Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Law

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway. Put differently, a hotel owner’s expectation of privacy in a guest registry …


City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello Dec 2014

City Of Los Angeles V. Patel: The Upcoming Supreme Court Case No One Is Talking About, Adam Lamparello

Adam Lamparello

Focusing solely on whether a hotel owner has a reasonable expectation of privacy in a guest registry is akin to asking whether Verizon Wireless has a reasonable expectation of privacy in its customer lists. The answer to those questions should be yes, but the sixty-four thousand dollar question—and the proverbial elephant in the room—is whether hotel occupants and cell phone users forfeit their privacy rights simply because they check into the Beverly Hills Hotel or call their significant others from a Smart Phone on the Santa Monica Freeway.

Put differently, a hotel owner’s expectation of privacy in a guest registry …


The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


Lights! Camera! Law School?: Using Video Interviews To Enhance First Semester Writing Assignments, Ian Gallacher Nov 2014

Lights! Camera! Law School?: Using Video Interviews To Enhance First Semester Writing Assignments, Ian Gallacher

Ian Gallacher

This short article discusses why the Legal Communication and Research program at Syracuse University College of Law has used video interviews between hypothetical clients and attorneys as an alternative to the traditional assignment memo. The article also discusses some of the technical issues related to this approach and suggests some techniques budding producers might use to develop effective and engaging videos to enhance traditional legal writing assignments.


The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello Oct 2014

The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello

Adam Lamparello

Technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world. The original purposes of the First Amendment, which from time immemorial have protected civil liberties and preserved the free, open, and robust exchange of information, support net neutrality. After all, laws or practices that violate cherished freedoms in the physical world also violate those freedoms in the virtual world. The battle over net neutrality is “is absolutely the First Amendment issue of our time,” just as warrantless searches of cell phones were …


‘Point And Click’ Versus Byod: Student Engagement Technologies As An Ethical Imperative For Teaching Law, Elizabeth A. Kirley Oct 2014

‘Point And Click’ Versus Byod: Student Engagement Technologies As An Ethical Imperative For Teaching Law, Elizabeth A. Kirley

Elizabeth A Kirley

What conscientious law professor of first year, large format classes in torts, contracts, or criminal law has not pondered how to better engage students while easing their reluctance to speak out in class? While many students entering law schools are quite adept with student engagement technologies (SETs) from their undergraduate studies, some law faculty seem tied to the passive environment of lectures and PowerPoint presentations and hence reject SET methodologies as so much techno-wizardry. With the entry of web-based programs into the expanding field of SETs, and increasing empirical evidence that interactive learning improves grades, closes gender gaps, and helps …


The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland Sep 2014

The Stickiness Principle And Searches Incident To Arrest, Steven I. Friedland

Steven I. Friedland

In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together in judicial decisions, creating a Stickiness Principle. In particular, form and function historically were viewed as an identity, not a dichotomy. For example, containers carried things, watches told time, and telephones were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle.

In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question …


Regulation Of Chemical Risks: Lessons For Tsca Reform From Canada And The European Union, Adam Abelkop, John D. Graham Sep 2014

Regulation Of Chemical Risks: Lessons For Tsca Reform From Canada And The European Union, Adam Abelkop, John D. Graham

Adam Abelkop

The United States Congress is considering reform of the Toxic Substances Control Act (TSCA) of 1976. This Article compares recent reforms in Europe and Canada in order to draw lessons for TSCA reform. In 2006, the European Union enacted the Registration, Evaluation, Authorization, and Restriction of Chemicals (REACH) regulation while Canada used existing authority under the Canadian Environmental Protection Act (CEPA) of 1999 to initiate the 2006 Chemicals Management Plan (CMP). Focusing on the tens of thousands of industrial chemicals now in use in the US, we offer several suggestions for TSCA reform based on the European and Canadian experiences. …


Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden Sep 2014

Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden

Rob Frieden

Many advocates for less intrusive government oversight of telecommunications support the migration from regulation by an expert agency to the use of adjudication remedies largely guided by antitrust/competition policy principles. They believe that competition authorities, or reviewing courts can resolve disputes after they have occurred in lieu of having expert regulatory agencies available to anticipate and resolve problems before they become acute. Such ex post remedies typically determine whether anticompetitive conduct has occurred and what marketplace harm has resulted. Advocates for retaining so-called ex ante regulation believe that an expert agency remains essential particularly in light of fast changing market …


What’S New In The Network Neutrality Debate, Rob Frieden Sep 2014

What’S New In The Network Neutrality Debate, Rob Frieden

Rob Frieden

For over ten years, academics, practitioners, policy makers, consumers and other stakeholders have debated whether and how governments should regulate the Internet with an eye toward promoting accessibility, affordability and neutrality. This issue has triggered grave concerns about the Internet’s ability to continue generating substantial and widespread benefits. Advocates for various outcomes have vastly different assessments about many baseline subjects including the viability of sustainable competition and self-regulation. Consumers become agitated and confused by different framing of the issues, particularly when participants in the Internet ecosystem cannot reach closure on interconnection and compensation issues. Increasingly these disputes trigger temporary degradation …


The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden Aug 2014

The Costs And Benefits Of Regulatory Intervention In Internet Service Provider Interconnection Disputes: Lessons From Broadcaster-Cable Retransmission Consent Negotiations, Rob Frieden

Rob Frieden

This paper considers what limited roles the FCC may lawfully assume to ensure timely and fair interconnection and compensation agreements in the Internet ecosystem. The paper examines the FCC’s limited role in broadcaster-cable television retransmission consent negotiations with an eye toward assessing the applicability of this model. The FCC explicitly states that it lacks jurisdiction to prescribe terms, or to mandate binding arbitration. However, it recently interpreted its statutory authority to ensure “good faith” negotiations as allowing it to constrain broadcaster negotiating leverage by prohibiting multiple operators, having the largest market share, from joining in collective negotiations with cable operators. …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


The Replicator And The First Amendment, Kyle Langvardt Aug 2014

The Replicator And The First Amendment, Kyle Langvardt

Kyle Langvardt

As 3D printing technology improves, the theoretical endpoint comes into view: a machine that, like the “replicators” of Star Trek, can produce anything the user asks for out of thin air from a digital blueprint. Real-life technology may never reach that endpoint, but our progress toward it has accelerated sharply over the past few years—sharply enough, indeed, for legal scholars to weigh in on the phenomenon’s disruptive potential in areas ranging from intellectual property to gun rights. This paper is concerned with the First Amendment status of the digital blueprints. As of August 2014, it is the first law review …


Reforming Copyright Interpretation, Zahr K. Said Aug 2014

Reforming Copyright Interpretation, Zahr K. Said

Zahr K Said

This Article argues that copyright law needs to acknowledge and reform its interpretive choice regime. Even though judges face potentially outcome-determinative choices among competing sources of interpretive authority when they adjudicate copyrightable works, their selection of interpretive methods has been almost entirely overlooked by scholars and judges alike. This selection among competing interpretive methods demands that judges choose where to locate their own authority: in the work itself; in the context around the work, including its reception, or in the author’s intentions; in expert opinions; or in judicial intuition. Copyright’s interpretive choice regime controls questions of major importance for the …


"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr Jul 2014

"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr

Robert Hupf Jr

This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …


Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean Jul 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in digital devices no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking exclusively about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty Jul 2014

Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty

Meredith W. Doherty

As the technology of smartphones has progressed, electronic communication has become an integral and portable part of our daily lives. A recent New Jersey case highlighted the issue of holding the sender of a text message liable for injuries resulting from a motor vehicle accident in which the driver at fault was reading a text message from the sender at the time of the accident. This note focuses on the implications of such liability being imposed on senders of text messages as well as the slippery slope that could result, taking all forms of electronic communication, social media and mobile …


Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper Jul 2014

Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper

Casey J Cooper

The right to freedom of expression and free press is recognized under almost all major human rights instruments and domestic legal systems—common and civil—in the world. However, what do you do when a fundamental right conflicts with another equally fundamental right, like the right to a fair trial? In the United States, the freedom of speech, encompassing the freedom of the press, goes nearly unfettered: the case is not the same for other common law countries. In light of cultural and historic facts, institutional factors, modern realities, and case-law, this Article contends that current American jurisprudence does not take into …


An Other History Of Knowledge And Decision In Precautionary Approaches To Sustainability, Saptarishi Bandopadhyay Jul 2014

An Other History Of Knowledge And Decision In Precautionary Approaches To Sustainability, Saptarishi Bandopadhyay

Saptarishi Bandopadhyay

In this paper, I offer an alternative reading of precaution with the hope of recovering the capacity of this ethic to facilitate legal and political decisions. Despite being a popular instrument of international environmental governance, decision-makers continue to understand this principle as reflecting an immemorial and natural instinct for preserving the environment in cases of scientific uncertainty. Such a reading, however, ignores the history and moral basis underlying this principle and thereby renders it obvious, and automatically adaptable to the politics of Sustainable Development. By offering a thicker history of precautionary governance at exemplary moments of ecological crisis I trace …


Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander Jun 2014

Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander

Rachel Rose Ostrander

As the science of stem cell research progresses it is difficult to tell what implications it will have on our society and for women. I will begin this discussion by examining how science has viewed women in the past, and use this as a basis to conjecture about how they will be viewed and treated in the future. Prevalent gender bias in scientific writing should be a cause for concern as the science of stem cell research and commodification of the female egg becomes more of a reality.

The process of egg donation has stirred much debate in the feminist …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Jun 2014

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler Apr 2014

Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler

Jayme M Reisler

Prior to the mid 20th century, a declaration of death was a relatively definite determination because the functioning of each vital organ was inextricably linked to the other. With the advent of the positive-pressure mechanical ventilator, however, came the loss of integration among these organ systems. The ability to maintain metabolic functioning of a patient as well as the ability to successfully transplant viable organs have given rise to a host of legal issues revolving around the determination of death. The main issue that arises is two fold. On one hand, such medical technology can prolong an individual’s life even …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos Apr 2014

Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos

Katharine M. Villalobos

The Digital Age has introduced a new form of expression that totalitarian states are struggling to silence. With social sharing websites like Twitter and Youtube, political dissidents living under oppressive governments can expose governmental abuse to web-users worldwide in a matter of seconds. However, while digital media has proved more difficult to control than traditional, non-electronic media, dictatorships like Cuba and China are resolved to prevent its inhabitants from freely using and expressing themselves on the Internet—even if that means violating their obligations as signatories of the International Covenant on Civil and Political Rights (ICCPR).

Both Cuba and China are …


Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman Mar 2014

Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman

Bill D. Herman

With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …