Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 44

Full-Text Articles in Law

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


Intentional Parenthood: A Solution To The Plight Of Same-Sex Partners Striving For Legal Recognition As Parents, Yehezkel Margalit Nov 2013

Intentional Parenthood: A Solution To The Plight Of Same-Sex Partners Striving For Legal Recognition As Parents, Yehezkel Margalit

Hezi Margalit

One significant ramification of the plight of same-sex partners attempting to receive legal recognition of their non-“traditional” family structure is their inability to be recognized as the legal and/or additional parent of a non-biologically related child either by adoption or following fertility treatments. It is a fact that gay partners are not legally recognized as married, therefore they are not granted the same legal recognition as their heterosexual peers. In this research, I will explore the main approaches available today to same-sex partners to acquire legal parentage and their inherent difficulties. I will suggest a way to circumvent those difficulties …


Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall Oct 2013

Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall

Benton C. Martin

This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Oct 2013

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler Oct 2013

Privacy Issues In The Age Of Social Media M&A, Amy A. Hinkler

Amy A. Hinkler

No abstract provided.


Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland Oct 2013

Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland

Steven I. Friedland

State and federal courts are split over whether cell phone searches incident to a lawful arrest are permissible under the Fourth Amendment. The Supreme Court has the opportunity to create uniformity by accepting a certiorari petition in a cell phone search incident to arrest case, either United States v. Wurie or Riley v. California. The Court should do so to create an analysis that incorporates sensory enhancing technology, not avoids it, as it has done to date.

The split in case law evidences a central contradiction. Fourth Amendment rules need to be predictable and based on clear guidelines for effective …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia Sep 2013

Anonymity Is The Battlefield: Practical And Legal Considerations In The Fight For Free Expression On The Web, Dan Massoglia

Dan Massoglia

No abstract provided.


Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner Sep 2013

Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …


Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani Aug 2013

Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani

Sherry Tehrani

Online sales in the United States have increased by over 250 percent in the last ten years, reaching over 250 billion dollars in 2012.[1] Spearheaded by Amazon.com, Inc. (“Amazon”), online retailers have fed off their competitive advantage of avoiding local sales tax, and have grown to capture roughly 7 percent of the retail market.[2] The juxtaposition of this upsurge of untaxed online sales and our nationwide recession has prompted state governments with crushing deficits to take on the tax loophole.

Local governments across the U.S. have passed legislation to enforce online sales tax collection, referred to as “Amazon …


The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq Aug 2013

The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq

Vincent J Roth Esq

Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …


The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq Aug 2013

The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq

Vincent J Roth Esq

Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …


U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork Aug 2013

U.S. Government Counterterrorism Asset Freezes: Regulatory Seizures In A Digital Age Of Terrorism, Adam S. Wallwork

Adam S Wallwork

This Article addresses the question of when, if ever, the Department of the Treasury’s counterterrorism asset freezes against US persons (US citizens, resident aliens, and US-based organizations) violate the Fourth Amendment. It addresses two questions that currently divide the federal courts: (1) whether OFAC blocking orders are seizures subject to the Fourth Amendment and (2) whether the Fourth Amendment’s warrant and probable-cause requirements apply to OFAC counterterrorism blocking orders if these orders are in fact seizures.

My Originalist analysis of OFAC counterterrorism blocking orders draws on evidence of the Framers’ original understanding of “unreasonable . . . seizures,” including the …


Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen Aug 2013

Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen

Mirit Eyal-Cohen

Small businesses are regarded the engine of the economy. But just what is a “small” business? Depending on where one looks in the law, the definitions vary and they differ from one section to another. Unfortunately, what these various size classifications fail to assess, are the policy considerations and the legislative intent for granting regulatory preferences to small concerns to begin with.

In the last century, the U.S. government has been cultivating one such policy of fiscal and economic growth. Consequently, Congress and private institutions have been acting to incentivize, support and reward entrepreneurship through the law in order to …


Reports Of Its Death Are Greatly Exaggerated: Ebay, Bosch, And The Presumption Of Irreparable Harm In Hatch-Waxman Litgation, Kenneth C. Louis Jul 2013

Reports Of Its Death Are Greatly Exaggerated: Ebay, Bosch, And The Presumption Of Irreparable Harm In Hatch-Waxman Litgation, Kenneth C. Louis

Kenneth C. Louis

No abstract provided.


Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson Jul 2013

Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson

Taylor R Robertson

Grab your cellphone, press the record button, and amaze your friends!

No advertisement like this exists in real life, of course, because the action is already universally automatic—it needs no encouragement or instruction. But aim the camera at the police and you could be arrested and face up to fifteen years in prison under some eavesdropping or wiretapping laws simply for recording the police in public speaking at volumes audible to any unassisted ear. While wiretapping laws were originally intended to protect citizens from the snooping detective, some states have effectively turned these laws into government protection from the watchful …


Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou Jun 2013

Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou

Chang Zhou

No abstract provided.


How To Sculpt A Settlement And Notice Program That Will Minimize Scrutiny And Professional Objectors, Cassie L. Needels Jun 2013

How To Sculpt A Settlement And Notice Program That Will Minimize Scrutiny And Professional Objectors, Cassie L. Needels

Cassie L Needels

This article is focused on the importance of developing a settlement and notice program that will minimize scrutiny and professional objections, as well as how to implement a settlement and notice program accordingly. By using readily available resources, avoiding hot button indicators, effectively reaching the class, including all required information in the notice documents, avoiding legalese in all class communications, and allowing adequate time for class members to respond, you should be able to overcome judicial scrutiny and minimize the number of objections. Written by Judicially-recognized legal notification experts and a settlement administration expert with an extensive background as an …


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


R2dford: Autonomous Vehicles And The Legal Implications Of Varying Liability Structures, Alexander P. Herd Apr 2013

R2dford: Autonomous Vehicles And The Legal Implications Of Varying Liability Structures, Alexander P. Herd

Alexander P Herd

The World Health Organization estimates that by 2030, traffic accidents will be the fifth leading cause of death in the world. Thus when Google announced that it had designed an autonomous car which could reduce traffic accidents by as much as ninety percent, there was cause for excitement. Some states have already started legislation to permit the use of autonomous cars in anticipation of the release later this decade. Courts and lawmakers need to consider who will be liable when the car that drives itself crashes. Standards used in aviation and naval cases regarding auto-pilot can be applied to the …


Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr. Apr 2013

Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.

Richard Sanvenero Jr.

This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …


Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower Apr 2013

Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower

Richard Cameron Gower

Despite some difficulties, state tort law can be argued to create a unique exception to patent law. Specifically, the prevented rescue doctrine suggests that charities and others can circumvent patents on certain critical medications when such actions are necessary to save individuals from death or serious harm. Although this Article finds that the prevented rescue tort doctrines is preempted by federal patent law, all hope is not lost. A federal substantive due process claim may be brought that uses the common law to demonstrate a fundamental right that has long been protected by our Nation’s legal traditions. Moreover, this Article …


Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio Mar 2013

Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

For most of human history the essential nature of creativity was understood to be cumulative and collective. This notion has been largely forgotten by modern policies regulating creativity and speech. As hard as it may be to believe, the most valuable components of our immortal culture were created under a fully open regime with regard to access to pre-existing expressions and reuse. From the Platonic mimēsis to the Roman imitatio, from Macrobius’ Saturnalia to the imitatio Vergili, from medieval auctoritas and Chaucer the compilator to Anon the singer and social textuality, from Chrétien’s art of rewriting to Shakespeare’s “borrowed feathers,” …


The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer Mar 2013

The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer

Shaun Spencer

This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …


Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio Mar 2013

Digital Piracy Debunked: A Short Note, Giancarlo Francesco Frosio

Giancarlo Francesco Frosio

In the last two decades, the industry has endlessly deployed the rhetoric of the “digital threat” in order to demand harsher measures against digital piracy, peer-to-peer file sharing and the like. In fact, the uneasiness in sharing the view that harsher measures are an adequate response to copyright infringement in the digital environment comes from the uncertain grounds on which the heavy-handed reaction against digital piracy has been based. Two related arguments might run against this heavy-handed approach. First, market conditions might incentivize piracy. Additionally, there are raising doubts over the argument that piracy is a threat to creativity, especially …


Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras Mar 2013

Fixing Frand: A Pseudo-Pool Approach To Standards-Based Patent Licensing, Jorge Contreras

Jorge L Contreras

Technical interoperability standards are critical elements of mobile telephones, laptop computers, digital files, and thousands of other products in the modern networked economy. Most such standards are developed in so-called voluntary standards-development organizations (SDOs) that require participants to license patents essential to the standard on terms that are “fair, reasonable and non-discriminatory” (FRAND). FRAND commitments are thought to avoid the problem of patent hold-up: the imposition of excessive royalty demands after a standard has been widely adopted in the market. While, at first blush, FRAND commitments seem to assure product vendors that patents will not obstruct the manufacture and sale …


Limits On The Perfect Preventive State, Michael L. Rich Mar 2013

Limits On The Perfect Preventive State, Michael L. Rich

Michael L Rich

Traditional methods of crime prevention—the punishment of the culpable and the preventive restraint of the dangerous—are slowly being supplemented and supplanted by technologies that seek to perfectly prevent crime by making criminal conduct practically impossible. For instance, the federal government is developing in-car technology that would prevent vehicle operation when a driver has a blood alcohol level in excess of the legal limit. Less directly, the anti-circumvention provisions of the Digital Millennium Copyright Act of 2000 try to prevent copyright infringement by eliminating technologies that enable such infringement. Such structural regulation of private conduct is not new, but few scholars …


Desktop Piracy Factories: Will Existing Law Be Enough?, Andrew J. Daddono Mar 2013

Desktop Piracy Factories: Will Existing Law Be Enough?, Andrew J. Daddono

Andrew J Daddono

A brief essay on how the disruptive technology found in 3D printing will affect the future of our existing legal regimes for intellectual property, what foreseeable problems there are, and possible ways that we may address them.


What May Lead Behind Odr Rapid Step ? (Indonesia’S Information Technology Law Perspective Study), Patricia Ruslijanto Feb 2013

What May Lead Behind Odr Rapid Step ? (Indonesia’S Information Technology Law Perspective Study), Patricia Ruslijanto

patricia ruslijanto

No abstract provided.


Contextual Expectations Of Privacy, Andrew Selbst Feb 2013

Contextual Expectations Of Privacy, Andrew Selbst

Andrew Selbst

Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …