Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2014

Law and Technology

Articles 31 - 60 of 77

Full-Text Articles in Law

Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler Apr 2014

Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler

Jayme M Reisler

Prior to the mid 20th century, a declaration of death was a relatively definite determination because the functioning of each vital organ was inextricably linked to the other. With the advent of the positive-pressure mechanical ventilator, however, came the loss of integration among these organ systems. The ability to maintain metabolic functioning of a patient as well as the ability to successfully transplant viable organs have given rise to a host of legal issues revolving around the determination of death. The main issue that arises is two fold. On one hand, such medical technology can prolong an individual’s life even …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos Apr 2014

Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos

Katharine M. Villalobos

The Digital Age has introduced a new form of expression that totalitarian states are struggling to silence. With social sharing websites like Twitter and Youtube, political dissidents living under oppressive governments can expose governmental abuse to web-users worldwide in a matter of seconds. However, while digital media has proved more difficult to control than traditional, non-electronic media, dictatorships like Cuba and China are resolved to prevent its inhabitants from freely using and expressing themselves on the Internet—even if that means violating their obligations as signatories of the International Covenant on Civil and Political Rights (ICCPR).

Both Cuba and China are …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson Apr 2014

California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson

Jennifer Jackson

In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …


California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson Apr 2014

California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson

Jennifer Jackson

In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …


Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman Mar 2014

Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman

Bill D. Herman

With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …


Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe Mar 2014

Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe

Nicholas A Wolfe

Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?

The Computer Fraud and Abuse Act was designed to draw this …


Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman Mar 2014

Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen Mar 2014

Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen

Sharon K. Sandeen

As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.

While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …


Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao Mar 2014

Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao

Michael A. Alao

School districts rely on information systems to a similar extent as private, business organizations, yet the rules and regulations to ensure that school districts maintain adequate security to prevent data breaches and theft have failed to keep pace with private-sector developments. Advances in the private sector include notice-of-breach laws, consumer protection laws limiting individual liability for fraudulent electronic funds transfers, and auditing and reporting of internal controls. The public sector, including school districts, has also made advances in cyber security rules and regulations, but to a more limited extent than the private sector. Because of the sheer number of public …


Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall Mar 2014

Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall

Adam A Marshall

In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …


Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania Mar 2014

Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania

Tejas N. Narechania

For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.

Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …


Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin Mar 2014

Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin

A. Michael Froomkin

US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …


Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner Mar 2014

Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement—based on their forecast of the outcome at trial and associated costs. Lawyers bargaining in the shadow of trial have traditionally relied on their knowledge of precedent, intuition, and previous interactions with the presiding judge and opposing counsel to forecast trial outcomes and litigation costs. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in aggregated litigation data. In this Article, we describe the tools …


Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman Mar 2014

Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman

Timothy A Wiseman

Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.

This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …


Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr. Feb 2014

Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.

Watt Lesley Black Jr.

This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …


Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz Feb 2014

Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz

Yafit Lev-Aretz

Copyright literature has been long familiar with the lack of licensing choices in various creative markets. In the absence of a lawful licensing alternatives, consumers of works as well as secondary creators wishing to use protected elements of preexisting works are often left with no choice but to either infringe on the copyright of the rightholder or refrain from the use. As further creation is regularly impeded, the dearth of licensing greatly conflicts with the utilitarian foundation of copyright and its constitutional goal to promote creative progress. Legal scholarship has submitted various recommendations in response to the licensing failure, homing …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt Feb 2014

C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt

Victor B Flatt

After several decades of improvement, water quality in the United States is getting worse, and the problem is primarily caused by run-off from non-point sources, such as farms and urban development. These non-point sources have never had regulatory mandates in the Clean Water Act, and have proven very difficult to control. With little likelihood of comprehensive statutory changes, the EPA and the states that administer the Clean Water Act have looked to other regulatory means to address this problem. One of the most prominent has been the use of markets in pollution (particularly for nutrient pollution from run-off) to provide …


Foreseeability Decoded, Meiring De Villiers Feb 2014

Foreseeability Decoded, Meiring De Villiers

Meiring de Villiers

The Article reviews the conceptual and doctrinal roles of the foreseeability doctrine in negligence law, and analyzes its application in cases where a new technology or unexplored scientific principle contributed to a plaintiff’s harm. It adopts the common law definition of foreseeability as a systematic relationship between a defendant’s wrongdoing and the plaintiff’s harm, and demonstrates translation of the concept into the language of science so that the common law meaning of the foreseeability doctrine is preserved. An analysis of the foreseeability of HIV/AIDS as a blood-borne risk illustrates application of the concept to contemporary issues in medical science.


Transnationalization On The Technique Of Assisted Human Reproduction, Edna Raquel Hogemann Feb 2014

Transnationalization On The Technique Of Assisted Human Reproduction, Edna Raquel Hogemann

EDNA RAQUEL HOGEMANN

This paper's purpose is to present a reflective analysis about the process of transnationalization in which the technique of assisted human reproduction has been going to the extent that such a procedure has been revealed as a true "fertility tourism", offered through packages for those people who have financial conditions, but cannot through natural means to realize the dream of membership. Through the dialectic method of discourse, promoting the comparison of the thought of many authors who focus on issues such as globalization, commodification of human and technical exacerbation detriment of humans and their interpersonal relations, the authors seek to …


Copyright And Inequality, Lea Shaver Feb 2014

Copyright And Inequality, Lea Shaver

Lea Shaver

The prevailing theory of copyright law imagines a marketplace efficiently serving up new works to an undifferentiated world of consumers. Yet the reality is that all consumers are not equal. The majority of the world’s people experience copyright law not as a boon to consumer choice, but as a barrier to acquiring knowledge and taking part in cultural life. The resulting patterns of privilege and disadvantage, moreover, reinforce and perpetuate preexisting social divides. Class and culture combine to explain who wins, and who loses, from copyright protection. Along the dimension of class, the insight is that just because new works …


Ivf And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve Calandrillo Feb 2014

Ivf And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve Calandrillo

Steve P. Calandrillo

The rise of assisted reproductive technology like in vitro fertilization (IVF) as a method of human reproduction represents a remarkable medical achievement. It has allowed millions of infertile and same-sex couples to have children who were previously only the subject of their unrequited dreams. Live births and success rates have increased dramatically in the past decade, so much so that many fertility clinics “guarantee” a baby to clients who sign up. But with success comes inevitable downsides. Everyone knows that the price tag is steep, but given the demand, that obstacle seems to deter relatively few determined individuals. More insidious …


The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss Jan 2014

The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss

Dorit R. Reiss

The California Public Utilities Commission addressed both pricing deregulation and universal service in telecommunications during the last decade. Both decisions had a similar cast of characters, and similarly elaborate processes. In relation to price deregulation, the utilities positions were accepted on every issue addressed; in relation to universal service, consumer organizations’ positions were accepted in about 60% of the issues. This article tells the story of how those decisions were made, and examines the reasons for the difference in impact. The article examines and reject an explanation of capture; accepts in part a focus on the influence of the commissioner …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Jan 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

No abstract provided.


“Step Into The Game”: Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of “Terroristic Speech”, Robert Hupf Jr Jan 2014

“Step Into The Game”: Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of “Terroristic Speech”, Robert Hupf Jr

Robert Hupf Jr

This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …


Back To The Future: Returning To Reasonableness And Particularity Under The Fourth Amendment, Adam Lamparello, Charles Maclean Jan 2014

Back To The Future: Returning To Reasonableness And Particularity Under The Fourth Amendment, Adam Lamparello, Charles Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness. When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello Jan 2014

Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello

Adam Lamparello

Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”