Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Science and Technology Law

Santa Clara Law

2014

Articles 1 - 9 of 9

Full-Text Articles in Law

Here, There And Everywhere: Mobility Data In The Eu (Help Needed: Where Is Privacy?), Raffaele Zallone Feb 2014

Here, There And Everywhere: Mobility Data In The Eu (Help Needed: Where Is Privacy?), Raffaele Zallone

Santa Clara High Technology Law Journal

European law on data privacy has not clearly developed the concept of mobility data. The evolution of technology has forced the EU to cope with this reality, but so far its legislation lacks a specific focus on this aspect of technology.

A body composed of representatives from the various data protection authorities, the so-called article 29 Working Party (the name stems from section 29 of the European Data Privacy Directive, that calls for the formation and the task of this body) has coped with various aspects of mobile technology, but the documents and analysis it has produced are general and …


Who Is The Witness To An Internet Crime: The Confrontation Clause, Digital Forensics, And Child Pornography, Merritt Baer Feb 2014

Who Is The Witness To An Internet Crime: The Confrontation Clause, Digital Forensics, And Child Pornography, Merritt Baer

Santa Clara High Technology Law Journal

The Sixth Amendment’s Confrontation Clause guarantees the accused the right to confront witnesses against him. In this article I examine child pornography prosecution, in which we must apply this constitutional standard to digital forensic evidence. I ask, “Who is the witness to an Internet crime?”

The Confrontation Clause proscribes the admission of hearsay. In Ohio v. Roberts, the Supreme Court stated that the primary concern was reliability and that hearsay might be admissible if the reliability concerns were assuaged. Twenty-four years later, in Crawford v. Washington, the Supreme Court repositioned the Confrontation Clause of the Sixth Amendment as a procedural …


Facing Real-Time Identification In Mobile Apps & Wearable Computers, Yana Welinder Feb 2014

Facing Real-Time Identification In Mobile Apps & Wearable Computers, Yana Welinder

Santa Clara High Technology Law Journal

The use of face recognition technology in mobile apps and wearable computers challenges individuals’ ability to remain anonymous in public places. These apps can also link individuals’ offline activities to their online profiles, generating a digital paper trail of their every move. The ability to go off the radar allows for quiet reflection and daring experimentation—processes that are essential to a productive and democratic society. Given what we stand to lose, we ought to be cautious with groundbreaking technological progress. It does not mean that we have to move any slower, but we should think about potential consequences of the …


Reining In Remedies In Patent Litigation: Three (Increasingly Immodest) Proposals, Thomas F. Cotter Feb 2014

Reining In Remedies In Patent Litigation: Three (Increasingly Immodest) Proposals, Thomas F. Cotter

Santa Clara High Technology Law Journal

This essay, which builds on my recent work on the law and economics of comparative patent remedies, presents three proposals relating to the enforcement of domestic patent rights. The first, which may be close to being adopted in the United States, is for the courts and the International Trade Commission (ITC) to adopt a general presumption, grounded in patent law and policy, that patent owners who have committed to license their standard essential patents (SEPs) on fair, reasonable, and nondiscriminatory terms are not entitled to permanent injunctions or exclusion orders, but rather only to a damages in the form of …


A Framework For Designing Co-Regulation Models Well-Adapted To Technology-Facilitated Sharing Economies, Bryant Cannon, Hanna Chung Jan 2014

A Framework For Designing Co-Regulation Models Well-Adapted To Technology-Facilitated Sharing Economies, Bryant Cannon, Hanna Chung

Santa Clara High Technology Law Journal

Sharing economies, with their vast diversity of goods and services offered and rapidly evolving business models, have proven inconducive to traditional-regulatory approaches. Yet a complete laissez-faire approach or complete ban is not advisable. On the one hand, it is in the public interest to allow these new economies to continue to innovate, as they create value from unused assets, facilitate useful market transactions, and sometimes even lead to the creation of new goods and services to improve quality of life. On the other hand, some characteristics inherent in the design of sharing economies lead to negative externalities, disrupt city planning …


Civil Cyberconflict: Microsoft, Cybercrime, And Botnets, Janine S. Hiller Jan 2014

Civil Cyberconflict: Microsoft, Cybercrime, And Botnets, Janine S. Hiller

Santa Clara High Technology Law Journal

Cyber “warfare” and hackback by private companies is a hot discussion topic for its potential to fight cybercrime and promote cybersecurity. In the shadow of this provocative discussion, Microsoft has led a concerted, sustained fight against cybercriminals by using traditional legal theories and court actions to dismantle criminal networks known as botnets. This article brings focus to the role of the private sector in cybersecurity in light of the aggressive civil actions by Microsoft to address a thorny and seemingly intractable global problem. A botnet is a network of computers infected with unauthorized code that is controlled from a distance …


Accountability In The Patent Market: A Duty To Monitor Patent Risk From The Boardroom, Ian David Mcclure Jan 2014

Accountability In The Patent Market: A Duty To Monitor Patent Risk From The Boardroom, Ian David Mcclure

Santa Clara High Technology Law Journal

Patent risk is on the rise; and not just because there is more patent litigation now than ever before. The value of strategic patent management is no longer an unknown or ignored ingredient to corporate success. Nor is proactive and pragmatic patent risk assessment. Shareholders and investors have now caught on that patent management and patent risk affect the value of their equity. This realization has initiated a circuitous life cycle in which more patents are being transacted, divested and strategically managed, resulting in more patent risk for operating companies to monitor. Yet, this last piece—the proactive monitoring of patent …


Long On Rhetoric, Short On Results: Agile Methods And Cyber Acquisitions In The Department Of Defense, Daniel E. Schoeni Usaf Jan 2014

Long On Rhetoric, Short On Results: Agile Methods And Cyber Acquisitions In The Department Of Defense, Daniel E. Schoeni Usaf

Santa Clara High Technology Law Journal

Cyber warfare has arrived. The Department of Defense (DoD) is under attack, and our security is at stake. Yet in a field defined by its rapid growth, the DoD arms itself at the same pace that that it buys major weapons systems, an acquisition cycle of 7–10 years. It thus buys obsolete cyber-defense tools. The “arsenal of democracy” has already provided us the tools for overcoming this impediment in the form of agile software-development methods. Yet the DoD has been reluctant to set aside decades of experience and utilize different methods for software than it does for other acquisitions. But …


Keeping Up With The Game: The Use Of The Nash Bargaining Solution In Patent Infringement Cases, Lance Wyatt Jan 2014

Keeping Up With The Game: The Use Of The Nash Bargaining Solution In Patent Infringement Cases, Lance Wyatt

Santa Clara High Technology Law Journal

Determining damages is an integral stage in the patent litigation process. Since 1970, reasonable royalty damages have been calculated using the factors set forth in the seminal decision Georgia-Pacific Corp. v. United States Plywood Corp. However, these factors are prone to manipulation and abuse by damages experts. To address this abuse, damages experts have utilized a solution to a two-person bargaining situation, the Nash Bargaining Solution (NBS), as a method to calculate reasonable royalty damages in patent infringement cases. Since the introduction of NBS in patent infringement cases, courts have been reluctant to admit the use of the NBS to …