …
Co-Developing Drugs With Indigenous Communities: Lessons From Peruvian Law And The Ayahuasca Patent Dispute, Daniel S. Sem
Co-Developing Drugs With Indigenous Communities: Lessons From Peruvian Law And The Ayahuasca Patent Dispute, Daniel S. Sem
Richmond Journal of Law & Technology
This paper will examine the issues surrounding the codevelopment of drugs derived from traditional medicines used by indigenous peoples in Amazonia, with a focus on Peru. In particular, this paper will explore what national, regional and international legal structures are in place to protect the interests of indigenous peoples, while at the same time providing medical benefit to the world. This issue is explored in the context of Peruvian, U.S., and international treaties – especially the TRIPS agreement, the Andean Community, sui generis protections, and the US-Peru Trade Promotion Agreement.
Sweeten The Deal: Transfer Of Federal Spectrum Through Overlay Licenses, Brent Skorup
Sweeten The Deal: Transfer Of Federal Spectrum Through Overlay Licenses, Brent Skorup
Richmond Journal of Law & Technology
The explosion in consumer demand for wireless services that began in the 1990s caught policymakers off guard. Demand for wireless services has only accelerated, as new cellular wireless technologies-such as broadband Internet via 3G and 4G LTE-permit services such as web browsing, video streaming, the Internet of things, and gaming, necessitating a steady influx of spectrum as an input.
Regulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks, Drew Simshaw, Nicolas Terry, Kris Hauser, M.L. Cummings
Regulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks, Drew Simshaw, Nicolas Terry, Kris Hauser, M.L. Cummings
Richmond Journal of Law & Technology
Some of the most dynamic areas of robotics research and development today are healthcare applications. Robot-assisted surgery, robotic nurses, in-home rehabilitation, and eldercare robots' are all demonstrating rapidly iterating innovation. Rising healthcare labor costs and an aging population will increase demand for these human surrogates and enhancements. However, like many emerging technologies, robots are difficult to place within existing regulatory frameworks. For example, the federal Food, Drug, and Cosmetic Act (FD&C Act) seeks to ensure that medical devices (few of which are consumer devices) are safe, the HIPAA Privacy and Security Rules apply to data collected by health care providers …
"Connected" Discovery: What The Ubiquity Of Digital Evidence Means For Lawyers And Litigation, Gail Gottehrer
"Connected" Discovery: What The Ubiquity Of Digital Evidence Means For Lawyers And Litigation, Gail Gottehrer
Richmond Journal of Law & Technology
More than ten years ago, the Zubulake case raised awareness of the importance of digital evidence in litigation. At that time, for many lawyers, the discovery process consisted of collecting paper documents, manually reviewing those paper documents, and responding to document requests by producing paper documents. Digital evidence existed, but was more limited in scope and volume than it is today. Back then it was often overlooked or not recognized as a potential source of valuable evidence to be obtained in discovery.
A Litigator's Guide To The Internet Of Things, Antigone Peyton
A Litigator's Guide To The Internet Of Things, Antigone Peyton
Richmond Journal of Law & Technology
Maybe you've heard about the Internet of Things (loT). It's the network of physical objects (or "things") that connect to the Internet and each other and have the ability to collect and exchange data. It includes a variety of devices with sensors, vehicles, buildings, and other items that contain electronics, software, and sensors. Some loT objects have "embedded intelligence," which allows them to detect and react to changes in their physical state. Though there is no specific definition of loT, the concept focuses on how computers, sensors, and objects interact with each other and collect information relating to their surroundings.
Preservation: Competently Navigating Between All And Nothing, Lauren Wheeling Waller
Preservation: Competently Navigating Between All And Nothing, Lauren Wheeling Waller
Richmond Journal of Law & Technology
Merriam-Webster defines "competent" as "having requisite or adequate ability or qualities."' All professions require competence to be successful-from chefs, to tailors, to NFL quarterbacks. Without the adequate ability to poach an egg, alter suits, or read defenses, they lose patrons, customers, or-in the case of a quarterback-games and fans. Lawyers are no different. Without competence, they may not be successful. However, lawyers are different than the NFL quarterback in that they have an explicit duty of competence to their clients.
Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer
Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer
Richmond Journal of Law & Technology
Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated by these resources are obvious, and have been for years. And because clients expect their counsel to take full advantage, savvy attorneys understand that they must keep up with ever-evolving legal technologies to stay competitive in a crowded marketplace.
A New Class Of Worker For The Sharing Economy, Megan Carboni
A New Class Of Worker For The Sharing Economy, Megan Carboni
Richmond Journal of Law & Technology
Jennifer Guidry begins her workday at four a.m. She begins by vacuuming her personal car, preparing it to "ferry around strangers" for Uber, Lyft, and Sidecar. Uber, Lyft, and Sidecar are "ride services that let people summon drivers on demand via [electronic] apps." Her phone pings just moments after four-thirty a.m.-an Uber customer requesting a ride to the airport. She accepts immediately, makes a round trip to the airport in just over an hour, and pockets twenty-eight dollars. This does not account for the cost of gas or wear and tear on her car.6 She performs the airport loop a …
Addressing Employee Use Of Personal Clouds, Philip Favro
Addressing Employee Use Of Personal Clouds, Philip Favro
Richmond Journal of Law & Technology
Cloud computing is one of the most useful innovations in the digital age. While much of the attention on recent advances has focused on smartphones, tablet computers, and wearable technology, the cloud is perhaps unrivaled in its utility for organizations. From simplified data storage to innovative software platforms, enterprise-grade cloud solutions provide cost-effective alternatives to acquiring expensive computer hardware and software. Enterprise clouds also offer a collaborative work environment for a mobile and widespread work force, enabling businesses to maximize worker productivity.
Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick
Merger And Acquisition Due Diligence Part Ii- The Devil In The Details, James A. Sherer, Taylor M. Hoffman, Kevin M. Wallace, Eugenio E. Ortiz, Trevor J. Satnick
Richmond Journal of Law & Technology
Our prior scholarship examined the legal and technical challenges involved in modern Merger & Acquisition ("M&A") due diligence practices associated with transactions ("Deals"), given recent but steady advances in technology and related increases in sophistication seen in Deal participants-primarily the organizations or assets targeted (the "Targets") as part of the Deal, and the organizations that pursued and/or resulted from the Deal (the "Acquirers"). We then proposed a framework addressing five particular verticals of interest and concern: data privacy ("DP"), information security ("IS"), e-Discovery, information governance ("IG"), and the due diligence and record keeping associated with the Deal itself ("Deal Information") …