Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (9)
- Science and Technology Law (8)
- Computer Law (6)
- Communications Law (5)
- Labor and Employment Law (5)
-
- Intellectual Property Law (4)
- Law and Society (4)
- Social and Behavioral Sciences (3)
- Administrative Law (2)
- Business (2)
- Civil Procedure (2)
- Entertainment, Arts, and Sports Law (2)
- Fourth Amendment (2)
- International Law (2)
- Privacy Law (2)
- Business Law, Public Responsibility, and Ethics (1)
- Business and Corporate Communications (1)
- Commercial Law (1)
- Communication (1)
- Comparative and Foreign Law (1)
- Constitutional Law (1)
- Consumer Protection Law (1)
- Dispute Resolution and Arbitration (1)
- Elder Law (1)
- European Law (1)
- Evidence (1)
- Health Law and Policy (1)
- Human Resources Management (1)
- Judges (1)
- Institution
- Publication
-
- Carrie Leonetti (9)
- Rob Frieden (6)
- Allison W Chan (4)
- Wayne Barnes (4)
- David J. Rodziewicz (3)
-
- William A. Herbert (3)
- Andres Sawicki (2)
- Ari E Waldman (2)
- Austin R Caster (2)
- Bill D. Herman (2)
- Corey A Ciocchetti (2)
- Eniola Akindemowo (2)
- Katharine A. Van Tassel (2)
- Professor Andrew D Murray (2)
- Robert Sprague (2)
- Ted Hirt (2)
- Thomas F. Cotter (2)
- Aaron Greenspan (1)
- Abigail R. Moncrieff (1)
- Alek L Felstiner (1)
- Andrew B. Serwin (1)
- Andrew Chin (1)
- Andrew E. Taslitz (1)
- Andrew T Moore (1)
- Anna B Laakmann (1)
- Bernice M. Bird (1)
- Carmen Naso Mr (1)
- Chidi Oguamanam (1)
- Christopher R Smith (1)
- Chuan D Ai (1)
Articles 1 - 30 of 148
Full-Text Articles in Law
The Information Era Threatens Privacy: A Comparative Study Of Electronic Money’S Privacy Policies And Privacy Laws, Guanru Liu
GUANRU LIU
This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of …
How Can Open Source And Closed Source Software Business Structures Mutually Exist, Yugank Goyal, Padmanabha Ramanujam
How Can Open Source And Closed Source Software Business Structures Mutually Exist, Yugank Goyal, Padmanabha Ramanujam
Yugank Goyal
The phenomenon of producing Open Source Software based on unconstrained access to source code and the swift growth of the open source business structure of producing software fuelled by Linux Operating System and Apache Web Server have raised important questions, which are of immense scholastic interest. Accordingly many scholars in the last few years have endeavoured to clarify as to why thousands of top-quality programmers contribute freely to an open source product which is a public good. However, there has hardly been any attempt to explain how open source and closed source business structure of producing software can coexist. This …
The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman
The Evolution Of The Us Drm Debate, 1987-2006, Bill D. Herman
Bill D. Herman
Scholars who discuss copyright often observe that the voices for stronger copyright have more financial and political capital than their opponents and thus tend to win in Congress. While the playing field is still quite slanted toward stronger copyright, the politics around the issue are much messier and less predictable. This study, a detailed political and legislative history of the major proposals regarding copyright and digital rights management from 1987 to 2006, illustrates how this policy dynamic has changed so drastically. In 1987, there was no organized opposition to copyright’s expansion. By 2006, however, there was a substantial coalition of …
Social Media And Legal Ethics, Jonathan I. Ezor
Social Media And Legal Ethics, Jonathan I. Ezor
Jonathan I. Ezor
A presentation on the legal issues arising out of attorney use of social media services, including for electronic discovery
Bio-Banks As A Tissue And Information Semi-Commons: Balancing Interests For Personalized Medicine, Tissue Donors And The Public Health, Ken Gatter
Ken Gatter
Tissue biobanks are critical to realizing the promise of personalized medicine. Unlike tissue repositories of the past, biobanks combine tissue with clinical and tissue derived molecular information. They are searchable, organized data-rich entities that can make lending decisions to qualified researchers. Biobanks have a green light and are growing in number, size, complexity and investment money, but forge ahead with many ethical and legal issues unsettled. The current approach has excessive redundancy, overlap and waste because tissue is often collected for a single purpose and information proprietary.
This essay will examine the advantages and shortcomings of current law describing human …
Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden
Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden
Rob Frieden
Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …
The Times They Are A-Changin’: The “Sexting” Problem And How The Intrusiveness Of A Cell Phone Search Determines The (Un)Constitutionality Of Suspicion-Based And Suspicionless Searches In The Public School Setting, Andrew T. Moore
Andrew T Moore
In the past decade cell phone use amongst teenagers has gone from luxury to perceived necessity. With the expanded abilities of modern cell phones, students are able to easily participate in social sexual behavior such as sending explicit images of themselves or others to other cell phone users, an activity known as “sexting.” While schools may want to do all they can to eradicate this behavior, school administrators must not violate the constitutional rights of their students in the process of doing so. When a school administrator comes to suspect “sexting” behavior, he or she must follow existing Fourth Amendment …
Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington
Aiming At The Wrong Target: The Audience Targeting Test For Personal Jurisdiction In Internet Defamation Cases, Sarah H. Ludington
Sarah H. Ludington
No abstract provided.
Right To Information Identity, Elad Oreg
Right To Information Identity, Elad Oreg
Elad Oreg
Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. Changes in technology and social standards make the very notion of identity increasingly fluid, transforming the way it is treated and opening new and fascinating ways of relating to …
Skewed Incentives: How Offshore Drilling Policies Fail To Induce Innovation To Reduce Social And Environmental Costs, Gaia J. Larsen
Skewed Incentives: How Offshore Drilling Policies Fail To Induce Innovation To Reduce Social And Environmental Costs, Gaia J. Larsen
Gaia Larsen Esq.
The accident at the Deepwater Horizon platform in the Gulf of Mexico in April of 2010 showed the potentially catastrophic damage associated with offshore oil drilling. It also highlighted both the technological advances that have made drilling in deeper and more dangerous waters feasible and affordable, and the lack of similar advances in technology to prevent harm resulting from such drilling. In light of that disaster and current debate over offshore oil drilling, this article looks at the failure of current policies to adequately incentivize investment in innovation to reduce the environmental and social costs associated with offshore drilling. It …
Electronic Discovery: A Survey Of E-Discovery, Its Effect On Corporate Constitutional Rights And Why Corporations May Receive The Fifth Amendment Privilege Against Self-Incrimination During Parallel Civil And Criminal Litigation, Percy Arnell King
Percy Arnell King Esq.
Advancing technology has created more places to seek out relevant information than ever before which, has created a burden for corporations tasked with retaining this information to comply with applicable laws and the prospect of civil or criminal litigation. This article explores how the modern trend of storing information electronically and subsequent electronic discovery allowed in parallel civil and criminal trials is inherently unfair to corporations. Furthermore, corporations have been granted several rights derived from the Bill of Rights, and should also receive the Fifth Amendment privilege against self-incrimination.
New Frontiers Of Reprogenetics: Snp Profile Collection And Banking And The Resulting Duties In Medical Malpractice, Issues In Property Rights Of Genetic Materials, And Liabilities In Genetic Privacy., Stephanie Sgambati
Stephanie Sgambati
ABSTRACT
Single nucleotide polymorphisms (SNPs) represent the portions of our genetic makeup where human differ from each other. Mapping an individual’s profile creates a DNA fingerprint entirely unique to that individual. The primary purpose for the creation of SNP profiles has been validation of medical techniques used in reproductive medicine that require researchers to be able to definitively determine which embryo makes which baby- thus matching DNA fingerprints from infants to those from embryos. In spite of this seemingly narrow use, the potential value of the information contained in the SNP profile is enormous.
In this paper, I explore how …
Cyberthreats And The Limits Of Bureaucratic Control, Susan Brenner
Cyberthreats And The Limits Of Bureaucratic Control, Susan Brenner
Susan Brenner
Cyber-Threats and the Limits of Bureaucratic Control By Susan W. Brenner This article argues that the approach the United States, like other countries, uses to control threats in real-space is ill-suited for controlling cyberthreats, i.e., cybercrime, cyberterrorism and cyberwar. It explains that because this approach evolved to deal with threat activity in a physical environment, it is predicated on a bureaucratically organized response structure. It explains why this is not an effective way of approaching cyber-threat control and examines the two federal initiatives that are intended to improve the U.S. cybersecurity: legislative proposals put forward by four U.S. Senators and …
Association Of Molecular Pathology Meets Therasense: Analyzing The Unenforceability Of Isolated-Sequence-Related Patents For Upenn, Columbia, Nyu, Yale, And Emory, Sam S. Han Ph.D.
Association Of Molecular Pathology Meets Therasense: Analyzing The Unenforceability Of Isolated-Sequence-Related Patents For Upenn, Columbia, Nyu, Yale, And Emory, Sam S. Han Ph.D.
Sam Han
37 CFR 1.56 requires disclosure of material information to the United States Patent and Trademark Office ("USPTO" or "PTO") when applying for a patent. This duty is imposed on (1) each inventor; (2) each attorney or agent who prepares or prosecutes the application; and (3) every other person who is substantively involved in the preparation or prosecution of the application and who is associated with the inventor, with the assignee or with anyone to whom there is an obligation to assign the application. Thus, for academic institutions, those who handle patent prosecution for the institution are bound by this duty …
Metadata Discovery After The 2006 Amendments To The Federal Rules Of Civil Procedure: Did The Amendments Work?, Ryan J. Rawlings
Metadata Discovery After The 2006 Amendments To The Federal Rules Of Civil Procedure: Did The Amendments Work?, Ryan J. Rawlings
Ryan J. Rawlings
In 2003, the Civil Rules Advisory Committee determined electronically stored information discovery required a national, uniformly applied rule, and proposed amendments to the Federal Rules of Civil Procedure explicitly addressing electronically stored information. The electronically stored information amendments to the Federal Rules of Civil Procedure became effective December 01, 2006. It is time to ask, did the amendments achieve the Committee’s goal to create a uniform system of electronic discovery? This Note will review the amendments to Rule 34 and the amendments’ effect on metadata discovery.
Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo
Checking The Staats: How Long Is Too Long To Give Adequate Public Notice In Broadening Reissue Patent Applications?, David M. Longo
David M. Longo
No abstract provided.
The Myth And Reality Of Dilution, Sandra L. Rierson
The Myth And Reality Of Dilution, Sandra L. Rierson
Sandra L Rierson
Statutory dilution claims are traditionally justified on the theory that even non-confusing uses of a famous trademark (or similar mark) can nonetheless minutely dilute the source-identifying power of the targeted trademark. The assumption of both the original federal dilution statute enacted in 1995 as well as its substantial enlargement in 2006 is that the source-identifying capacity of a trademark is akin to a glass of water: spill a drop here, spill a drop there and eventually your glass is empty. This Article advances three claims. First, statutory dilution erroneously assumes that the source-identifying function of a trademark is a rivalrous …
Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes
Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes
John L Hughes III
As the use of social media increases and becomes an integral part of nearly every student’s life, problems arise when student expression on these sites turns into threats against the school or other students, implicating both student safety and the speaker’s right to free speech. Facing a lack of Supreme Court precedent, school officials need guidance on whether and how to take action when a student makes threats on a social network—how to prevent any danger at school while respecting the student’s right to free speech. This Article provides that guidance. It develops an approach that combines the Supreme Court’s …
Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li
Should Posts On Social Networking Websites Be Considered "Printed Publications" Under Patent Law?, Xiaojing Li
Xiaojing Li
The emergence of social networking websites imposes a challenge to patent law. Courts should not make a blanket assumption that everything posted on social websites constitute a printed publication. Rather, courts should adopt a refined multiple factor test to help the analysis. This proposal would result in a balance between private and public interests in an invention, and therefore help achieve the ultimate goal of patent law.
Online Investigations And The Americans With Disabilities Act: The Resurgence Of Overbroad And Ineffectual Mental Health Inquiries In Character And Fitness Evaluations, Bernice M. Bird
Bernice M. Bird
Nationally, state board bar examiners’ interest to inquire into mental health has been a hotly contested issue invoking the Americans with Disabilities Act (ADA) for the last two decades. After the enactment of the ADA in 1990 a floodgate of litigation resulted in a litany of publications, all surrounding the issue of whether mental health based inquiries into character and fitness violated the ADA. Consequently, narrowly tailored mental health inquiries into specific disorders emerged as the trend in a majority of jurisdictions. This comment analyzes whether fitness boards' mental health inquiries among social networking profiles may cause the resurgence of …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho S
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
Coding For Life--Should Any Entity Have The Exclusive Right To Use And Sell Isolated Dna, Douglas L. Rogers
Coding For Life--Should Any Entity Have The Exclusive Right To Use And Sell Isolated Dna, Douglas L. Rogers
Douglas L. Rogers
Myriad Genetics, Inc. ("Myriad") obtained patents in the 1990's on two "isolated" human breast and ovarian cancer susceptibility genes ("BRCA"). Myriad did not list all the isolated sequences it claims to have a right to monopolize, but instead claims a patent on the physical phenomena itself -- all DNA segments that code for the BRCA1 polypeptide, even the sequences Myriad has not identified and even someone else in the future creates or isolates the sequences through a method or methods not contemplated by Myriad.
An impressive array of non-profit medical societies, doctors and patients sued to have the Myriad patents …
Novel "Neutrality" Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny, Jeffrey Jarosch
Novel "Neutrality" Claims Against Internet Platforms: A Reasonable Framework For Initial Scrutiny, Jeffrey Jarosch
Jeffrey Jarosch
This Article examines a recent trend in which the Federal Trade Commission and other enforcement agencies investigate internet platforms for behavior that is insufficiently “neutral” towards users or third parties that interact with the platform. For example, Google faces a formal FTC investigation based on allegations that it has tinkered with search results rather than presenting users with a “neutral” result. Twitter, too, faces a formal investigation after the social media service restricted the ways in which third party developers could interact with Twitter through its application programming interface (API). These investigations represent a new attempt to shift the network …