Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

None

Intellectual Property Law

Social and Behavioral Sciences

Articles 1 - 2 of 2

Full-Text Articles in Law

U.S.-Latin American Free Trade Agreements And Access To Medicine, Dominique Lochridge-Gonzales Aug 2013

U.S.-Latin American Free Trade Agreements And Access To Medicine, Dominique Lochridge-Gonzales

Dominique Lochridge-Gonzales

U.S.-Latin American Free Trade Agreements and Access to Medicine analyzes the effects of FTA provisions on access to medicine. Access to medicine lies at the heart of the crossroads between the international human right to health and international intellectual property law delineated in TRIPS. True availability of essential medicines to millions of people depends on a balance between the formations of these medicines in the first place (through rewarding innovation) and promulgating rules that allow for practicable access to those medicines. FTAs provide a method for implementing the right to health by fostering practicable access to essential medicines in the …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola Aug 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola

Taiwo Oriola

Software vulnerabilities are inherent errors or mistakes in software programming and designs, and arguably the weakest link in digital information architecture with high propensity for rendering information systems infrastructure susceptible to compromise and hacking. Given the increasing reliance of the global economy on digital platforms with concomitant imperatives for securing sensitive intelligence, business and personal data, the need for continual corrective patch of perennially recurring critical software bugs is at once urgent and sacrosanct. This has precipitated research and a thriving market in software vulnerabilities, an integral element of the burgeoning multi-million dollars information security industry that epitomizes the externalization …