Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2011

Law and Technology

Discipline
Institution
Publication
File Type

Articles 1 - 30 of 148

Full-Text Articles in Law

The Information Era Threatens Privacy: A Comparative Study Of Electronic Money’S Privacy Policies And Privacy Laws, Guanru Liu Dec 2011

The Information Era Threatens Privacy: A Comparative Study Of Electronic Money’S Privacy Policies And Privacy Laws, Guanru Liu

GUANRU LIU

This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of …


How Can Open Source And Closed Source Software Business Structures Mutually Exist, Yugank Goyal, Padmanabha Ramanujam Dec 2011

How Can Open Source And Closed Source Software Business Structures Mutually Exist, Yugank Goyal, Padmanabha Ramanujam

Yugank Goyal

The phenomenon of producing Open Source Software based on unconstrained access to source code and the swift growth of the open source business structure of producing software fuelled by Linux Operating System and Apache Web Server have raised important questions, which are of immense scholastic interest. Accordingly many scholars in the last few years have endeavoured to clarify as to why thousands of top-quality programmers contribute freely to an open source product which is a public good. However, there has hardly been any attempt to explain how open source and closed source business structure of producing software can coexist. This …


The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman Nov 2011

The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman

Bill D. Herman

Scholars who discuss copyright often observe that the voices for stronger copyright have more financial and political capital than their opponents and thus tend to win in Congress. While the playing field is still quite slanted toward stronger copyright, the politics around the issue are much messier and less predictable. This study, a detailed political and legislative history of the major proposals regarding copyright and digital rights management from 1987 to 2006, illustrates how this policy dynamic has changed so drastically. In 1987, there was no organized opposition to copyright’s expansion. By 2006, however, there was a substantial coalition of …


Social Media And Legal Ethics, Jonathan I. Ezor Nov 2011

Social Media And Legal Ethics, Jonathan I. Ezor

Jonathan I. Ezor

A presentation on the legal issues arising out of attorney use of social media services, including for electronic discovery


Bio-Banks As A Tissue And Information Semi-Commons: Balancing Interests For Personalized Medicine, Tissue Donors And The Public Health, Ken Gatter Oct 2011

Bio-Banks As A Tissue And Information Semi-Commons: Balancing Interests For Personalized Medicine, Tissue Donors And The Public Health, Ken Gatter

Ken Gatter

Tissue biobanks are critical to realizing the promise of personalized medicine. Unlike tissue repositories of the past, biobanks combine tissue with clinical and tissue derived molecular information. They are searchable, organized data-rich entities that can make lending decisions to qualified researchers. Biobanks have a green light and are growing in number, size, complexity and investment money, but forge ahead with many ethical and legal issues unsettled. The current approach has excessive redundancy, overlap and waste because tissue is often collected for a single purpose and information proprietary.

This essay will examine the advantages and shortcomings of current law describing human …


Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden Oct 2011

Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …


The Times They Are A-Changin’: The “Sexting” Problem And How The Intrusiveness Of A Cell Phone Search Determines The (Un)Constitutionality Of Suspicion-Based And Suspicionless Searches In The Public School Setting, Andrew T. Moore Oct 2011

The Times They Are A-Changin’: The “Sexting” Problem And How The Intrusiveness Of A Cell Phone Search Determines The (Un)Constitutionality Of Suspicion-Based And Suspicionless Searches In The Public School Setting, Andrew T. Moore

Andrew T Moore

In the past decade cell phone use amongst teenagers has gone from luxury to perceived necessity. With the expanded abilities of modern cell phones, students are able to easily participate in social sexual behavior such as sending explicit images of themselves or others to other cell phone users, an activity known as “sexting.” While schools may want to do all they can to eradicate this behavior, school administrators must not violate the constitutional rights of their students in the process of doing so. When a school administrator comes to suspect “sexting” behavior, he or she must follow existing Fourth Amendment …


Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington Oct 2011

Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington

Sarah H. Ludington

No abstract provided.


Right To Information Identity, Elad Oreg Oct 2011

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways of relating to …


Skewed Incentives: How Offshore Drilling Policies Fail To Induce Innovation To Reduce Social And Environmental Costs, Gaia J. Larsen Sep 2011

Skewed Incentives: How Offshore Drilling Policies Fail To Induce Innovation To Reduce Social And Environmental Costs, Gaia J. Larsen

Gaia Larsen Esq.

The accident at the Deepwater Horizon platform in the Gulf of Mexico in April of 2010 showed the potentially catastrophic damage associated with offshore oil drilling. It also highlighted both the technological advances that have made drilling in deeper and more dangerous waters feasible and affordable, and the lack of similar advances in technology to prevent harm resulting from such drilling. In light of that disaster and current debate over offshore oil drilling, this article looks at the failure of current policies to adequately incentivize investment in innovation to reduce the environmental and social costs associated with offshore drilling. It …


Electronic Discovery: A Survey Of E-Discovery, Its Effect On Corporate Constitutional Rights And Why Corporations May Receive The Fifth Amendment Privilege Against Self-Incrimination During Parallel Civil And Criminal Litigation, Percy Arnell King Sep 2011

Electronic Discovery: A Survey Of E-Discovery, Its Effect On Corporate Constitutional Rights And Why Corporations May Receive The Fifth Amendment Privilege Against Self-Incrimination During Parallel Civil And Criminal Litigation, Percy Arnell King

Percy Arnell King Esq.

Advancing technology has created more places to seek out relevant information than ever before which, has created a burden for corporations tasked with retaining this information to comply with applicable laws and the prospect of civil or criminal litigation. This article explores how the modern trend of storing information electronically and subsequent electronic discovery allowed in parallel civil and criminal trials is inherently unfair to corporations. Furthermore, corporations have been granted several rights derived from the Bill of Rights, and should also receive the Fifth Amendment privilege against self-incrimination.


New Frontiers Of Reprogenetics: Snp Profile Collection And Banking And The Resulting Duties In Medical Malpractice, Issues In Property Rights Of Genetic Materials, And Liabilities In Genetic Privacy., Stephanie Sgambati Sep 2011

New Frontiers Of Reprogenetics: Snp Profile Collection And Banking And The Resulting Duties In Medical Malpractice, Issues In Property Rights Of Genetic Materials, And Liabilities In Genetic Privacy., Stephanie Sgambati

Stephanie Sgambati

ABSTRACT

Single nucleotide polymorphisms (SNPs) represent the portions of our genetic makeup where human differ from each other. Mapping an individual’s profile creates a DNA fingerprint entirely unique to that individual. The primary purpose for the creation of SNP profiles has been validation of medical techniques used in reproductive medicine that require researchers to be able to definitively determine which embryo makes which baby- thus matching DNA fingerprints from infants to those from embryos. In spite of this seemingly narrow use, the potential value of the information contained in the SNP profile is enormous.

In this paper, I explore how …


Cyberthreats And The Limits Of Bureaucratic Control, Susan Brenner Sep 2011

Cyberthreats And The Limits Of Bureaucratic Control, Susan Brenner

Susan Brenner

Cyber-Threats and the Limits of Bureaucratic Control By Susan W. Brenner This article argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats, i.e., cybercrime, cyberterrorism and cyberwar. It explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratically organized response structure. It explains why this is not an effective way of approaching cyber-threat control and examines the two federal initiatives that are intended to improve the U.S. cybersecurity: legislative proposals put forward by four U.S. Senators and …


Association Of Molecular Pathology Meets Therasense: Analyzing The Unenforceability Of Isolated-Sequence-Related Patents For Upenn, Columbia, Nyu, Yale, And Emory, Sam S. Han Ph.D. Sep 2011

Association Of Molecular Pathology Meets Therasense: Analyzing The Unenforceability Of Isolated-Sequence-Related Patents For Upenn, Columbia, Nyu, Yale, And Emory, Sam S. Han Ph.D.

Sam Han

37 CFR 1.56 requires disclosure of material information to the United States Patent and Trademark Office ("USPTO" or "PTO") when applying for a patent. This duty is imposed on (1) each inventor; (2) each attorney or agent who prepares or prosecutes the application; and (3) every other person who is substantively involved in the preparation or prosecution of the application and who is associated with the inventor, with the assignee or with anyone to whom there is an obligation to assign the application. Thus, for academic institutions, those who handle patent prosecution for the institution are bound by this duty …


Metadata Discovery After The 2006 Amendments To The Federal Rules Of Civil Procedure: Did The Amendments Work?, Ryan J. Rawlings Sep 2011

Metadata Discovery After The 2006 Amendments To The Federal Rules Of Civil Procedure: Did The Amendments Work?, Ryan J. Rawlings

Ryan J. Rawlings

In 2003, the Civil Rules Advisory Committee determined electronically stored information discovery required a national, uniformly applied rule, and proposed amendments to the Federal Rules of Civil Procedure explicitly addressing electronically stored information. The electronically stored information amendments to the Federal Rules of Civil Procedure became effective December 01, 2006. It is time to ask, did the amendments achieve the Committee’s goal to create a uniform system of electronic discovery? This Note will review the amendments to Rule 34 and the amendments’ effect on metadata discovery.


Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo Sep 2011

Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo

David M. Longo

No abstract provided.


The Myth And Reality Of Dilution, Sandra L. Rierson Sep 2011

The Myth And Reality Of Dilution, Sandra L. Rierson

Sandra L Rierson

Statutory dilution claims are traditionally justified on the theory that even non-confusing uses of a famous trademark (or similar mark) can nonetheless minutely dilute the source-identifying power of the targeted trademark. The assumption of both the original federal dilution statute enacted in 1995 as well as its substantial enlargement in 2006 is that the source-identifying capacity of a trademark is akin to a glass of water: spill a drop here, spill a drop there and eventually your glass is empty. This Article advances three claims. First, statutory dilution erroneously assumes that the source-identifying function of a trademark is a rivalrous …


Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes Sep 2011

Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes

John L Hughes III

As the use of social media increases and becomes an integral part of nearly every student’s life, problems arise when student expression on these sites turns into threats against the school or other students, implicating both student safety and the speaker’s right to free speech. Facing a lack of Supreme Court precedent, school officials need guidance on whether and how to take action when a student makes threats on a social network—how to prevent any danger at school while respecting the student’s right to free speech. This Article provides that guidance. It develops an approach that combines the Supreme Court’s …


Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li Sep 2011

Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li

Xiaojing Li

The emergence of social networking websites imposes a challenge to patent law. Courts should not make a blanket assumption that everything posted on social websites constitute a printed publication. Rather, courts should adopt a refined multiple factor test to help the analysis. This proposal would result in a balance between private and public interests in an invention, and therefore help achieve the ultimate goal of patent law.


Online Investigations And The Americans With Disabilities Act: The Resurgence Of Overbroad And Ineffectual Mental Health Inquiries In Character And Fitness Evaluations, Bernice M. Bird Sep 2011

Online Investigations And The Americans With Disabilities Act: The Resurgence Of Overbroad And Ineffectual Mental Health Inquiries In Character And Fitness Evaluations, Bernice M. Bird

Bernice M. Bird

Nationally, state board bar examiners’ interest to inquire into mental health has been a hotly contested issue invoking the Americans with Disabilities Act (ADA) for the last two decades. After the enactment of the ADA in 1990 a floodgate of litigation resulted in a litany of publications, all surrounding the issue of whether mental health based inquiries into character and fitness violated the ADA. Consequently, narrowly tailored mental health inquiries into specific disorders emerged as the trend in a majority of jurisdictions. This comment analyzes whether fitness boards' mental health inquiries among social networking profiles may cause the resurgence of …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song Sep 2011

The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song

Carrie Leonetti

There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.

The Article …


Coding For Life--Should Any Entity Have The Exclusive Right To Use And Sell Isolated Dna, Douglas L. Rogers Aug 2011

Coding For Life--Should Any Entity Have The Exclusive Right To Use And Sell Isolated Dna, Douglas L. Rogers

Douglas L. Rogers

Myriad Genetics, Inc. ("Myriad") obtained patents in the 1990's on two "isolated" human breast and ovarian cancer susceptibility genes ("BRCA"). Myriad did not list all the isolated sequences it claims to have a right to monopolize, but instead claims a patent on the physical phenomena itself -- all DNA segments that code for the BRCA1 polypeptide, even the sequences Myriad has not identified and even someone else in the future creates or isolates the sequences through a method or methods not contemplated by Myriad.

An impressive array of non-profit medical societies, doctors and patients sued to have the Myriad patents …


Novel "Neutrality" Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny, Jeffrey Jarosch Aug 2011

Novel "Neutrality" Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny, Jeffrey Jarosch

Jeffrey Jarosch

This Article examines a recent trend in which the Federal Trade Commission and other enforcement agencies investigate internet platforms for behavior that is insufficiently “neutral” towards users or third parties that interact with the platform. For example, Google faces a formal FTC investigation based on allegations that it has tinkered with search results rather than presenting users with a “neutral” result. Twitter, too, faces a formal investigation after the social media service restricted the ways in which third party developers could interact with Twitter through its application programming interface (API). These investigations represent a new attempt to shift the network …