Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (59)
- Science and Technology Law (31)
- Law and Society (23)
- Computer Law (22)
- Intellectual Property Law (20)
-
- Constitutional Law (15)
- Communications Law (13)
- Criminal Law (12)
- Courts (11)
- Criminal Procedure (10)
- Administrative Law (9)
- Entertainment, Arts, and Sports Law (9)
- First Amendment (9)
- Legislation (8)
- State and Local Government Law (8)
- Environmental Law (7)
- Health Law and Policy (7)
- International Law (7)
- Contracts (5)
- Fourth Amendment (5)
- Human Rights Law (5)
- Legal Remedies (5)
- Air and Space Law (4)
- Civil Rights and Discrimination (4)
- Commercial Law (4)
- Comparative and Foreign Law (4)
- Family Law (4)
- Juvenile Law (4)
- Law Enforcement and Corrections (4)
- Institution
- Publication
-
- Adam Lamparello (8)
- Rob Frieden (6)
- Jennifer Jackson (3)
- A. Michael Froomkin (2)
- Henry H. Perritt, Jr. (2)
-
- Lance E Wyatt Jr. (2)
- Lawrence J. Trautman Sr. (2)
- Richard Warner (2)
- Robert Hupf Jr (2)
- Robert Sprague (2)
- Sharon K. Sandeen (2)
- Susan Freiwald (2)
- Adam A Marshall (1)
- Adam Abelkop (1)
- Benjamin Miller (1)
- Bill D. Herman (1)
- Casey J Cooper (1)
- Chidi Oguamanam (1)
- Dillon A Redding (1)
- Dorit R. Reiss (1)
- Dru Stevenson (1)
- EDNA RAQUEL HOGEMANN (1)
- Elizabeth A Kirley (1)
- Ferris K Nesheiwat (1)
- Ian Gallacher (1)
- Jayme M Reisler (1)
- Jonathan R. K. Stroud (1)
- Katharine M. Villalobos (1)
- Katrina Wu (1)
- Kyle Langvardt (1)
- File Type
Articles 31 - 60 of 77
Full-Text Articles in Law
Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler
Defining Death: A Call For The Reformation Of The Standard For Declaration Of Death In The Modern Era, Jayme M. Reisler
Jayme M Reisler
Prior to the mid 20th century, a declaration of death was a relatively definite determination because the functioning of each vital organ was inextricably linked to the other. With the advent of the positive-pressure mechanical ventilator, however, came the loss of integration among these organ systems. The ability to maintain metabolic functioning of a patient as well as the ability to successfully transplant viable organs have given rise to a host of legal issues revolving around the determination of death. The main issue that arises is two fold. On one hand, such medical technology can prolong an individual’s life even …
Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding
Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding
Dillon A Redding
This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …
Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos
Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos
Katharine M. Villalobos
The Digital Age has introduced a new form of expression that totalitarian states are struggling to silence. With social sharing websites like Twitter and Youtube, political dissidents living under oppressive governments can expose governmental abuse to web-users worldwide in a matter of seconds. However, while digital media has proved more difficult to control than traditional, non-electronic media, dictatorships like Cuba and China are resolved to prevent its inhabitants from freely using and expressing themselves on the Internet—even if that means violating their obligations as signatories of the International Covenant on Civil and Political Rights (ICCPR).
Both Cuba and China are …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson
California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson
Jennifer Jackson
In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …
California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson
California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson
Jennifer Jackson
In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …
Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman
Dissolving Innovation In Meltwater: A Misguided Paradigm For Online Search, Bill D. Herman
Bill D. Herman
With the exponential increases in online information, internet search engines have helped fill a substantial and growing need for the capacity to sort through and manage data. News outlets in general and newspapers in particular are among the most socially important sources of online content being indexed, and these outlets are faring rather poorly in the internet economy. Both of these sectors are thus in a precarious, potentially conflicted relationship, with copyright law serving as the primary legal basis for mediating the relationship. A 2013 decision, Associated Press v. Meltwater, is one recent attempt to mediate this relationship. In …
Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe
Hacking The Anti-Hacking Statute: Using The Computer Fraud And Abuse Act To Secure Public Data Exclusivity, Nicholas A. Wolfe
Nicholas A Wolfe
Work smarter, not harder. Perhaps no other saying better captures the era of hyper-productivity and automation in which we live. Titles such as ‘Top Ten Hacks to Avoid Paywalls,’ ‘Five ways You’re Wasting Your time,’ and ‘One Weird Trick’ fly across our computer screens on a commoditized basis. [1] These tips and tricks help us automate our lives and get more done, faster. Better living through automation. However, as these shortcut solutions get better and automation advances, a question arises. When does working smarter cross the line into cheating?
The Computer Fraud and Abuse Act was designed to draw this …
Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman
Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman
Lawrence J. Trautman Sr.
During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Sharon K. Sandeen
As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.
While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Lost In The Cloud: Information Flows And The Implications Of Cloud Computing For Trade Secret Protection, Sharon K. Sandeen
Sharon K. Sandeen
As has been noted elsewhere, the advent of digital technology and the Internet has greatly increased the risk that a company’s trade secrets will be lost through the inadvertent or intentional distribution of such secrets. The advent of cloud computing adds another dimension to this risk by placing actual or potential trade secrets in the hands of a third-party: the cloud computing service. This article explores the legal and practical implications of cloud computing as they relate to trade secret protection.
While there are many types of cloud computing services, this article focuses on cloud-based services that offer businesses the …
Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao
Public School Governance And Cyber Security: School Districts Provide Easy Targets For Cyber Thieves, Michael A. Alao
Michael A. Alao
School districts rely on information systems to a similar extent as private, business organizations, yet the rules and regulations to ensure that school districts maintain adequate security to prevent data breaches and theft have failed to keep pace with private-sector developments. Advances in the private sector include notice-of-breach laws, consumer protection laws limiting individual liability for fraudulent electronic funds transfers, and auditing and reporting of internal controls. The public sector, including school districts, has also made advances in cyber security rules and regulations, but to a more limited extent than the private sector. Because of the sheer number of public …
Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall
Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall
Adam A Marshall
In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
Regulating Mass Surveillance As Privacy Pollution: Learning From Environmental Impact Statements, A. Michael Froomkin
A. Michael Froomkin
US law has remarkably little to say about mass surveillance in public, a failure which has allowed the surveillance to grow at an alarming rate – a rate that is only set to increase. This article proposes ‘Privacy Impact Notices’ (PINs) — modeled on Environmental Impact Statements — as an initial solution to this problem. Data collection in public (and in the home via public spaces) resembles an externality imposed on the person whose privacy is reduced involuntarily; it can also be seen as a market failure caused by an information asymmetry. Current doctrinal legal tools available to respond to …
Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner
Bargaining In The Shadow Of Big Data, Dru Stevenson, Nicholas J. Wagoner
Dru Stevenson
Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement—based on their forecast of the outcome at trial and associated costs. Lawyers bargaining in the shadow of trial have traditionally relied on their knowledge of precedent, intuition, and previous interactions with the presiding judge and opposing counsel to forecast trial outcomes and litigation costs. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in aggregated litigation data. In this Article, we describe the tools …
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman
Timothy A Wiseman
Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.
This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Omnipresent Student Speech And The Schoolhouse Gate: Interpreting Tinker In The Digital Age, Watt L. Black Jr.
Watt Lesley Black Jr.
This paper focuses primarily on federal circuit level decisions regarding public school district's ability to discipline students who engage in electronic speech while off-campus and not involved in school activities. Particular attention is paid to the question of whether and how appeals courts have been willing to apply the "material and substantial disruption" standard from the Supreme Court's 1969 Tinker v. Des Moines decision to speech occurring off-campus. The paper, which is targeted toward both legal scholars and school administrators, draws together the common threads from the various circuits and weaves them into a set of guidelines for school administrators …
Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz
Reconciling Original With Secondary Creation: The Subtle Incentive Theory Of Copyright Licensing, Yafit Lev-Aretz
Yafit Lev-Aretz
Copyright literature has been long familiar with the lack of licensing choices in various creative markets. In the absence of a lawful licensing alternatives, consumers of works as well as secondary creators wishing to use protected elements of preexisting works are often left with no choice but to either infringe on the copyright of the rightholder or refrain from the use. As further creation is regularly impeded, the dearth of licensing greatly conflicts with the utilitarian foundation of copyright and its constitutional goal to promote creative progress. Legal scholarship has submitted various recommendations in response to the licensing failure, homing …
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean
Adam Lamparello
Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.
When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …
C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt
C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt
Victor B Flatt
After several decades of improvement, water quality in the United States is getting worse, and the problem is primarily caused by run-off from non-point sources, such as farms and urban development. These non-point sources have never had regulatory mandates in the Clean Water Act, and have proven very difficult to control. With little likelihood of comprehensive statutory changes, the EPA and the states that administer the Clean Water Act have looked to other regulatory means to address this problem. One of the most prominent has been the use of markets in pollution (particularly for nutrient pollution from run-off) to provide …
Foreseeability Decoded, Meiring De Villiers
Foreseeability Decoded, Meiring De Villiers
Meiring de Villiers
The Article reviews the conceptual and doctrinal roles of the foreseeability doctrine in negligence law, and analyzes its application in cases where a new technology or unexplored scientific principle contributed to a plaintiff’s harm. It adopts the common law definition of foreseeability as a systematic relationship between a defendant’s wrongdoing and the plaintiff’s harm, and demonstrates translation of the concept into the language of science so that the common law meaning of the foreseeability doctrine is preserved. An analysis of the foreseeability of HIV/AIDS as a blood-borne risk illustrates application of the concept to contemporary issues in medical science.
Transnationalization On The Technique Of Assisted Human Reproduction, Edna Raquel Hogemann
Transnationalization On The Technique Of Assisted Human Reproduction, Edna Raquel Hogemann
EDNA RAQUEL HOGEMANN
This paper's purpose is to present a reflective analysis about the process of transnationalization in which the technique of assisted human reproduction has been going to the extent that such a procedure has been revealed as a true "fertility tourism", offered through packages for those people who have financial conditions, but cannot through natural means to realize the dream of membership. Through the dialectic method of discourse, promoting the comparison of the thought of many authors who focus on issues such as globalization, commodification of human and technical exacerbation detriment of humans and their interpersonal relations, the authors seek to …
Copyright And Inequality, Lea Shaver
Copyright And Inequality, Lea Shaver
Lea Shaver
The prevailing theory of copyright law imagines a marketplace efficiently serving up new works to an undifferentiated world of consumers. Yet the reality is that all consumers are not equal. The majority of the world’s people experience copyright law not as a boon to consumer choice, but as a barrier to acquiring knowledge and taking part in cultural life. The resulting patterns of privilege and disadvantage, moreover, reinforce and perpetuate preexisting social divides. Class and culture combine to explain who wins, and who loses, from copyright protection. Along the dimension of class, the insight is that just because new works …
Ivf And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve Calandrillo
Ivf And The Law: How Legal And Regulatory Neglect Compromised A Medical Breakthrough, Steve Calandrillo
Steve P. Calandrillo
The rise of assisted reproductive technology like in vitro fertilization (IVF) as a method of human reproduction represents a remarkable medical achievement. It has allowed millions of infertile and same-sex couples to have children who were previously only the subject of their unrequited dreams. Live births and success rates have increased dramatically in the past decade, so much so that many fertility clinics “guarantee” a baby to clients who sign up. But with success comes inevitable downsides. Everyone knows that the price tag is steep, but given the demand, that obstacle seems to deter relatively few determined individuals. More insidious …
The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss
The Eye Of The Beholder: Participation And Impact In Telecommunications (De)Regulation, Dorit Reiss
Dorit R. Reiss
The California Public Utilities Commission addressed both pricing deregulation and universal service in telecommunications during the last decade. Both decisions had a similar cast of characters, and similarly elaborate processes. In relation to price deregulation, the utilities positions were accepted on every issue addressed; in relation to universal service, consumer organizations’ positions were accepted in about 60% of the issues. This article tells the story of how those decisions were made, and examines the reasons for the difference in impact. The article examines and reject an explanation of capture; accepts in part a focus on the influence of the commissioner …
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
Henry H. Perritt, Jr.
No abstract provided.
“Step Into The Game”: Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of “Terroristic Speech”, Robert Hupf Jr
“Step Into The Game”: Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of “Terroristic Speech”, Robert Hupf Jr
Robert Hupf Jr
This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …
Back To The Future: Returning To Reasonableness And Particularity Under The Fourth Amendment, Adam Lamparello, Charles Maclean
Back To The Future: Returning To Reasonableness And Particularity Under The Fourth Amendment, Adam Lamparello, Charles Maclean
Adam Lamparello
Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness. When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Amicus Brief -- Riley V. California And United States V. Wurie, Charles E. Maclean, Adam Lamparello
Adam Lamparello
Warrantless searches of cell phone memory—after a suspect has been arrested, and after law enforcement has seized the phone—would have been unconstitutional at the time the Fourth Amendment was adopted, and are unconstitutional now. Simply stated, they are unreasonable. And reasonableness—not a categorical warrant requirement—is the “touchstone of Fourth Amendment analysis.”